Analysis
-
max time kernel
135s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894.exe
Resource
win10v2004-20220812-en
General
-
Target
f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894.exe
-
Size
285KB
-
MD5
cbc709be817d9d090ca2490aad1f5e22
-
SHA1
e375484efb972dd801dbf48e82f49ea0deafea8d
-
SHA256
f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894
-
SHA512
0ad197b61eba3c49c0f3efbb04bbf0a8f2cb2080f5ec14477f12f5e1ef1dd7a3d27ce655f49ed5daa793879835a08834d1a6111e2e4f9b4aabc769677d860af4
-
SSDEEP
6144:K1tC/lxQEMOG/OIgcwKQgno63E2fMXh9x0C8jpUGKq:K6xwOGdwKJoOIhr89UGKq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 728 olkn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\101E19E8 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\olkn.exe" f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: olkn.exe File opened (read-only) \??\H: olkn.exe File opened (read-only) \??\L: olkn.exe File opened (read-only) \??\W: olkn.exe File opened (read-only) \??\X: olkn.exe File opened (read-only) \??\Y: olkn.exe File opened (read-only) \??\B: olkn.exe File opened (read-only) \??\J: olkn.exe File opened (read-only) \??\M: olkn.exe File opened (read-only) \??\P: olkn.exe File opened (read-only) \??\S: olkn.exe File opened (read-only) \??\T: olkn.exe File opened (read-only) \??\V: olkn.exe File opened (read-only) \??\G: olkn.exe File opened (read-only) \??\K: olkn.exe File opened (read-only) \??\N: olkn.exe File opened (read-only) \??\O: olkn.exe File opened (read-only) \??\U: olkn.exe File opened (read-only) \??\E: olkn.exe File opened (read-only) \??\F: olkn.exe File opened (read-only) \??\I: olkn.exe File opened (read-only) \??\Q: olkn.exe File opened (read-only) \??\R: olkn.exe File opened (read-only) \??\Z: olkn.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\D01E88A3 = "3879886737" olkn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894.exe"C:\Users\Admin\AppData\Local\Temp\f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894.exe"1⤵
- Adds Run key to start application
PID:1348
-
C:\Users\Admin\AppData\Local\Temp\olkn.exeC:\Users\Admin\AppData\Local\Temp\olkn.exe -svc1⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies Internet Explorer settings
PID:728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5cbc709be817d9d090ca2490aad1f5e22
SHA1e375484efb972dd801dbf48e82f49ea0deafea8d
SHA256f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894
SHA5120ad197b61eba3c49c0f3efbb04bbf0a8f2cb2080f5ec14477f12f5e1ef1dd7a3d27ce655f49ed5daa793879835a08834d1a6111e2e4f9b4aabc769677d860af4
-
Filesize
285KB
MD5cbc709be817d9d090ca2490aad1f5e22
SHA1e375484efb972dd801dbf48e82f49ea0deafea8d
SHA256f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894
SHA5120ad197b61eba3c49c0f3efbb04bbf0a8f2cb2080f5ec14477f12f5e1ef1dd7a3d27ce655f49ed5daa793879835a08834d1a6111e2e4f9b4aabc769677d860af4