Analysis
-
max time kernel
169s -
max time network
177s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 07:05
Static task
static1
Behavioral task
behavioral1
Sample
b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe
Resource
win10v2004-20220812-en
General
-
Target
b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe
-
Size
206KB
-
MD5
93b3355f8a310ff66e1eabb8d667bf5e
-
SHA1
8c49eac2cec29c09562c25e785cc84a329c35ec3
-
SHA256
b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b
-
SHA512
93894f975bcf9d9b0d7eb86299b749392eaeb58cb267f3dbb73f389cdc2d5309055f16d685a85b684cd974d431d0150684f8851c25251e846799b46f851a4af9
-
SSDEEP
6144:fy8hODiJ4hfV4uRxnwei8ej0EJfhs+5kKFVBfKKnso:fyhx4uR9JejNt+4VB1X
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas\command kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start\command kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\DefaultIcon\ = "%1" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open\command kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\kko.exe\" -a \"%1\" %*" kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\DefaultIcon kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\ = "Application" kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\Content Type = "application/x-msdownload" kko.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1488 kko.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 1488 kko.exe -
Loads dropped DLL 2 IoCs
pid Process 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" kko.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\ = "Application" kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\DefaultIcon\ = "%1" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\kko.exe\" -a \"%1\" %*" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\open\command kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\Content Type = "application/x-msdownload" kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\open kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\DefaultIcon kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas\command kko.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\ = "exefile" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\runas\command kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\DefaultIcon\ = "%1" kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\start kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" kko.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\DefaultIcon kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\runas kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start\command kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\Content Type = "application/x-msdownload" kko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\kko.exe\" -a \"%1\" %*" kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\start\command kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile kko.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open\command kko.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 1488 kko.exe 1488 kko.exe 1488 kko.exe 1488 kko.exe 1488 kko.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: 33 1852 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1852 AUDIODG.EXE Token: 33 1852 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1852 AUDIODG.EXE Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe Token: SeShutdownPrivilege 892 explorer.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 1488 kko.exe 892 explorer.exe 892 explorer.exe 1488 kko.exe 892 explorer.exe 892 explorer.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 1488 kko.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 960 wrote to memory of 1488 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 28 PID 960 wrote to memory of 1488 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 28 PID 960 wrote to memory of 1488 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 28 PID 960 wrote to memory of 1488 960 b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe"C:\Users\Admin\AppData\Local\Temp\b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\kko.exe"C:\Users\Admin\AppData\Local\kko.exe" -gav C:\Users\Admin\AppData\Local\Temp\b33aaff1b48e0ba4bb43a5f7ec87328bc9aa10789dbb011745f79b7224ab232b.exe2⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1488
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:892
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x58c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5e20a4af89c0f9348d4c39b88af2c0c0b
SHA171c2d672fad8d1c9bfa4fb9649ca91e645362be1
SHA25692540f58fc832a2aef41583d96d526e40ce1068101518dc22cd8b9a7494be050
SHA51271f9b22badc73c6852572e4ddefa9fd3a356abd74460a93dfad248ac63325c9ef9bfc16b19066f3f0da3600d43dd6b20675c52bbfd610a1f767020969d6f9b23
-
Filesize
206KB
MD5e20a4af89c0f9348d4c39b88af2c0c0b
SHA171c2d672fad8d1c9bfa4fb9649ca91e645362be1
SHA25692540f58fc832a2aef41583d96d526e40ce1068101518dc22cd8b9a7494be050
SHA51271f9b22badc73c6852572e4ddefa9fd3a356abd74460a93dfad248ac63325c9ef9bfc16b19066f3f0da3600d43dd6b20675c52bbfd610a1f767020969d6f9b23
-
Filesize
206KB
MD5e20a4af89c0f9348d4c39b88af2c0c0b
SHA171c2d672fad8d1c9bfa4fb9649ca91e645362be1
SHA25692540f58fc832a2aef41583d96d526e40ce1068101518dc22cd8b9a7494be050
SHA51271f9b22badc73c6852572e4ddefa9fd3a356abd74460a93dfad248ac63325c9ef9bfc16b19066f3f0da3600d43dd6b20675c52bbfd610a1f767020969d6f9b23
-
Filesize
206KB
MD5e20a4af89c0f9348d4c39b88af2c0c0b
SHA171c2d672fad8d1c9bfa4fb9649ca91e645362be1
SHA25692540f58fc832a2aef41583d96d526e40ce1068101518dc22cd8b9a7494be050
SHA51271f9b22badc73c6852572e4ddefa9fd3a356abd74460a93dfad248ac63325c9ef9bfc16b19066f3f0da3600d43dd6b20675c52bbfd610a1f767020969d6f9b23