Analysis
-
max time kernel
151s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:19
Static task
static1
Behavioral task
behavioral1
Sample
128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe
Resource
win10v2004-20221111-en
General
-
Target
128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe
-
Size
200KB
-
MD5
171309d0b1e8485725d1cd60c0d115d0
-
SHA1
19cdb5aa195be013205755ff6b8d620a41d31cf9
-
SHA256
128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304
-
SHA512
8722f7529cb5ecdc764d1d7e11af17c39de63108588ac76fc1ad383e913aa632a781a886d3b99f956720c0ee3ecf624756164e268b75166ac6a071d3fad7f371
-
SSDEEP
3072:mP9S1kZ8jprujIivwslnsn9+JuJbfoL2wVHTZhQTWVyc+LpfJQlKTQC4wq:i9SOvwslnsn9+JuJbfoL2wVH9eI+NJWB
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exekaece.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kaece.exe -
Executes dropped EXE 1 IoCs
Processes:
kaece.exepid process 984 kaece.exe -
Loads dropped DLL 2 IoCs
Processes:
128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exepid process 1720 128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe 1720 128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe -
Adds Run key to start application 2 TTPs 54 IoCs
Processes:
kaece.exe128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /P" kaece.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /g" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /M" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /V" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /a" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /h" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /T" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /v" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /X" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /l" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /o" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /W" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /C" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /S" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /F" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /H" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /r" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /q" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /i" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /z" kaece.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /B" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /K" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /j" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /n" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /G" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /E" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /k" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /s" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /m" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /Q" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /J" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /u" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /I" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /w" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /L" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /D" 128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /d" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /A" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /e" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /D" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /c" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /Y" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /b" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /U" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /R" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /O" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /f" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /Z" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /x" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /p" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /N" kaece.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaece = "C:\\Users\\Admin\\kaece.exe /t" kaece.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exekaece.exepid process 1720 128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe 984 kaece.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exekaece.exepid process 1720 128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe 984 kaece.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exedescription pid process target process PID 1720 wrote to memory of 984 1720 128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe kaece.exe PID 1720 wrote to memory of 984 1720 128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe kaece.exe PID 1720 wrote to memory of 984 1720 128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe kaece.exe PID 1720 wrote to memory of 984 1720 128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe kaece.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe"C:\Users\Admin\AppData\Local\Temp\128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\kaece.exe"C:\Users\Admin\kaece.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5d297ad42525d97d7ab98d680025ef773
SHA1eb08c065fa4d0080b6c967b43b07c58aa91626e2
SHA2567bb64bb8abb59edddaa63db0698d6e9f6711188015e69181ae6f0a1847baa35e
SHA512dc1260a1b8da3d7e3ea6689b0c9bf4ab94aba9e5eb5e8a41c1f112f63cb7a48606f0e6c4dc0e63dd16d687c2bcec988b36c1fdcc714cfe61fa196b8ae3a10f50
-
Filesize
200KB
MD5d297ad42525d97d7ab98d680025ef773
SHA1eb08c065fa4d0080b6c967b43b07c58aa91626e2
SHA2567bb64bb8abb59edddaa63db0698d6e9f6711188015e69181ae6f0a1847baa35e
SHA512dc1260a1b8da3d7e3ea6689b0c9bf4ab94aba9e5eb5e8a41c1f112f63cb7a48606f0e6c4dc0e63dd16d687c2bcec988b36c1fdcc714cfe61fa196b8ae3a10f50
-
Filesize
200KB
MD5d297ad42525d97d7ab98d680025ef773
SHA1eb08c065fa4d0080b6c967b43b07c58aa91626e2
SHA2567bb64bb8abb59edddaa63db0698d6e9f6711188015e69181ae6f0a1847baa35e
SHA512dc1260a1b8da3d7e3ea6689b0c9bf4ab94aba9e5eb5e8a41c1f112f63cb7a48606f0e6c4dc0e63dd16d687c2bcec988b36c1fdcc714cfe61fa196b8ae3a10f50
-
Filesize
200KB
MD5d297ad42525d97d7ab98d680025ef773
SHA1eb08c065fa4d0080b6c967b43b07c58aa91626e2
SHA2567bb64bb8abb59edddaa63db0698d6e9f6711188015e69181ae6f0a1847baa35e
SHA512dc1260a1b8da3d7e3ea6689b0c9bf4ab94aba9e5eb5e8a41c1f112f63cb7a48606f0e6c4dc0e63dd16d687c2bcec988b36c1fdcc714cfe61fa196b8ae3a10f50