Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
1458b9f5cfa980d057da25e3ca2e61af.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1458b9f5cfa980d057da25e3ca2e61af.exe
Resource
win10v2004-20231215-en
General
-
Target
1458b9f5cfa980d057da25e3ca2e61af.exe
-
Size
548KB
-
MD5
1458b9f5cfa980d057da25e3ca2e61af
-
SHA1
8d70149a00226cbc0787b9c1a00f419400d00672
-
SHA256
5b3635af5764de1c8f2b690d2814f76bfb4b3229e8d17681c6459bf7806ddfd9
-
SHA512
0d71f32c63cee7ad714a9b38178628bb041a616a07475b3020c2351f33cacfe697891c153a070a281a0a29e71291d462603106f4364040ac6f6e3d8e235212a2
-
SSDEEP
12288:AbEtWoMZfaFtuKo5qKMnLYuyqnzN+y1kz1LxCOAwst:sloUf+o5qJnV9+y1IXs
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\c1d0fc3f\\X" Explorer.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jyCd5od0b9.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kooanu.exe -
Deletes itself 1 IoCs
pid Process 304 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 784 jyCd5od0b9.exe 3032 kooanu.exe 2708 2aag.exe 2736 2aag.exe 2496 2aag.exe 2152 2aag.exe 1240 2aag.exe 1836 2aag.exe 1868 3aag.exe 340 csrss.exe 1428 X -
Loads dropped DLL 17 IoCs
pid Process 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 784 jyCd5od0b9.exe 784 jyCd5od0b9.exe 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 1868 3aag.exe 1868 3aag.exe -
resource yara_rule behavioral1/memory/2736-47-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2736-53-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2736-55-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2496-58-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2736-57-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2152-81-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2152-85-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/1240-99-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1240-102-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1240-101-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1240-93-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1240-89-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2152-87-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/1240-86-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2152-82-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2152-77-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2152-74-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2152-72-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2496-69-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2496-68-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2496-67-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2496-64-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2496-52-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2736-43-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2736-41-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2736-140-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2736-162-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2152-163-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/1240-168-0x0000000000400000-0x0000000000407000-memory.dmp upx -
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 31.193.3.240 Destination IP 31.193.3.240 Destination IP 31.193.3.240 Destination IP 31.193.3.240 Destination IP 31.193.3.240 -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /m" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /C" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /E" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /t" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /U" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /O" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /L" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /g" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /u" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /i" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /a" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /q" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /Q" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /K" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /f" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /y" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /M" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /S" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /k" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /F" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /x" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /p" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /r" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /R" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /w" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /l" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /I" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /P" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /z" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /V" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /v" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /B" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /e" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /c" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /J" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /N" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /s" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /h" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /Z" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /A" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /D" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /j" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /G" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /d" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /W" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /n" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /X" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /K" jyCd5od0b9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /o" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /H" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /T" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /b" kooanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\kooanu = "C:\\Users\\Admin\\kooanu.exe /Y" kooanu.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2aag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2aag.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2708 set thread context of 2736 2708 2aag.exe 41 PID 2708 set thread context of 2496 2708 2aag.exe 34 PID 2708 set thread context of 2152 2708 2aag.exe 35 PID 2708 set thread context of 1240 2708 2aag.exe 36 PID 2708 set thread context of 1836 2708 2aag.exe 37 PID 1868 set thread context of 1808 1868 3aag.exe 45 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1788 2496 WerFault.exe 34 -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2620 tasklist.exe 1056 tasklist.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{a873d410-6fd3-1b1c-08a3-ea6185436e1c}\u = "188" 3aag.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{a873d410-6fd3-1b1c-08a3-ea6185436e1c}\cid = "8289472890088579155" 3aag.exe Key created \registry\machine\Software\Classes\Interface\{a873d410-6fd3-1b1c-08a3-ea6185436e1c} 3aag.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 784 jyCd5od0b9.exe 784 jyCd5od0b9.exe 2152 2aag.exe 3032 kooanu.exe 1868 3aag.exe 1868 3aag.exe 1868 3aag.exe 1868 3aag.exe 1428 X 3032 kooanu.exe 3032 kooanu.exe 2152 2aag.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe 3032 kooanu.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2620 tasklist.exe Token: SeDebugPrivilege 1868 3aag.exe Token: SeDebugPrivilege 1868 3aag.exe Token: SeDebugPrivilege 1056 tasklist.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1340 Explorer.EXE 1340 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1340 Explorer.EXE 1340 Explorer.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 784 jyCd5od0b9.exe 3032 kooanu.exe 2708 2aag.exe 2736 2aag.exe 1240 2aag.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 340 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 784 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 28 PID 2216 wrote to memory of 784 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 28 PID 2216 wrote to memory of 784 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 28 PID 2216 wrote to memory of 784 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 28 PID 784 wrote to memory of 3032 784 jyCd5od0b9.exe 29 PID 784 wrote to memory of 3032 784 jyCd5od0b9.exe 29 PID 784 wrote to memory of 3032 784 jyCd5od0b9.exe 29 PID 784 wrote to memory of 3032 784 jyCd5od0b9.exe 29 PID 784 wrote to memory of 2724 784 jyCd5od0b9.exe 33 PID 784 wrote to memory of 2724 784 jyCd5od0b9.exe 33 PID 784 wrote to memory of 2724 784 jyCd5od0b9.exe 33 PID 784 wrote to memory of 2724 784 jyCd5od0b9.exe 33 PID 2724 wrote to memory of 2620 2724 cmd.exe 30 PID 2724 wrote to memory of 2620 2724 cmd.exe 30 PID 2724 wrote to memory of 2620 2724 cmd.exe 30 PID 2724 wrote to memory of 2620 2724 cmd.exe 30 PID 2216 wrote to memory of 2708 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 43 PID 2216 wrote to memory of 2708 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 43 PID 2216 wrote to memory of 2708 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 43 PID 2216 wrote to memory of 2708 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 43 PID 2708 wrote to memory of 2736 2708 2aag.exe 41 PID 2708 wrote to memory of 2736 2708 2aag.exe 41 PID 2708 wrote to memory of 2736 2708 2aag.exe 41 PID 2708 wrote to memory of 2736 2708 2aag.exe 41 PID 2708 wrote to memory of 2736 2708 2aag.exe 41 PID 2708 wrote to memory of 2736 2708 2aag.exe 41 PID 2708 wrote to memory of 2736 2708 2aag.exe 41 PID 2708 wrote to memory of 2736 2708 2aag.exe 41 PID 2708 wrote to memory of 2496 2708 2aag.exe 34 PID 2708 wrote to memory of 2496 2708 2aag.exe 34 PID 2708 wrote to memory of 2496 2708 2aag.exe 34 PID 2708 wrote to memory of 2496 2708 2aag.exe 34 PID 2708 wrote to memory of 2496 2708 2aag.exe 34 PID 2708 wrote to memory of 2496 2708 2aag.exe 34 PID 2708 wrote to memory of 2496 2708 2aag.exe 34 PID 2708 wrote to memory of 2496 2708 2aag.exe 34 PID 2708 wrote to memory of 2152 2708 2aag.exe 35 PID 2708 wrote to memory of 2152 2708 2aag.exe 35 PID 2708 wrote to memory of 2152 2708 2aag.exe 35 PID 2708 wrote to memory of 2152 2708 2aag.exe 35 PID 2496 wrote to memory of 1788 2496 2aag.exe 40 PID 2496 wrote to memory of 1788 2496 2aag.exe 40 PID 2496 wrote to memory of 1788 2496 2aag.exe 40 PID 2496 wrote to memory of 1788 2496 2aag.exe 40 PID 2708 wrote to memory of 2152 2708 2aag.exe 35 PID 2708 wrote to memory of 2152 2708 2aag.exe 35 PID 2708 wrote to memory of 2152 2708 2aag.exe 35 PID 2708 wrote to memory of 2152 2708 2aag.exe 35 PID 2708 wrote to memory of 1240 2708 2aag.exe 36 PID 2708 wrote to memory of 1240 2708 2aag.exe 36 PID 2708 wrote to memory of 1240 2708 2aag.exe 36 PID 2708 wrote to memory of 1240 2708 2aag.exe 36 PID 2708 wrote to memory of 1240 2708 2aag.exe 36 PID 2708 wrote to memory of 1240 2708 2aag.exe 36 PID 2708 wrote to memory of 1240 2708 2aag.exe 36 PID 2708 wrote to memory of 1240 2708 2aag.exe 36 PID 2708 wrote to memory of 1836 2708 2aag.exe 37 PID 2708 wrote to memory of 1836 2708 2aag.exe 37 PID 2708 wrote to memory of 1836 2708 2aag.exe 37 PID 2708 wrote to memory of 1836 2708 2aag.exe 37 PID 2708 wrote to memory of 1836 2708 2aag.exe 37 PID 2216 wrote to memory of 1868 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 39 PID 2216 wrote to memory of 1868 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 39 PID 2216 wrote to memory of 1868 2216 1458b9f5cfa980d057da25e3ca2e61af.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies WinLogon for persistence
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\1458b9f5cfa980d057da25e3ca2e61af.exe"C:\Users\Admin\AppData\Local\Temp\1458b9f5cfa980d057da25e3ca2e61af.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\jyCd5od0b9.exeC:\Users\Admin\jyCd5od0b9.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\kooanu.exe"C:\Users\Admin\kooanu.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del jyCd5od0b9.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2724
-
-
-
C:\Users\Admin\3aag.exeC:\Users\Admin\3aag.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Users\Admin\AppData\Local\c1d0fc3f\X*0*bc*8cf5e053*31.193.3.240:534⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:1808
-
-
-
C:\Users\Admin\2aag.exeC:\Users\Admin\2aag.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 1458b9f5cfa980d057da25e3ca2e61af.exe3⤵
- Deletes itself
PID:304
-
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:340
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
C:\Users\Admin\2aag.exe"C:\Users\Admin\2aag.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 882⤵
- Loads dropped DLL
- Program crash
PID:1788
-
-
C:\Users\Admin\2aag.exe"C:\Users\Admin\2aag.exe"1⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
C:\Users\Admin\2aag.exe"C:\Users\Admin\2aag.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1240
-
C:\Users\Admin\2aag.exe"C:\Users\Admin\2aag.exe"1⤵
- Executes dropped EXE
PID:1836
-
C:\Users\Admin\2aag.exe"C:\Users\Admin\2aag.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2736
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:656
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:2836
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD52b4ee5d4acacc3528ba7c3a58bd29c41
SHA181b91ba52c39da729feecf26c02798b981662448
SHA25678c58e327fb0dbc782ba27eabb7ba2765c20d9ac44df3460e6059d0c97c0ad12
SHA512fde7b774c2853664c2d97baba56df64ce38c56104cd0c6f2702730f69c1db6f8b8e03856e125d92e1bc737dad2f9dd1f0f5cad565e5cd4cd093be93da8d8d965
-
Filesize
96KB
MD561d449b963d0c9dc3b2fd741795c8216
SHA137ef13830080de172477b83085695261cbc0e7bb
SHA2562ca2871c9c0129bf224cdad694e8a515a143951e2e6c635d6a2a9a2ebfd22d34
SHA512437c7d1dc802606d470269d5b88cf368e11a3cea61d4f60e0aeb43950acf901d4d1af60d845986ae5af1a33b665acbf522db58982199587ffc1abd6f156eb973
-
Filesize
93KB
MD51b7fdb06f7f4b23abfb7771e655cf31f
SHA1790bad51bbbb067cfafbd30ececd3e869fe3b6de
SHA256edc88586e518b59f701bb61bb788429809a24f8f1d97e01b9100a81434ce3e10
SHA51260257891c6ed82b02ff56a44aa388006638d585a38d350d06d7730db1544dc78636cd4907699616a9b4d660f8fcf0c6577dbc87cd3472391c288711d65efae57
-
Filesize
260KB
MD5b0c9b92f068e2ac7770334e56e0c5017
SHA14d73d45c04e4e8af4fa81403d812fac1b94a75c0
SHA2566a1fbc078e3b75354607179c7af71cdc80e40d5a787929fe9d174998a7b75888
SHA5120d08f35abc9363db287449953a23d69f49bb11a2755378b82b66acba07f2588acce85a2f0f9c7a1fbdc7e049507ff5293e9ec33fc8cc847c860c80bb39c8c26a
-
Filesize
98KB
MD5ad3ba89f897a0df602ce9f12f0b27673
SHA172f8b1bdd74dda621a3ef23a6e053bb5ccc227ac
SHA2568c0333c0bfe7f8d447789ce8ca7918661643f931acdd2eb0691162cbc5270e01
SHA512cf86a661a93183721ecf3cc7b87f5e075340cbe0b3978a2592010e7a574c65be87fcea715d492dd1ad82b63b3f055b6f63695d9f9b07b03e29ae9d136345b42e
-
Filesize
260KB
MD5769bed66af8832b1bf53ee44a582be58
SHA147a616ec58a3a2edb6e11001830c0fb56b13dc5d
SHA256b9e4ede93a41f2a9304d9d3217f0fab65f22dce110bbc5acf9490fdb48f0b463
SHA5121c2c7573645ccc1b9748cd3b4ffb5f9332a2bbe88b1b2ea49235b869a6f78a57ec5a529bc1c9ab0cbf235e839a8c3057b5e7369be79a494e3dbc294cf61011f1
-
Filesize
2KB
MD50aea8f4a7e1249d8371b302cfeee61bc
SHA1d6b56649e7cfeb4f5e99d8b02f647d3829eb6bfb
SHA256e16f78b590bc5107fca8d426de5f638974bd11d492d98e28ce5c1f732bc8558c
SHA5125c120746c4596f4a978d81d08dcc729c8dd847d3a0db0a65dbf082139b0e462360367ac796199e75b2777d13034cb87cd4d3d653be211af1180cab763552cb75