Analysis

  • max time kernel
    121s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2023, 13:55

General

  • Target

    Kangaroo.exe

  • Size

    311KB

  • MD5

    dd75215aaa73ee8db3075dbcff4b5840

  • SHA1

    039ac9af2d590d787de45d9a650a1a08a304f847

  • SHA256

    96715e2703f139b4439b8321dcd1f5e28ac8370a9999b7ca9fe2c25a5927e210

  • SHA512

    eba9267297a457b440f988cd8123733e70aca7675cc22812bf69cdf6335f5ef72ccab9653086e6c1cd71936bae26e970133ba2eca260900b3bc8d75150ad479a

  • SSDEEP

    6144:SoWnKyjWo7gB8eOCJG3FGJljXdQprzvEXaAMw0YYaZB6gkipk3mmw0OKgg80OKgp:SoWKsWR8FCw3wjXdQpv6aAMpQZtxTSg/

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Kangaroo.exe
    "C:\Users\Admin\AppData\Local\Temp\Kangaroo.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2012
  • C:\Windows\system32\verclsid.exe
    "C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401
    1⤵
      PID:2672
    • C:\Users\Admin\AppData\Local\Temp\Kangaroo.exe
      "C:\Users\Admin\AppData\Local\Temp\Kangaroo.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1856

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1856-60-0x0000000000FC0000-0x0000000001014000-memory.dmp

            Filesize

            336KB

          • memory/1856-61-0x0000000004980000-0x00000000049C0000-memory.dmp

            Filesize

            256KB

          • memory/1856-62-0x0000000004980000-0x00000000049C0000-memory.dmp

            Filesize

            256KB

          • memory/1856-65-0x0000000004980000-0x00000000049C0000-memory.dmp

            Filesize

            256KB

          • memory/2012-54-0x0000000000900000-0x0000000000954000-memory.dmp

            Filesize

            336KB

          • memory/2012-55-0x0000000004910000-0x0000000004950000-memory.dmp

            Filesize

            256KB

          • memory/2012-56-0x0000000004910000-0x0000000004950000-memory.dmp

            Filesize

            256KB

          • memory/2012-57-0x0000000004910000-0x0000000004950000-memory.dmp

            Filesize

            256KB

          • memory/2012-58-0x0000000004910000-0x0000000004950000-memory.dmp

            Filesize

            256KB