Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2022, 18:49
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.KadrBot.3776.11399.exe
Resource
win7-20221111-en
General
-
Target
SecuriteInfo.com.Win32.KadrBot.3776.11399.exe
-
Size
73KB
-
MD5
45fcc38f53e4ba514815477f91618a47
-
SHA1
e971641482d77987e082289c38388052465b2117
-
SHA256
68dd15c384e6d7b3fc6afeda9a17df9ffa55ed29861e9249751488b03abac2fc
-
SHA512
99f0a43b7e0bf732a87cbb36c84ec10d72d4e60d3fa805c908597956cdde005d60e225f24d24da5a07747bd5265eeb78edc7e5f5c0da1f005cac5c21ac53f08d
-
SSDEEP
1536:q3Mz8qPJhOiwf80HUAB0jguYmi159R7wKcfF4:RwEJhOBHpuEHmi1ZEFfF
Malware Config
Extracted
phorphiex
http://185.215.113.66/twizt/
12SJv5p8xUHeiKnXPCDaKCMpqvXj7TABT5BSxGt3csz9Beuc
1A6utf8R2zfLL7X31T5QRHdQyAx16BjdFD
3PFzu8Rw8aDNhDT6d5FMrZ3ckE4dEHzogfg
3BJS4zYwrnfcJMm4xLxRcsa69ght8n6QWz
qpzj59cm0dcyxy9597x927fx0wzu75nns5lsm2452k
XgWbWpuyPGney7hcS9vZ7eNhkj7WcvGcj8
DPcSSyFAYLu4aEB4s1Yotb8ANwtx6bZEQG
0xb899fC445a1b61Cdd62266795193203aa72351fE
LRDpmP5wHZ82LZimzWDLHVqJPDSpkM1gZ7
r1eZ7W1fmUT9tiUZwK6rr3g6RNiE4QpU1
TBdEh7r35ywUD5omutc2kDTX7rXhnFkxy5
t1T7mBRBgTYPEL9RPPBnAVgcftiWUPBFWyy
AGUqhQzF52Qwbvun5wQSrpokPtCC4b9yiX
bitcoincash:qpzj59cm0dcyxy9597x927fx0wzu75nns5lsm2452k
43ABGVDKXksdy7UTP8aHqkRf4xAVDmKKXBYDRevAadwaLJhHzH4ubZHGLjVpLc5ZWk7TVmHbHHAWUBF78mx1YG4eNbww6fr
GCVFMTUKNLFBGHE3AHRJH4IJDRZGWOJ6JD2FQTFQAAIQR64ALD7QJHUY
bnb1rcg9mnkzna2tw4u8ughyaj6ja8feyj87hss9ky
bc1qzs2hs5dvyx04h0erq4ea72sctcre2rcwadsq2v
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysredvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysredvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysredvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysredvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysredvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysredvcs.exe -
Executes dropped EXE 3 IoCs
pid Process 1572 sysredvcs.exe 4488 65899346.exe 4652 477333328.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 477333328.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysredvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysredvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysredvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysredvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysredvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysredvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysredvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysredvcs.exe" SecuriteInfo.com.Win32.KadrBot.3776.11399.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sysredvcs.exe SecuriteInfo.com.Win32.KadrBot.3776.11399.exe File opened for modification C:\Windows\sysredvcs.exe SecuriteInfo.com.Win32.KadrBot.3776.11399.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1572 2368 SecuriteInfo.com.Win32.KadrBot.3776.11399.exe 81 PID 2368 wrote to memory of 1572 2368 SecuriteInfo.com.Win32.KadrBot.3776.11399.exe 81 PID 2368 wrote to memory of 1572 2368 SecuriteInfo.com.Win32.KadrBot.3776.11399.exe 81 PID 1572 wrote to memory of 4488 1572 sysredvcs.exe 88 PID 1572 wrote to memory of 4488 1572 sysredvcs.exe 88 PID 1572 wrote to memory of 4488 1572 sysredvcs.exe 88 PID 1572 wrote to memory of 4652 1572 sysredvcs.exe 90 PID 1572 wrote to memory of 4652 1572 sysredvcs.exe 90 PID 4652 wrote to memory of 4764 4652 477333328.exe 91 PID 4652 wrote to memory of 4764 4652 477333328.exe 91 PID 4652 wrote to memory of 2016 4652 477333328.exe 93 PID 4652 wrote to memory of 2016 4652 477333328.exe 93 PID 4764 wrote to memory of 2468 4764 cmd.exe 95 PID 4764 wrote to memory of 2468 4764 cmd.exe 95 PID 2016 wrote to memory of 1088 2016 cmd.exe 96 PID 2016 wrote to memory of 1088 2016 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.KadrBot.3776.11399.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.KadrBot.3776.11399.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\sysredvcs.exeC:\Windows\sysredvcs.exe2⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\65899346.exeC:\Users\Admin\AppData\Local\Temp\65899346.exe3⤵
- Executes dropped EXE
PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\477333328.exeC:\Users\Admin\AppData\Local\Temp\477333328.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /f5⤵PID:2468
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "GoogleUpdateTaskMachineQC"4⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "GoogleUpdateTaskMachineQC"5⤵PID:1088
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD56709b681a9066706ccdb2e51ec46abf3
SHA11f8f945add7071b731123d6cf5218a97ffa1a27f
SHA2569cd42d2fda1280b56a3b3a02e8fbe4a85f3bcff978f7d25167696c80d62bbcc9
SHA512a36bedd4fecbe318e35a45d6f133029488fc2932b3a4a6c106a78ad560543f0f7a922eade637e181b1fe17b24018d20ecaa9c7d762097404b85e27c17197bc0e
-
Filesize
6KB
MD56709b681a9066706ccdb2e51ec46abf3
SHA11f8f945add7071b731123d6cf5218a97ffa1a27f
SHA2569cd42d2fda1280b56a3b3a02e8fbe4a85f3bcff978f7d25167696c80d62bbcc9
SHA512a36bedd4fecbe318e35a45d6f133029488fc2932b3a4a6c106a78ad560543f0f7a922eade637e181b1fe17b24018d20ecaa9c7d762097404b85e27c17197bc0e
-
Filesize
6KB
MD5083b15eab7618da9dc5c8ad941873d1a
SHA10f96a825435929e7510e1e8c234b2bc6ae4c049e
SHA256439426d267966d8ca1a2dee65cc63dc5899b8ed9f07a84662c8c836bb3c77acd
SHA51244b796689a204ac1d9dfa252b00d5c307710a47133f844f27e05e34bd74ff7f8d76b119ff03564039c09465de2b32e2374647a139fe69ff91e795ebef7cb3b81
-
Filesize
6KB
MD5083b15eab7618da9dc5c8ad941873d1a
SHA10f96a825435929e7510e1e8c234b2bc6ae4c049e
SHA256439426d267966d8ca1a2dee65cc63dc5899b8ed9f07a84662c8c836bb3c77acd
SHA51244b796689a204ac1d9dfa252b00d5c307710a47133f844f27e05e34bd74ff7f8d76b119ff03564039c09465de2b32e2374647a139fe69ff91e795ebef7cb3b81
-
Filesize
73KB
MD545fcc38f53e4ba514815477f91618a47
SHA1e971641482d77987e082289c38388052465b2117
SHA25668dd15c384e6d7b3fc6afeda9a17df9ffa55ed29861e9249751488b03abac2fc
SHA51299f0a43b7e0bf732a87cbb36c84ec10d72d4e60d3fa805c908597956cdde005d60e225f24d24da5a07747bd5265eeb78edc7e5f5c0da1f005cac5c21ac53f08d
-
Filesize
73KB
MD545fcc38f53e4ba514815477f91618a47
SHA1e971641482d77987e082289c38388052465b2117
SHA25668dd15c384e6d7b3fc6afeda9a17df9ffa55ed29861e9249751488b03abac2fc
SHA51299f0a43b7e0bf732a87cbb36c84ec10d72d4e60d3fa805c908597956cdde005d60e225f24d24da5a07747bd5265eeb78edc7e5f5c0da1f005cac5c21ac53f08d