Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f.exe
Resource
win10v2004-20220812-en
General
-
Target
145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f.exe
-
Size
448KB
-
MD5
86940503acac72c15d8c6239df0c812e
-
SHA1
c025e25dbba9bf38d3beec1c8e30beed904f6b37
-
SHA256
145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f
-
SHA512
421ed4ba14ce2aef5ad114132b6d9f083c651bb78b38d0efca55cf991d1f4dfc712158909408b9c5c2ce8ebb9f89286c88405c4ae0247a2ccc25612782f25ff2
-
SSDEEP
12288:V4x37B0pGufmL5MZZWyan1sVsz/YM5m+J6t5tz:2x37mLmLOLWtn1r5hEtD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1640 knopdrcn.exe -
Deletes itself 1 IoCs
pid Process 2040 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 2040 cmd.exe 2040 cmd.exe 1640 knopdrcn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 1236 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 268 PING.EXE -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1236 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe 1640 knopdrcn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1760 145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f.exe 1640 knopdrcn.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2040 1760 145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f.exe 27 PID 1760 wrote to memory of 2040 1760 145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f.exe 27 PID 1760 wrote to memory of 2040 1760 145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f.exe 27 PID 1760 wrote to memory of 2040 1760 145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f.exe 27 PID 2040 wrote to memory of 1236 2040 cmd.exe 29 PID 2040 wrote to memory of 1236 2040 cmd.exe 29 PID 2040 wrote to memory of 1236 2040 cmd.exe 29 PID 2040 wrote to memory of 1236 2040 cmd.exe 29 PID 2040 wrote to memory of 268 2040 cmd.exe 31 PID 2040 wrote to memory of 268 2040 cmd.exe 31 PID 2040 wrote to memory of 268 2040 cmd.exe 31 PID 2040 wrote to memory of 268 2040 cmd.exe 31 PID 2040 wrote to memory of 1640 2040 cmd.exe 32 PID 2040 wrote to memory of 1640 2040 cmd.exe 32 PID 2040 wrote to memory of 1640 2040 cmd.exe 32 PID 2040 wrote to memory of 1640 2040 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f.exe"C:\Users\Admin\AppData\Local\Temp\145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 1760 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f.exe" & start C:\Users\Admin\AppData\Local\knopdrcn.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 17603⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:268
-
-
C:\Users\Admin\AppData\Local\knopdrcn.exeC:\Users\Admin\AppData\Local\knopdrcn.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD586940503acac72c15d8c6239df0c812e
SHA1c025e25dbba9bf38d3beec1c8e30beed904f6b37
SHA256145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f
SHA512421ed4ba14ce2aef5ad114132b6d9f083c651bb78b38d0efca55cf991d1f4dfc712158909408b9c5c2ce8ebb9f89286c88405c4ae0247a2ccc25612782f25ff2
-
Filesize
448KB
MD586940503acac72c15d8c6239df0c812e
SHA1c025e25dbba9bf38d3beec1c8e30beed904f6b37
SHA256145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f
SHA512421ed4ba14ce2aef5ad114132b6d9f083c651bb78b38d0efca55cf991d1f4dfc712158909408b9c5c2ce8ebb9f89286c88405c4ae0247a2ccc25612782f25ff2
-
Filesize
448KB
MD586940503acac72c15d8c6239df0c812e
SHA1c025e25dbba9bf38d3beec1c8e30beed904f6b37
SHA256145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f
SHA512421ed4ba14ce2aef5ad114132b6d9f083c651bb78b38d0efca55cf991d1f4dfc712158909408b9c5c2ce8ebb9f89286c88405c4ae0247a2ccc25612782f25ff2
-
Filesize
448KB
MD586940503acac72c15d8c6239df0c812e
SHA1c025e25dbba9bf38d3beec1c8e30beed904f6b37
SHA256145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f
SHA512421ed4ba14ce2aef5ad114132b6d9f083c651bb78b38d0efca55cf991d1f4dfc712158909408b9c5c2ce8ebb9f89286c88405c4ae0247a2ccc25612782f25ff2
-
Filesize
448KB
MD586940503acac72c15d8c6239df0c812e
SHA1c025e25dbba9bf38d3beec1c8e30beed904f6b37
SHA256145631fadfc4a90fe9aa4b84e2afd967915115ba348bc1153fe224db5873194f
SHA512421ed4ba14ce2aef5ad114132b6d9f083c651bb78b38d0efca55cf991d1f4dfc712158909408b9c5c2ce8ebb9f89286c88405c4ae0247a2ccc25612782f25ff2