Analysis

  • max time kernel
    164s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 20:37

General

  • Target

    kos1.exe

  • Size

    1.4MB

  • MD5

    85b698363e74ba3c08fc16297ddc284e

  • SHA1

    171cfea4a82a7365b241f16aebdb2aad29f4f7c0

  • SHA256

    78efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe

  • SHA512

    7e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796

  • SSDEEP

    24576:uS7LJeESj3RxrDKaWrnuzzBv7oV2Ev20sYoh9nhhM/vacAVoZFjo:T7LJqjr/KaWrn4Ev20m9h8ZF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\kos1.exe
    "C:\Users\Admin\AppData\Local\Temp\kos1.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Users\Admin\AppData\Local\Temp\set16.exe
      "C:\Users\Admin\AppData\Local\Temp\set16.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4944
      • C:\Users\Admin\AppData\Local\Temp\is-FKDMD.tmp\is-HBQU5.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-FKDMD.tmp\is-HBQU5.tmp" /SL4 $90216 "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1232936 52224
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 8
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4624
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 8
            5⤵
              PID:3432
          • C:\Program Files (x86)\PA Previewer\previewer.exe
            "C:\Program Files (x86)\PA Previewer\previewer.exe" -i
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2764
          • C:\Program Files (x86)\PA Previewer\previewer.exe
            "C:\Program Files (x86)\PA Previewer\previewer.exe" -s
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3776
      • C:\Users\Admin\AppData\Local\Temp\kos.exe
        "C:\Users\Admin\AppData\Local\Temp\kos.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1208

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\PA Previewer\previewer.exe

            Filesize

            1.9MB

            MD5

            27b85a95804a760da4dbee7ca800c9b4

            SHA1

            f03136226bf3dd38ba0aa3aad1127ccab380197c

            SHA256

            f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245

            SHA512

            e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7

          • C:\Program Files (x86)\PA Previewer\previewer.exe

            Filesize

            1.9MB

            MD5

            27b85a95804a760da4dbee7ca800c9b4

            SHA1

            f03136226bf3dd38ba0aa3aad1127ccab380197c

            SHA256

            f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245

            SHA512

            e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7

          • C:\Program Files (x86)\PA Previewer\previewer.exe

            Filesize

            1.9MB

            MD5

            27b85a95804a760da4dbee7ca800c9b4

            SHA1

            f03136226bf3dd38ba0aa3aad1127ccab380197c

            SHA256

            f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245

            SHA512

            e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7

          • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe

            Filesize

            116B

            MD5

            ec6aae2bb7d8781226ea61adca8f0586

            SHA1

            d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3

            SHA256

            b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599

            SHA512

            aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7

          • C:\Users\Admin\AppData\Local\Temp\is-86ACJ.tmp\_isetup\_iscrypt.dll

            Filesize

            2KB

            MD5

            a69559718ab506675e907fe49deb71e9

            SHA1

            bc8f404ffdb1960b50c12ff9413c893b56f2e36f

            SHA256

            2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

            SHA512

            e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

          • C:\Users\Admin\AppData\Local\Temp\is-86ACJ.tmp\_isetup\_isdecmp.dll

            Filesize

            32KB

            MD5

            b4786eb1e1a93633ad1b4c112514c893

            SHA1

            734750b771d0809c88508e4feb788d7701e6dada

            SHA256

            2ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f

            SHA512

            0882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6

          • C:\Users\Admin\AppData\Local\Temp\is-86ACJ.tmp\_isetup\_isdecmp.dll

            Filesize

            32KB

            MD5

            b4786eb1e1a93633ad1b4c112514c893

            SHA1

            734750b771d0809c88508e4feb788d7701e6dada

            SHA256

            2ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f

            SHA512

            0882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6

          • C:\Users\Admin\AppData\Local\Temp\is-FKDMD.tmp\is-HBQU5.tmp

            Filesize

            647KB

            MD5

            2fba5642cbcaa6857c3995ccb5d2ee2a

            SHA1

            91fe8cd860cba7551fbf78bc77cc34e34956e8cc

            SHA256

            ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa

            SHA512

            30613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c

          • C:\Users\Admin\AppData\Local\Temp\is-FKDMD.tmp\is-HBQU5.tmp

            Filesize

            647KB

            MD5

            2fba5642cbcaa6857c3995ccb5d2ee2a

            SHA1

            91fe8cd860cba7551fbf78bc77cc34e34956e8cc

            SHA256

            ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa

            SHA512

            30613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c

          • C:\Users\Admin\AppData\Local\Temp\kos.exe

            Filesize

            8KB

            MD5

            076ab7d1cc5150a5e9f8745cc5f5fb6c

            SHA1

            7b40783a27a38106e2cc91414f2bc4d8b484c578

            SHA256

            d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90

            SHA512

            75e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b

          • C:\Users\Admin\AppData\Local\Temp\kos.exe

            Filesize

            8KB

            MD5

            076ab7d1cc5150a5e9f8745cc5f5fb6c

            SHA1

            7b40783a27a38106e2cc91414f2bc4d8b484c578

            SHA256

            d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90

            SHA512

            75e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b

          • C:\Users\Admin\AppData\Local\Temp\kos.exe

            Filesize

            8KB

            MD5

            076ab7d1cc5150a5e9f8745cc5f5fb6c

            SHA1

            7b40783a27a38106e2cc91414f2bc4d8b484c578

            SHA256

            d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90

            SHA512

            75e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b

          • C:\Users\Admin\AppData\Local\Temp\set16.exe

            Filesize

            1.4MB

            MD5

            22d5269955f256a444bd902847b04a3b

            SHA1

            41a83de3273270c3bd5b2bd6528bdc95766aa268

            SHA256

            ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd

            SHA512

            d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c

          • C:\Users\Admin\AppData\Local\Temp\set16.exe

            Filesize

            1.4MB

            MD5

            22d5269955f256a444bd902847b04a3b

            SHA1

            41a83de3273270c3bd5b2bd6528bdc95766aa268

            SHA256

            ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd

            SHA512

            d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c

          • C:\Users\Admin\AppData\Local\Temp\set16.exe

            Filesize

            1.4MB

            MD5

            22d5269955f256a444bd902847b04a3b

            SHA1

            41a83de3273270c3bd5b2bd6528bdc95766aa268

            SHA256

            ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd

            SHA512

            d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c

          • memory/1208-83-0x00007FFB26750000-0x00007FFB27211000-memory.dmp

            Filesize

            10.8MB

          • memory/1208-26-0x0000000000790000-0x0000000000798000-memory.dmp

            Filesize

            32KB

          • memory/1208-33-0x00007FFB26750000-0x00007FFB27211000-memory.dmp

            Filesize

            10.8MB

          • memory/1208-47-0x000000001B580000-0x000000001B590000-memory.dmp

            Filesize

            64KB

          • memory/2564-84-0x00000000021F0000-0x00000000021F1000-memory.dmp

            Filesize

            4KB

          • memory/2564-34-0x00000000021F0000-0x00000000021F1000-memory.dmp

            Filesize

            4KB

          • memory/2564-86-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/2764-74-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/2764-71-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/2764-77-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/2764-73-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3664-29-0x0000000074DD0000-0x0000000075580000-memory.dmp

            Filesize

            7.7MB

          • memory/3664-1-0x0000000000BB0000-0x0000000000D24000-memory.dmp

            Filesize

            1.5MB

          • memory/3664-0-0x0000000074DD0000-0x0000000075580000-memory.dmp

            Filesize

            7.7MB

          • memory/3776-96-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-105-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-132-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-79-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-90-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-93-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-128-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-99-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-102-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-81-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-106-0x00000000008C0000-0x0000000000909000-memory.dmp

            Filesize

            292KB

          • memory/3776-107-0x00000000008C0000-0x0000000000909000-memory.dmp

            Filesize

            292KB

          • memory/3776-112-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-113-0x00000000008C0000-0x0000000000909000-memory.dmp

            Filesize

            292KB

          • memory/3776-116-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-119-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-122-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/3776-125-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB

          • memory/4944-48-0x0000000000400000-0x0000000000413000-memory.dmp

            Filesize

            76KB

          • memory/4944-25-0x0000000000400000-0x0000000000413000-memory.dmp

            Filesize

            76KB