Analysis
-
max time kernel
170s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:04
Static task
static1
Behavioral task
behavioral1
Sample
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe
Resource
win10v2004-20220812-en
General
-
Target
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe
-
Size
196KB
-
MD5
3757d67d6b352bdabdd7359b3d21ed23
-
SHA1
d466234cc88ffc0a8fd661a6a78212f41e157997
-
SHA256
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b
-
SHA512
f8d9241f2e11f3c13f43507bcdcb566122c00d860431d9e089fd51c0fe9aee11111ebdebcfe9b8cd244b813c483fc20670c4c44016044c143a8db761c02bf5b7
-
SSDEEP
6144:+kb4K16oTJWvfU4+bOl8femcK/fObT/bGimszUf7Wqy:51AoTMvs4+bOlNK/fObT/bGipE78
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
kiiga.exe9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kiiga.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe -
Executes dropped EXE 1 IoCs
Processes:
kiiga.exepid process 1020 kiiga.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe -
Adds Run key to start application 2 TTPs 53 IoCs
Processes:
kiiga.exe9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /R" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /q" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /H" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /a" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /o" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /I" kiiga.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /B" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /h" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /d" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /O" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /n" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /o" 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /c" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /k" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /M" kiiga.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /Y" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /p" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /x" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /r" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /V" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /W" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /N" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /i" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /G" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /s" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /L" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /b" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /e" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /v" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /T" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /Q" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /E" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /Z" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /t" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /J" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /j" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /u" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /K" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /g" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /C" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /l" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /X" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /D" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /A" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /m" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /U" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /P" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /w" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /f" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /S" kiiga.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiiga = "C:\\Users\\Admin\\kiiga.exe /z" kiiga.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exekiiga.exepid process 3392 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe 3392 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe 1020 kiiga.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exekiiga.exepid process 3392 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe 1020 kiiga.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exedescription pid process target process PID 3392 wrote to memory of 1020 3392 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe kiiga.exe PID 3392 wrote to memory of 1020 3392 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe kiiga.exe PID 3392 wrote to memory of 1020 3392 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe kiiga.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe"C:\Users\Admin\AppData\Local\Temp\9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\kiiga.exe"C:\Users\Admin\kiiga.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5e17ba7069ed1b0228b1b943d38176da3
SHA1d4323952f4bf2a3a818f9fa4a038c368e84537c6
SHA2561add5afe2373ab0f82094ad3b530ff297953eae89175e94ea5da5b5e5289a616
SHA512807400353d494fe59eb30362c998527d24a837fdf3280bbaa621a75a4222da2b47bf941d6541f724923b06fa7abc77dfeeba7df5de34512bdc71a9ce101fe789
-
Filesize
196KB
MD5e17ba7069ed1b0228b1b943d38176da3
SHA1d4323952f4bf2a3a818f9fa4a038c368e84537c6
SHA2561add5afe2373ab0f82094ad3b530ff297953eae89175e94ea5da5b5e5289a616
SHA512807400353d494fe59eb30362c998527d24a837fdf3280bbaa621a75a4222da2b47bf941d6541f724923b06fa7abc77dfeeba7df5de34512bdc71a9ce101fe789