Analysis

  • max time kernel
    169s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 07:05

General

  • Target

    b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe

  • Size

    206KB

  • MD5

    93b3355f8a310ff66e1eabb8d667bf5e

  • SHA1

    8c49eac2cec29c09562c25e785cc84a329c35ec3

  • SHA256

    b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b

  • SHA512

    93894f975bcf9d9b0d7eb86299b749392eaeb58cb267f3dbb73f389cdc2d5309055f16d685a85b684cd974d431d0150684f8851c25251e846799b46f851a4af9

  • SSDEEP

    6144:fy8hODiJ4hfV4uRxnwei8ej0EJfhs+5kKFVBfKKnso:fyhx4uR9JejNt+4VB1X

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 17 IoCs
  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry class 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe
    "C:\Users\Admin\AppData\Local\Temp\b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Users\Admin\AppData\Local\kko.exe
      "C:\Users\Admin\AppData\Local\kko.exe" -gav C:\Users\Admin\AppData\Local\Temp\b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Deletes itself
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1488
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:892
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x58c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\kko.exe

    Filesize

    206KB

    MD5

    e20a4af89c0f9348d4c39b88af2c0c0b

    SHA1

    71c2d672fad8d1c9bfa4fb9649ca91e645362be1

    SHA256

    92540f58fc832a2aef41583d96d526e40ce1068101518dc22cd8b9a7494be050

    SHA512

    71f9b22badc73c6852572e4ddefa9fd3a356abd74460a93dfad248ac63325c9ef9bfc16b19066f3f0da3600d43dd6b20675c52bbfd610a1f767020969d6f9b23

  • C:\Users\Admin\AppData\Local\kko.exe

    Filesize

    206KB

    MD5

    e20a4af89c0f9348d4c39b88af2c0c0b

    SHA1

    71c2d672fad8d1c9bfa4fb9649ca91e645362be1

    SHA256

    92540f58fc832a2aef41583d96d526e40ce1068101518dc22cd8b9a7494be050

    SHA512

    71f9b22badc73c6852572e4ddefa9fd3a356abd74460a93dfad248ac63325c9ef9bfc16b19066f3f0da3600d43dd6b20675c52bbfd610a1f767020969d6f9b23

  • \Users\Admin\AppData\Local\kko.exe

    Filesize

    206KB

    MD5

    e20a4af89c0f9348d4c39b88af2c0c0b

    SHA1

    71c2d672fad8d1c9bfa4fb9649ca91e645362be1

    SHA256

    92540f58fc832a2aef41583d96d526e40ce1068101518dc22cd8b9a7494be050

    SHA512

    71f9b22badc73c6852572e4ddefa9fd3a356abd74460a93dfad248ac63325c9ef9bfc16b19066f3f0da3600d43dd6b20675c52bbfd610a1f767020969d6f9b23

  • \Users\Admin\AppData\Local\kko.exe

    Filesize

    206KB

    MD5

    e20a4af89c0f9348d4c39b88af2c0c0b

    SHA1

    71c2d672fad8d1c9bfa4fb9649ca91e645362be1

    SHA256

    92540f58fc832a2aef41583d96d526e40ce1068101518dc22cd8b9a7494be050

    SHA512

    71f9b22badc73c6852572e4ddefa9fd3a356abd74460a93dfad248ac63325c9ef9bfc16b19066f3f0da3600d43dd6b20675c52bbfd610a1f767020969d6f9b23

  • memory/892-67-0x000007FEFBCE1000-0x000007FEFBCE3000-memory.dmp

    Filesize

    8KB

  • memory/960-57-0x0000000000270000-0x0000000000275000-memory.dmp

    Filesize

    20KB

  • memory/960-58-0x0000000002060000-0x0000000002317000-memory.dmp

    Filesize

    2.7MB

  • memory/960-54-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/960-56-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/960-63-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/960-55-0x0000000075351000-0x0000000075353000-memory.dmp

    Filesize

    8KB

  • memory/1488-61-0x0000000000000000-mapping.dmp

  • memory/1488-69-0x0000000000270000-0x0000000000275000-memory.dmp

    Filesize

    20KB

  • memory/1488-68-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-70-0x00000000746D1000-0x00000000746D3000-memory.dmp

    Filesize

    8KB