Analysis
-
max time kernel
149s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe
Resource
win10v2004-20221111-en
General
-
Target
5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe
-
Size
452KB
-
MD5
a7199d2ff40258ac7427ce9b513fe3fe
-
SHA1
a9eecc7ad31d4d57cb6ff57b1588f18e4830bcc2
-
SHA256
5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e
-
SHA512
26a5d17a002f5c4b5c6019d29d4c45516a204df86f2c9d1f5495219ab6baacd77643075915a839053058cbbd3ed547c43cd9228698e31975536144e0da4df8ae
-
SSDEEP
12288:rj93DcSMTXXAi7bCqoEozFGPCUo0G9o5/AWZn+j:9TXri7bNoFzwPCUor9KVEj
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 320 bcdedit.exe 664 bcdedit.exe 568 bcdedit.exe 1320 bcdedit.exe 888 bcdedit.exe 1864 bcdedit.exe 1420 bcdedit.exe 1416 bcdedit.exe 608 bcdedit.exe 292 bcdedit.exe -
Drops file in Drivers directory 1 IoCs
Processes:
koti.exedescription ioc process File created C:\Windows\system32\drivers\6d44ed.sys koti.exe -
Executes dropped EXE 1 IoCs
Processes:
koti.exepid process 620 koti.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1668 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exepid process 1636 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe 1636 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
koti.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Koti = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Ohijru\\koti.exe" koti.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run koti.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exedescription pid process target process PID 1636 set thread context of 1668 1636 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe cmd.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
koti.exe5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier koti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exekoti.exepid process 1636 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe 620 koti.exe 620 koti.exe 620 koti.exe 620 koti.exe 620 koti.exe 620 koti.exe 620 koti.exe 620 koti.exe 620 koti.exe 620 koti.exe 620 koti.exe 620 koti.exe 620 koti.exe 620 koti.exe 620 koti.exe 620 koti.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 468 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
koti.exedescription pid process Token: SeShutdownPrivilege 620 koti.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exekoti.exedescription pid process target process PID 1636 wrote to memory of 620 1636 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe koti.exe PID 1636 wrote to memory of 620 1636 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe koti.exe PID 1636 wrote to memory of 620 1636 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe koti.exe PID 1636 wrote to memory of 620 1636 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe koti.exe PID 620 wrote to memory of 320 620 koti.exe bcdedit.exe PID 620 wrote to memory of 320 620 koti.exe bcdedit.exe PID 620 wrote to memory of 320 620 koti.exe bcdedit.exe PID 620 wrote to memory of 320 620 koti.exe bcdedit.exe PID 620 wrote to memory of 664 620 koti.exe bcdedit.exe PID 620 wrote to memory of 664 620 koti.exe bcdedit.exe PID 620 wrote to memory of 664 620 koti.exe bcdedit.exe PID 620 wrote to memory of 664 620 koti.exe bcdedit.exe PID 620 wrote to memory of 568 620 koti.exe bcdedit.exe PID 620 wrote to memory of 568 620 koti.exe bcdedit.exe PID 620 wrote to memory of 568 620 koti.exe bcdedit.exe PID 620 wrote to memory of 568 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1320 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1320 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1320 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1320 620 koti.exe bcdedit.exe PID 620 wrote to memory of 888 620 koti.exe bcdedit.exe PID 620 wrote to memory of 888 620 koti.exe bcdedit.exe PID 620 wrote to memory of 888 620 koti.exe bcdedit.exe PID 620 wrote to memory of 888 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1864 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1864 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1864 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1864 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1420 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1420 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1420 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1420 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1416 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1416 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1416 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1416 620 koti.exe bcdedit.exe PID 620 wrote to memory of 292 620 koti.exe bcdedit.exe PID 620 wrote to memory of 292 620 koti.exe bcdedit.exe PID 620 wrote to memory of 292 620 koti.exe bcdedit.exe PID 620 wrote to memory of 292 620 koti.exe bcdedit.exe PID 620 wrote to memory of 608 620 koti.exe bcdedit.exe PID 620 wrote to memory of 608 620 koti.exe bcdedit.exe PID 620 wrote to memory of 608 620 koti.exe bcdedit.exe PID 620 wrote to memory of 608 620 koti.exe bcdedit.exe PID 620 wrote to memory of 1120 620 koti.exe taskhost.exe PID 620 wrote to memory of 1120 620 koti.exe taskhost.exe PID 620 wrote to memory of 1120 620 koti.exe taskhost.exe PID 620 wrote to memory of 1120 620 koti.exe taskhost.exe PID 620 wrote to memory of 1120 620 koti.exe taskhost.exe PID 620 wrote to memory of 1200 620 koti.exe Dwm.exe PID 620 wrote to memory of 1200 620 koti.exe Dwm.exe PID 620 wrote to memory of 1200 620 koti.exe Dwm.exe PID 620 wrote to memory of 1200 620 koti.exe Dwm.exe PID 620 wrote to memory of 1200 620 koti.exe Dwm.exe PID 620 wrote to memory of 1244 620 koti.exe Explorer.EXE PID 620 wrote to memory of 1244 620 koti.exe Explorer.EXE PID 620 wrote to memory of 1244 620 koti.exe Explorer.EXE PID 620 wrote to memory of 1244 620 koti.exe Explorer.EXE PID 620 wrote to memory of 1244 620 koti.exe Explorer.EXE PID 620 wrote to memory of 1636 620 koti.exe 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe PID 620 wrote to memory of 1636 620 koti.exe 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe PID 620 wrote to memory of 1636 620 koti.exe 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe PID 620 wrote to memory of 1636 620 koti.exe 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe PID 620 wrote to memory of 1636 620 koti.exe 5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1200
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe"C:\Users\Admin\AppData\Local\Temp\5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\Ohijru\koti.exe"C:\Users\Admin\AppData\Local\Temp\Ohijru\koti.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:320 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:664 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:568 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1320 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:888 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1864 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1420 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1416 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:608 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QOT771F.bat"3⤵
- Deletes itself
PID:1668
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1626924549-421475575-1299951291-2765498671666563903-1687036756-16512369821857716997"1⤵PID:1732
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1948
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
452KB
MD519fb06e3c09563f1293d8afc87e9ae54
SHA16da3550f0ff28d3e4c069cf63837dda324c1ca2f
SHA2563c16dc649ffd12bb7a1c40ca8e8be5d6407a2eb52fddd212bd46f24a830fbbfb
SHA5128f197610a6886987354f30f7279a995c536dff961649daa3df42e0267fd2a99aae74588eb296a929d9ce30d4073a063bb719bff8decf633d480b60b053aa9eb6
-
Filesize
452KB
MD519fb06e3c09563f1293d8afc87e9ae54
SHA16da3550f0ff28d3e4c069cf63837dda324c1ca2f
SHA2563c16dc649ffd12bb7a1c40ca8e8be5d6407a2eb52fddd212bd46f24a830fbbfb
SHA5128f197610a6886987354f30f7279a995c536dff961649daa3df42e0267fd2a99aae74588eb296a929d9ce30d4073a063bb719bff8decf633d480b60b053aa9eb6
-
Filesize
280B
MD5fcc788819614660fd1c4277c0e0458a8
SHA134daeef7f35deb374c88ab99f46bd7f6a082997a
SHA25624d66544138baddce4b8cf8d368efa985badba3c6be28c538d90df7fa8cb6efe
SHA512df789cb51683608f6c39a06cf05145a5bd2ddf9b35d2ae484f6455b490639137f9a5d077a482668ceeb2a86aac5a1d8261d64f55fc262d53d0d2319d3667777e
-
Filesize
452KB
MD519fb06e3c09563f1293d8afc87e9ae54
SHA16da3550f0ff28d3e4c069cf63837dda324c1ca2f
SHA2563c16dc649ffd12bb7a1c40ca8e8be5d6407a2eb52fddd212bd46f24a830fbbfb
SHA5128f197610a6886987354f30f7279a995c536dff961649daa3df42e0267fd2a99aae74588eb296a929d9ce30d4073a063bb719bff8decf633d480b60b053aa9eb6
-
Filesize
452KB
MD519fb06e3c09563f1293d8afc87e9ae54
SHA16da3550f0ff28d3e4c069cf63837dda324c1ca2f
SHA2563c16dc649ffd12bb7a1c40ca8e8be5d6407a2eb52fddd212bd46f24a830fbbfb
SHA5128f197610a6886987354f30f7279a995c536dff961649daa3df42e0267fd2a99aae74588eb296a929d9ce30d4073a063bb719bff8decf633d480b60b053aa9eb6