Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 15:00
Behavioral task
behavioral1
Sample
02a8a6079949624aa00e1d5bd6ec469e.exe
Resource
win7-20231215-en
General
-
Target
02a8a6079949624aa00e1d5bd6ec469e.exe
-
Size
1.3MB
-
MD5
02a8a6079949624aa00e1d5bd6ec469e
-
SHA1
5d066de909907a406d00779803fca42cb3a80718
-
SHA256
e42a3a64b94d56ff4eb582d1d42b1cbf86f4d0cedcb15244bc818728c1eee20d
-
SHA512
751842b2afc77d022873f3876d0d28ee92c555a12d767cae6cf34256423679f114beeef58087bcd8bdbea1a487fbaf82030e316c6946c7eecd700f763a991296
-
SSDEEP
24576:HW/F8IVEKFAldhmAjPouSNbM+tzccf94WliDwoCFyelKwrUQ8Tcjkn:4/F+dhnjPouSJM+zV4siDcblKwrh8YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3672 CKSetup32.exe 1860 CKSetup64.exe -
Loads dropped DLL 3 IoCs
pid Process 3904 02a8a6079949624aa00e1d5bd6ec469e.exe 3904 02a8a6079949624aa00e1d5bd6ec469e.exe 3904 02a8a6079949624aa00e1d5bd6ec469e.exe -
resource yara_rule behavioral2/memory/3904-0-0x0000000000400000-0x00000000007FD000-memory.dmp upx behavioral2/memory/3904-68-0x0000000000400000-0x00000000007FD000-memory.dmp upx behavioral2/memory/3904-69-0x0000000000400000-0x00000000007FD000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 24 IoCs
description ioc Process File created C:\Windows\SysWOW64\CKSetup32.exe 02a8a6079949624aa00e1d5bd6ec469e.exe File created C:\Windows\system32\CKAgent.dat CKSetup64.exe File created C:\Windows\system32\temp_JRSKD24.SYS CKSetup64.exe File opened for modification C:\Windows\system32\JRSKD24.SYS CKSetup64.exe File opened for modification C:\Windows\SysWOW64\CKAgent.exe CKSetup32.exe File created C:\Windows\SysWOW64\npKeyPro.dll 02a8a6079949624aa00e1d5bd6ec469e.exe File opened for modification C:\Windows\system32\CKAgent.exe CKSetup64.exe File created C:\Windows\system32\JRSUKD25.SYS CKSetup64.exe File created C:\Windows\SysWOW64\TouchEnKey.dll 02a8a6079949624aa00e1d5bd6ec469e.exe File created C:\Windows\SysWOW64\XecureCK.dll 02a8a6079949624aa00e1d5bd6ec469e.exe File created C:\Windows\SysWOW64\kcrypto.dll 02a8a6079949624aa00e1d5bd6ec469e.exe File created C:\Windows\SysWOW64\jrsoftcp.dll 02a8a6079949624aa00e1d5bd6ec469e.exe File created C:\Windows\SysWOW64\CKSetup64.exe CKSetup32.exe File created C:\Windows\system32\CKAgent_t.exe CKSetup64.exe File created C:\Windows\SysWOW64\CKAgent_t.exe CKSetup32.exe File created C:\Windows\SysWOW64\CKAgent.dat CKSetup32.exe File opened for modification C:\Windows\SysWOW64\CKAgent.dat CKSetup32.exe File opened for modification C:\Windows\SysWOW64\CKSetup64.exe 02a8a6079949624aa00e1d5bd6ec469e.exe File created C:\Windows\SysWOW64\CKApp.dll 02a8a6079949624aa00e1d5bd6ec469e.exe File opened for modification C:\Windows\system32\CKAgent.dat CKSetup64.exe File created C:\Windows\system32\kcrtx64.sys CKSetup64.exe File created C:\Windows\SysWOW64\CKKeyProCert.dll 02a8a6079949624aa00e1d5bd6ec469e.exe File created C:\Windows\SysWOW64\CKCSP.dll 02a8a6079949624aa00e1d5bd6ec469e.exe File opened for modification C:\Windows\SysWOW64\TouchEnKey.dll 02a8a6079949624aa00e1d5bd6ec469e.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Downloaded Program Files\TouchEnKey.dll 02a8a6079949624aa00e1d5bd6ec469e.exe File created C:\Windows\Downloaded Program Files\TouchEnKey.inf 02a8a6079949624aa00e1d5bd6ec469e.exe File opened for modification C:\Windows\Downloaded Program Files\TouchEnKey.dll 02a8a6079949624aa00e1d5bd6ec469e.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{6CE20149-ABE3-462E-A1B4-5B549971AA38} CKSetup32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\Compatibility Flags = "0" CKSetup32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{8FD68F8A-641E-4204-AE47-DD835C1AE756} CKSetup32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\AppPath = "C:\\Windows\\system32" CKSetup32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{6CE20149-ABE3-462E-A1B4-5B549971AA38} 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\Compatibility Flags = "0" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{8FD68F8A-641E-4204-AE47-DD835C1AE756}\Compatibility Flags = "0" CKSetup32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6CE20149-ABE3-462E-A1B4-5B549971AA38} CKSetup32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\AppName = "CKAgent.exe" CKSetup32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\Policy = "3" CKSetup32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKKB\CurVer\ = "XecureCK.XecureCKKB.1" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\InprocServer32 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKEventSink\CLSID\ = "{80057AB5-65A5-4DF2-933F-51CFAB8E8F42}" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80057AB5-65A5-4DF2-933F-51CFAB8E8F42}\ProgID 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80057AB5-65A5-4DF2-933F-51CFAB8E8F42}\TypeLib\ = "{6385A97F-E709-4895-A9FA-DD0F420DCAC9}" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6385A97F-E709-4895-A9FA-DD0F420DCAC9}\1.0\ = "XecureCK 1.0 Type Library" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{503F0D5F-2BA7-4AEA-91A4-81ABBAE980A3}\TypeLib\Version = "1.0" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKEventSink.1\CLSID\ = "{80057AB5-65A5-4DF2-933F-51CFAB8E8F42}" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80057AB5-65A5-4DF2-933F-51CFAB8E8F42} 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6385A97F-E709-4895-A9FA-DD0F420DCAC9}\1.0\FLAGS\ = "0" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D9BB56B-46E9-4B44-B455-54F75D3258DF}\TypeLib\ = "{6385A97F-E709-4895-A9FA-DD0F420DCAC9}" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{503F0D5F-2BA7-4AEA-91A4-81ABBAE980A3}\ = "IXecureCKEventSink" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{503F0D5F-2BA7-4AEA-91A4-81ABBAE980A3}\ProxyStubClsid32 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKKB.1\ = "XecureCKKB Class" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6CE20149-ABE3-462E-A1B4-5B549971AA38} 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\Programmable 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\InprocServer32\ThreadingModel = "Apartment" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKEventSink.1\ = "XecureCKEventSink Class" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKEventSink.1\CLSID 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKEventSink\CurVer 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80057AB5-65A5-4DF2-933F-51CFAB8E8F42}\VersionIndependentProgID 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D9BB56B-46E9-4B44-B455-54F75D3258DF} 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D9BB56B-46E9-4B44-B455-54F75D3258DF}\TypeLib 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D9BB56B-46E9-4B44-B455-54F75D3258DF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKKB\CLSID 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\ProgID\ = "XecureCK.XecureCKKB.1" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80057AB5-65A5-4DF2-933F-51CFAB8E8F42}\InprocServer32\ = "C:\\Windows\\Downloaded Program Files\\TouchEnKey.dll" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80057AB5-65A5-4DF2-933F-51CFAB8E8F42}\TypeLib 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6385A97F-E709-4895-A9FA-DD0F420DCAC9}\1.0\FLAGS 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6385A97F-E709-4895-A9FA-DD0F420DCAC9}\1.0\HELPDIR 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\InprocServer32\ = "C:\\Windows\\Downloaded Program Files\\TouchEnKey.dll" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\TypeLib\ = "{6385A97F-E709-4895-A9FA-DD0F420DCAC9}" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80057AB5-65A5-4DF2-933F-51CFAB8E8F42}\ProgID\ = "XecureCK.XecureCKEventSink.1" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{503F0D5F-2BA7-4AEA-91A4-81ABBAE980A3}\TypeLib\ = "{6385A97F-E709-4895-A9FA-DD0F420DCAC9}" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{503F0D5F-2BA7-4AEA-91A4-81ABBAE980A3}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKKB.1 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80057AB5-65A5-4DF2-933F-51CFAB8E8F42}\InprocServer32\ThreadingModel = "Apartment" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D9BB56B-46E9-4B44-B455-54F75D3258DF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{503F0D5F-2BA7-4AEA-91A4-81ABBAE980A3}\TypeLib 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{503F0D5F-2BA7-4AEA-91A4-81ABBAE980A3}\TypeLib\ = "{6385A97F-E709-4895-A9FA-DD0F420DCAC9}" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKKB 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKEventSink 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKEventSink\CurVer\ = "XecureCK.XecureCKEventSink.1" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80057AB5-65A5-4DF2-933F-51CFAB8E8F42}\VersionIndependentProgID\ = "XecureCK.XecureCKEventSink" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{503F0D5F-2BA7-4AEA-91A4-81ABBAE980A3}\ = "IXecureCKEventSink" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{503F0D5F-2BA7-4AEA-91A4-81ABBAE980A3} 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKKB\CLSID\ = "{6CE20149-ABE3-462E-A1B4-5B549971AA38}" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKEventSink.1 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80057AB5-65A5-4DF2-933F-51CFAB8E8F42}\InprocServer32 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D9BB56B-46E9-4B44-B455-54F75D3258DF}\TypeLib 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\TypeLib 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6385A97F-E709-4895-A9FA-DD0F420DCAC9} 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{503F0D5F-2BA7-4AEA-91A4-81ABBAE980A3}\TypeLib 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{503F0D5F-2BA7-4AEA-91A4-81ABBAE980A3}\TypeLib\Version = "1.0" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\VersionIndependentProgID 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6CE20149-ABE3-462E-A1B4-5B549971AA38}\VersionIndependentProgID\ = "XecureCK.XecureCKKB" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKEventSink\CLSID 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D9BB56B-46E9-4B44-B455-54F75D3258DF}\ = "IXecureCKKB" 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D9BB56B-46E9-4B44-B455-54F75D3258DF}\TypeLib\Version = "1.0" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{503F0D5F-2BA7-4AEA-91A4-81ABBAE980A3}\ProxyStubClsid32 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XecureCK.XecureCKEventSink\ = "XecureCKEventSink Class" 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80057AB5-65A5-4DF2-933F-51CFAB8E8F42}\Programmable 02a8a6079949624aa00e1d5bd6ec469e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6385A97F-E709-4895-A9FA-DD0F420DCAC9}\1.0\0\win32 02a8a6079949624aa00e1d5bd6ec469e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6385A97F-E709-4895-A9FA-DD0F420DCAC9}\1.0\0\win32\ = "C:\\Windows\\Downloaded Program Files\\TouchEnKey.dll" 02a8a6079949624aa00e1d5bd6ec469e.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3904 02a8a6079949624aa00e1d5bd6ec469e.exe 3904 02a8a6079949624aa00e1d5bd6ec469e.exe 3904 02a8a6079949624aa00e1d5bd6ec469e.exe 3904 02a8a6079949624aa00e1d5bd6ec469e.exe 3904 02a8a6079949624aa00e1d5bd6ec469e.exe 3904 02a8a6079949624aa00e1d5bd6ec469e.exe 3904 02a8a6079949624aa00e1d5bd6ec469e.exe 3904 02a8a6079949624aa00e1d5bd6ec469e.exe 1860 CKSetup64.exe 1860 CKSetup64.exe 3672 CKSetup32.exe 3672 CKSetup32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 672 Process not Found 672 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3904 02a8a6079949624aa00e1d5bd6ec469e.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3904 wrote to memory of 3672 3904 02a8a6079949624aa00e1d5bd6ec469e.exe 90 PID 3904 wrote to memory of 3672 3904 02a8a6079949624aa00e1d5bd6ec469e.exe 90 PID 3904 wrote to memory of 3672 3904 02a8a6079949624aa00e1d5bd6ec469e.exe 90 PID 3672 wrote to memory of 1860 3672 CKSetup32.exe 91 PID 3672 wrote to memory of 1860 3672 CKSetup32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\02a8a6079949624aa00e1d5bd6ec469e.exe"C:\Users\Admin\AppData\Local\Temp\02a8a6079949624aa00e1d5bd6ec469e.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\CKSetup32.exeC:\Windows\system32\CKSetup32.exe /install2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\CKSetup64.exe"C:\Windows\SysWOW64\CKSetup64.exe" /update CKAgent3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD54df87b9f957b6b2c63794bf3c972ccd5
SHA181a1ec4b13b5e9f5dd1767dd2ae85edb1bfc302d
SHA256cd76c403bff82c4d2142f3018d836ec8246a14cff1ff0b2a4edfe79406e8be6a
SHA51296ed457b2209a78b384db542cb7c39f15e9aacdeae5ef9b9a6dd636096099f20d1bd12b65a186919ad872ea5430b17c5bf206a290a1678dbc25be51415174ae1
-
Filesize
133KB
MD5b41cf55c72f97008a9696454fe3af490
SHA1e91860630919a244a59e76b9ef98b4a1a1a9c365
SHA25615a6ea7dbd57944933063231996a1346452ed46edd9730480bb980087147dae5
SHA512f73b4e026a43128b6e71da87e917d3c2fadf902f35522176ff3e4a28f3fd1ee0c3e16d05bdc464f0cac62cb080b2f2b758b48e6c61d71cd2dfe60d4045b01d07
-
Filesize
1.0MB
MD5bbb91684506d658207220ab18f99a5a8
SHA1b2c0ba77feb6823f5362e2cd688854a11dc38c58
SHA256dfe9c926d17609438bf6ad0714a1185252965e521e4b9ed1104c3ebe48f2ee55
SHA5129bf70b1db1c4535e5deab3f571f791494f2b5d857675c5e698f941692e638e22edf7df789ba5873e996f0153a4e1e4b216815d86ae80d1d7ff278ce3d2ab053e
-
Filesize
1.1MB
MD542b74da04f05604cbef420530433e4f2
SHA1f8fb7eb0ff00fa4aed9677f18e678ad7e5ebe298
SHA2560094e0dbd418193d68967488d778173e5b95012c4dfe271bdf2bdc2ac72b52df
SHA51222b649b8ffd7d0c44c38c4812bfac2590be2c683342c59bfb8379f2904fa523e2f4334d7c3dc915cf2773f18a2b60e0d3a17eae3ea385350d971e3caf0d6e652
-
Filesize
462KB
MD58aec74b31d7a560904396a9d8d9e61f5
SHA1fb7dbef14187f421f8183abe281ebd4ca5f843fb
SHA25669298602a398107bd37a68a344b2583e8791180a3fb486cbc70cc6b57058800f
SHA5125c3bfed7221979a3b1865228c0f46f8e798312659bc724103f8617075f1114eddc12563ef2b0c6e44eaf55850ba87f7fbff8fb54a2d57ca4f90bebd784303455
-
Filesize
186KB
MD5f9060327c8db272ac4bf9d52c7022ad5
SHA18abf59a23a05abd32616d6ecad2e196c84cee204
SHA2562ce0479ad8d4e043bef269c58662f7a0ab9530a246176c98dbd331c2c7734237
SHA5120e0e87f1bee1250593efd70eb6e74088e6476441f3f60240b8d27e5047e674d2fd5e9e5223aed23d2a90fabe4d03fc1d3a6af4b3218c09b7a3d608b93a6d7d79
-
Filesize
133KB
MD5b2edd65139aa6154085f4c93eafd5e54
SHA18d5ac04f1726d5d3aa7c75cc20787c494b62b0b0
SHA256d294d7168b4e70c2878e2ed9ae47f10a78b3f9985f8ad025cd4d249f1b8c41e7
SHA512c68050294819526ca73da72618405d6b3df04ca23155114056bb084806f1902ca5b216c1413cb04cf0fd53ca940438caef53fc5c271c0c61a642ace9ceb24f05
-
Filesize
13KB
MD5a71cded2d4e34d9471fe1a92f057a551
SHA1154afb1b5a1b3bb1d09bcf9952e8764489aeccd3
SHA2565355a3fd33bc5518148fc64b42323e6ab5fa2277d17e87f9a0762f00c5593346
SHA5125461f58fd7775615fc36aba6ea71177cf6dc3e240123e14556dd922628d935a0b82af0f59a72a6671750ffc74d9921578917dc4329b8d9033f6953acbcede671