Analysis
-
max time kernel
99s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 16:35
Static task
static1
Behavioral task
behavioral1
Sample
8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe
Resource
win10v2004-20221111-en
General
-
Target
8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe
-
Size
115KB
-
MD5
f92a5666ea36c16b839e87950e4d6ed9
-
SHA1
55c32079ec63bc4d1a9e8fd33ba829e463eab0b2
-
SHA256
8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c
-
SHA512
2ceecf7c1181c256c45d81db084a7a8b3c4d6b1c27c91acbd7495581c892ae167859d22b90f9b1db44e2da28f594ffab73678866d957a2f4bcb223e270c92c87
-
SSDEEP
3072:CtJlBQjQbrxBSvp7PBEYcORIOCBSqIEkCtQ:OJnQEqPBdXRWSNjX
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1400 cmd.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 468 rundll32.exe 468 rundll32.exe 468 rundll32.exe 468 rundll32.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\d9f2OTQl = "rundll32.exe C:\\6g4hZ0\\d9f2OTQl.dll,KieeBon" 8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\syotom = "C:\\Windows\\SysWOW64\\svchost.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 468 set thread context of 920 468 rundll32.exe svchost.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exerundll32.exedescription pid process target process PID 1276 wrote to memory of 468 1276 8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe rundll32.exe PID 1276 wrote to memory of 468 1276 8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe rundll32.exe PID 1276 wrote to memory of 468 1276 8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe rundll32.exe PID 1276 wrote to memory of 468 1276 8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe rundll32.exe PID 1276 wrote to memory of 468 1276 8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe rundll32.exe PID 1276 wrote to memory of 468 1276 8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe rundll32.exe PID 1276 wrote to memory of 468 1276 8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe rundll32.exe PID 1276 wrote to memory of 1400 1276 8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe cmd.exe PID 1276 wrote to memory of 1400 1276 8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe cmd.exe PID 1276 wrote to memory of 1400 1276 8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe cmd.exe PID 1276 wrote to memory of 1400 1276 8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe cmd.exe PID 468 wrote to memory of 920 468 rundll32.exe svchost.exe PID 468 wrote to memory of 920 468 rundll32.exe svchost.exe PID 468 wrote to memory of 920 468 rundll32.exe svchost.exe PID 468 wrote to memory of 920 468 rundll32.exe svchost.exe PID 468 wrote to memory of 920 468 rundll32.exe svchost.exe PID 468 wrote to memory of 920 468 rundll32.exe svchost.exe PID 468 wrote to memory of 920 468 rundll32.exe svchost.exe PID 468 wrote to memory of 920 468 rundll32.exe svchost.exe PID 468 wrote to memory of 920 468 rundll32.exe svchost.exe PID 468 wrote to memory of 920 468 rundll32.exe svchost.exe PID 468 wrote to memory of 920 468 rundll32.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe"C:\Users\Admin\AppData\Local\Temp\8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\6g4hZ0\d9f2OTQl.dll,KieeBon2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\8d2d3f159b35b648de8d1d1c83a1a0ece50cd2a00cf1063a8b4134b8bf3e342c.exe"2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\6g4hZ0\d9f2OTQl.dllFilesize
87KB
MD53ceaa0d25d7ed31a8f8d57a3356a8b5e
SHA1278c5c8f823d502958fd4ade03019a1206400765
SHA256fd5a974df24d838051588459974b6436bb3aef4d9b4fb9a2bdcf265c5e6c39b8
SHA51229e35eb2b04194d0500a0c4cfece5c55b24d37e38465a17e838b188637a97b5fbbc7dd1eeff7c56b5819c94376d6e569595dd16a2c10b056cffb7299b6f43519
-
\6g4hZ0\d9f2OTQl.dllFilesize
87KB
MD53ceaa0d25d7ed31a8f8d57a3356a8b5e
SHA1278c5c8f823d502958fd4ade03019a1206400765
SHA256fd5a974df24d838051588459974b6436bb3aef4d9b4fb9a2bdcf265c5e6c39b8
SHA51229e35eb2b04194d0500a0c4cfece5c55b24d37e38465a17e838b188637a97b5fbbc7dd1eeff7c56b5819c94376d6e569595dd16a2c10b056cffb7299b6f43519
-
\6g4hZ0\d9f2OTQl.dllFilesize
87KB
MD53ceaa0d25d7ed31a8f8d57a3356a8b5e
SHA1278c5c8f823d502958fd4ade03019a1206400765
SHA256fd5a974df24d838051588459974b6436bb3aef4d9b4fb9a2bdcf265c5e6c39b8
SHA51229e35eb2b04194d0500a0c4cfece5c55b24d37e38465a17e838b188637a97b5fbbc7dd1eeff7c56b5819c94376d6e569595dd16a2c10b056cffb7299b6f43519
-
\6g4hZ0\d9f2OTQl.dllFilesize
87KB
MD53ceaa0d25d7ed31a8f8d57a3356a8b5e
SHA1278c5c8f823d502958fd4ade03019a1206400765
SHA256fd5a974df24d838051588459974b6436bb3aef4d9b4fb9a2bdcf265c5e6c39b8
SHA51229e35eb2b04194d0500a0c4cfece5c55b24d37e38465a17e838b188637a97b5fbbc7dd1eeff7c56b5819c94376d6e569595dd16a2c10b056cffb7299b6f43519
-
\6g4hZ0\d9f2OTQl.dllFilesize
87KB
MD53ceaa0d25d7ed31a8f8d57a3356a8b5e
SHA1278c5c8f823d502958fd4ade03019a1206400765
SHA256fd5a974df24d838051588459974b6436bb3aef4d9b4fb9a2bdcf265c5e6c39b8
SHA51229e35eb2b04194d0500a0c4cfece5c55b24d37e38465a17e838b188637a97b5fbbc7dd1eeff7c56b5819c94376d6e569595dd16a2c10b056cffb7299b6f43519
-
memory/468-65-0x0000000010000000-0x0000000010048000-memory.dmpFilesize
288KB
-
memory/468-66-0x0000000000170000-0x0000000000173000-memory.dmpFilesize
12KB
-
memory/468-83-0x0000000010000000-0x0000000010048000-memory.dmpFilesize
288KB
-
memory/468-57-0x0000000000000000-mapping.dmp
-
memory/920-80-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/920-67-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/920-68-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/920-70-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/920-73-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/920-76-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/920-78-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/920-82-0x0000000000401000-mapping.dmp
-
memory/920-85-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1276-54-0x0000000074DE1000-0x0000000074DE3000-memory.dmpFilesize
8KB
-
memory/1276-55-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/1276-56-0x0000000000220000-0x0000000000223000-memory.dmpFilesize
12KB
-
memory/1400-64-0x0000000000000000-mapping.dmp