Analysis
-
max time kernel
64s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:44
Static task
static1
Behavioral task
behavioral1
Sample
2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe
Resource
win10v2004-20220812-en
General
-
Target
2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe
-
Size
288KB
-
MD5
1638dd22504ecccdc3bf3e7eb4a84153
-
SHA1
cff318324ab08d0d0a74a2bed55f9be918093a42
-
SHA256
2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1
-
SHA512
75bb4c9332fdffc066604d4abc11e5635d7270f02b93b16c4cc4f2e85ed11852c5ab1abfffa482e033dd1e6392afb9f2bc41a59e7337b11309bd1587bf9b8b60
-
SSDEEP
3072:WTriyyAIBQBz3giJf17pDKvFbXRu6+HuPtLhn6RWryRlT4quNynx4kpc6Q9RQT/k:JpOzV1dWvVAh2hMWA7Jx4kpyH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
adsi.exeadsi.exepid process 1056 adsi.exe 1400 adsi.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1564 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exepid process 1216 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe 1216 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exeadsi.exedescription pid process target process PID 2044 set thread context of 1216 2044 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe PID 1056 set thread context of 1400 1056 adsi.exe adsi.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
adsi.exepid process 1400 adsi.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exedescription pid process Token: SeSecurityPrivilege 1216 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exeadsi.exepid process 2044 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe 1056 adsi.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exeadsi.exedescription pid process target process PID 2044 wrote to memory of 1216 2044 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe PID 2044 wrote to memory of 1216 2044 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe PID 2044 wrote to memory of 1216 2044 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe PID 2044 wrote to memory of 1216 2044 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe PID 2044 wrote to memory of 1216 2044 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe PID 2044 wrote to memory of 1216 2044 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe PID 2044 wrote to memory of 1216 2044 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe PID 2044 wrote to memory of 1216 2044 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe PID 2044 wrote to memory of 1216 2044 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe PID 1216 wrote to memory of 1056 1216 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe adsi.exe PID 1216 wrote to memory of 1056 1216 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe adsi.exe PID 1216 wrote to memory of 1056 1216 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe adsi.exe PID 1216 wrote to memory of 1056 1216 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe adsi.exe PID 1056 wrote to memory of 1400 1056 adsi.exe adsi.exe PID 1056 wrote to memory of 1400 1056 adsi.exe adsi.exe PID 1056 wrote to memory of 1400 1056 adsi.exe adsi.exe PID 1056 wrote to memory of 1400 1056 adsi.exe adsi.exe PID 1056 wrote to memory of 1400 1056 adsi.exe adsi.exe PID 1056 wrote to memory of 1400 1056 adsi.exe adsi.exe PID 1056 wrote to memory of 1400 1056 adsi.exe adsi.exe PID 1056 wrote to memory of 1400 1056 adsi.exe adsi.exe PID 1056 wrote to memory of 1400 1056 adsi.exe adsi.exe PID 1216 wrote to memory of 1564 1216 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe cmd.exe PID 1216 wrote to memory of 1564 1216 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe cmd.exe PID 1216 wrote to memory of 1564 1216 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe cmd.exe PID 1216 wrote to memory of 1564 1216 2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe"C:\Users\Admin\AppData\Local\Temp\2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe"C:\Users\Admin\AppData\Local\Temp\2c8e6d117dda931dc334f92cc2580c7022097c5c994ce1ea193e2ce27ba47db1.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Roaming\Kikawu\adsi.exe"C:\Users\Admin\AppData\Roaming\Kikawu\adsi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Roaming\Kikawu\adsi.exe"C:\Users\Admin\AppData\Roaming\Kikawu\adsi.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp67b28980.bat"3⤵
- Deletes itself
PID:1564
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD56ba91c1d4dabf1d221b69c3fc126d998
SHA1ff471c71c654f63764da4a60437720d5f8954e84
SHA2561b2f0b5c031b0b04c93dc489f33321eb8ae2719f327ad923ae0b78495826c395
SHA5122c65d8721c79fb8ee626f339326753007f4d3938b5efbdf9a76dfa467631cb129c6758193c32cc7a2b89e725cec207f5febcaadd3dff16827ee2baac020f989c
-
Filesize
288KB
MD5e30a6568c3b742af00086a70139e4943
SHA14c005a183def616c834b8397581df4c0dedb15c1
SHA2561491cc24fcf5ce5b3a358824ff8411bb28aab1bd18bbbb571f7dc44ee507efec
SHA512dbcea9b8bd3515f9abcb7f012fa3d1f1ddc514364d39b7ca05350316c4a6b033f1c160644223bd327fea618c82371d506c7e3da00de90398472590791b04fead
-
Filesize
288KB
MD5e30a6568c3b742af00086a70139e4943
SHA14c005a183def616c834b8397581df4c0dedb15c1
SHA2561491cc24fcf5ce5b3a358824ff8411bb28aab1bd18bbbb571f7dc44ee507efec
SHA512dbcea9b8bd3515f9abcb7f012fa3d1f1ddc514364d39b7ca05350316c4a6b033f1c160644223bd327fea618c82371d506c7e3da00de90398472590791b04fead
-
Filesize
288KB
MD5e30a6568c3b742af00086a70139e4943
SHA14c005a183def616c834b8397581df4c0dedb15c1
SHA2561491cc24fcf5ce5b3a358824ff8411bb28aab1bd18bbbb571f7dc44ee507efec
SHA512dbcea9b8bd3515f9abcb7f012fa3d1f1ddc514364d39b7ca05350316c4a6b033f1c160644223bd327fea618c82371d506c7e3da00de90398472590791b04fead
-
Filesize
288KB
MD5e30a6568c3b742af00086a70139e4943
SHA14c005a183def616c834b8397581df4c0dedb15c1
SHA2561491cc24fcf5ce5b3a358824ff8411bb28aab1bd18bbbb571f7dc44ee507efec
SHA512dbcea9b8bd3515f9abcb7f012fa3d1f1ddc514364d39b7ca05350316c4a6b033f1c160644223bd327fea618c82371d506c7e3da00de90398472590791b04fead
-
Filesize
288KB
MD5e30a6568c3b742af00086a70139e4943
SHA14c005a183def616c834b8397581df4c0dedb15c1
SHA2561491cc24fcf5ce5b3a358824ff8411bb28aab1bd18bbbb571f7dc44ee507efec
SHA512dbcea9b8bd3515f9abcb7f012fa3d1f1ddc514364d39b7ca05350316c4a6b033f1c160644223bd327fea618c82371d506c7e3da00de90398472590791b04fead