Analysis
-
max time kernel
155s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 04:28
Static task
static1
Behavioral task
behavioral1
Sample
20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe
Resource
win10v2004-20220901-en
General
-
Target
20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe
-
Size
2.0MB
-
MD5
1047310d2de8ca872b60a26f25d93d3a
-
SHA1
f2a195007976f6dc9bb9d5d6fc1470269c5a7e47
-
SHA256
20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06
-
SHA512
43c8255b2305e54c6437f127ad869dc4d7eb5dfa5b92615919ac1156337ca5c1e2d97234af471527db7d3e7567b27d6051664d767b4965715f89e865ec06a8d1
-
SSDEEP
49152:Rc//////NIc0OFN8kH3i+Yo72DvJQ65MAGH3CU9WxtK9:Rc//////NI3OFnitLDRb5N4f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 952 KAntiH.exe -
resource yara_rule behavioral1/memory/1348-1975-0x0000000000260000-0x000000000029E000-memory.dmp upx behavioral1/memory/1348-4292-0x0000000000260000-0x000000000029E000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1348 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 1348 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1640 set thread context of 1348 1640 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 27 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\inf\KAntiH.exe 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS KAntiH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer KAntiH.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe 952 KAntiH.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1348 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 1348 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 1348 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 952 KAntiH.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1348 1640 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 27 PID 1640 wrote to memory of 1348 1640 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 27 PID 1640 wrote to memory of 1348 1640 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 27 PID 1640 wrote to memory of 1348 1640 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 27 PID 1640 wrote to memory of 1348 1640 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 27 PID 1640 wrote to memory of 1348 1640 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 27 PID 1348 wrote to memory of 952 1348 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 28 PID 1348 wrote to memory of 952 1348 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 28 PID 1348 wrote to memory of 952 1348 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 28 PID 1348 wrote to memory of 952 1348 20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe"C:\Users\Admin\AppData\Local\Temp\20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exeC:\Users\Admin\AppData\Local\Temp\20af96f3d406d67375c28b4150ed1804b6f04197d640ce2ab4b479090d638c06.exe2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\inf\KAntiH.exeC:\Windows\inf\KAntiH.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:952
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
988KB
MD568c95b5bf71f2b84a5a30458ee23b9cd
SHA1cc3233cc88f4f3a11a417861b142f77aa4f8ba54
SHA2564a283cd171965220da4feea145662c68a4a66a536b6bb7670cf707441dff23a8
SHA51223809fb6367fab7339573b61b8f814eaaccdebf92e297817d81c076df2fe7aca2ff8fc7aed2097884c75c9e27a79bbcc9464e09946a06c189ff89b2303cc18dd
-
Filesize
988KB
MD568c95b5bf71f2b84a5a30458ee23b9cd
SHA1cc3233cc88f4f3a11a417861b142f77aa4f8ba54
SHA2564a283cd171965220da4feea145662c68a4a66a536b6bb7670cf707441dff23a8
SHA51223809fb6367fab7339573b61b8f814eaaccdebf92e297817d81c076df2fe7aca2ff8fc7aed2097884c75c9e27a79bbcc9464e09946a06c189ff89b2303cc18dd
-
Filesize
988KB
MD568c95b5bf71f2b84a5a30458ee23b9cd
SHA1cc3233cc88f4f3a11a417861b142f77aa4f8ba54
SHA2564a283cd171965220da4feea145662c68a4a66a536b6bb7670cf707441dff23a8
SHA51223809fb6367fab7339573b61b8f814eaaccdebf92e297817d81c076df2fe7aca2ff8fc7aed2097884c75c9e27a79bbcc9464e09946a06c189ff89b2303cc18dd
-
Filesize
988KB
MD568c95b5bf71f2b84a5a30458ee23b9cd
SHA1cc3233cc88f4f3a11a417861b142f77aa4f8ba54
SHA2564a283cd171965220da4feea145662c68a4a66a536b6bb7670cf707441dff23a8
SHA51223809fb6367fab7339573b61b8f814eaaccdebf92e297817d81c076df2fe7aca2ff8fc7aed2097884c75c9e27a79bbcc9464e09946a06c189ff89b2303cc18dd