Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
32050adefb91ca7c5a7fecbf86647784.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
32050adefb91ca7c5a7fecbf86647784.exe
Resource
win10v2004-20231215-en
General
-
Target
32050adefb91ca7c5a7fecbf86647784.exe
-
Size
393KB
-
MD5
32050adefb91ca7c5a7fecbf86647784
-
SHA1
b0c08e13b33aef6b13ce50078484be426888b023
-
SHA256
3a7e73d197980a72cfa212a4ebb2eab809c1cf1abf0be5e7ffde4275d513b477
-
SHA512
bf7469872038646a581711b3c453d9a6669b2a985d6ee8505faabdaa16cbdc64fef20c4e5bccbac3be929af35996df3608f236c9ee3b17f8785b2947a44128c3
-
SSDEEP
6144:TbXE9OiTGfhEClq98bd3BTznTiVrDpXA7U4ze4FGkxKawNSH:fU9XiuiHbdxTznTor2lGkx5N
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1984 iphone.exe -
Loads dropped DLL 5 IoCs
pid Process 2300 32050adefb91ca7c5a7fecbf86647784.exe 2300 32050adefb91ca7c5a7fecbf86647784.exe 1952 WerFault.exe 1952 WerFault.exe 1952 WerFault.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\kk2\kk1\monkeypad.jpg DllHost.exe File opened for modification C:\Program Files (x86)\kk2\kk1\data.txt 32050adefb91ca7c5a7fecbf86647784.exe File opened for modification C:\Program Files (x86)\kk2\kk1\bramapod.bat 32050adefb91ca7c5a7fecbf86647784.exe File opened for modification C:\Program Files (x86)\kk2\kk1\monkeypad.jpg 32050adefb91ca7c5a7fecbf86647784.exe File opened for modification C:\Program Files (x86)\kk2\kk1\iphone.exe 32050adefb91ca7c5a7fecbf86647784.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1952 1984 WerFault.exe 31 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 DllHost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2720 2300 32050adefb91ca7c5a7fecbf86647784.exe 28 PID 2300 wrote to memory of 2720 2300 32050adefb91ca7c5a7fecbf86647784.exe 28 PID 2300 wrote to memory of 2720 2300 32050adefb91ca7c5a7fecbf86647784.exe 28 PID 2300 wrote to memory of 2720 2300 32050adefb91ca7c5a7fecbf86647784.exe 28 PID 2300 wrote to memory of 1984 2300 32050adefb91ca7c5a7fecbf86647784.exe 31 PID 2300 wrote to memory of 1984 2300 32050adefb91ca7c5a7fecbf86647784.exe 31 PID 2300 wrote to memory of 1984 2300 32050adefb91ca7c5a7fecbf86647784.exe 31 PID 2300 wrote to memory of 1984 2300 32050adefb91ca7c5a7fecbf86647784.exe 31 PID 1984 wrote to memory of 1952 1984 iphone.exe 34 PID 1984 wrote to memory of 1952 1984 iphone.exe 34 PID 1984 wrote to memory of 1952 1984 iphone.exe 34 PID 1984 wrote to memory of 1952 1984 iphone.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\32050adefb91ca7c5a7fecbf86647784.exe"C:\Users\Admin\AppData\Local\Temp\32050adefb91ca7c5a7fecbf86647784.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\kk2\kk1\bramapod.bat" "2⤵
- Drops file in Drivers directory
PID:2720
-
-
C:\Program Files (x86)\kk2\kk1\iphone.exe"C:\Program Files (x86)\kk2\kk1\iphone.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 1883⤵
- Loads dropped DLL
- Program crash
PID:1952
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d3e2b787c9bb557f868b37a2dda64c82
SHA177c7ee948c18f982c3c393f49552024a929a6a35
SHA2564ce4840298e5362057936d7dc444ba68dc4f2a7a370476e318b8aee892f87ffe
SHA512db1a37a27bb3e9fc41afcebc08735ec4990f7715ff6935cdad8476726c80a217bb663dbd68ccb780ffe29d5d4e546bdfa8caae8ba655a5f751cd64c9998b3634
-
Filesize
2B
MD5d645920e395fedad7bbbed0eca3fe2e0
SHA1af3e133428b9e25c55bc59fe534248e6a0c0f17b
SHA256d59eced1ded07f84c145592f65bdf854358e009c5cd705f5215bf18697fed103
SHA5125e108bc2842d7716815913af0b3d5cb59563fa9116f71b9a17b37d6d445fe778a071b6abcf9b1c5bac2be00800c74e29d69774a66570908d5ea848dcc0abfa76
-
Filesize
542KB
MD54f931bdf231525abd95125a84bd580f0
SHA108f6f1bd3f863a450b1daa901af83f2b0c0d0393
SHA25690e7817f61cbec30e715c4db1382f87851bb27e2790210c59f0ae06c9cb6528c
SHA5120d8b8a49f000ad4ed31524e1c6b7540ff666f483b4dbb93e878fe74a8faf5e8b9252b1a03a42f20d8cff4c64b254f3c015485ee9eed33d6def37c5c14352c249
-
Filesize
512KB
MD59bff31d478b5c0899e7aca27637279cc
SHA148c0e1eefac5e63c75f79b269eac49dcc0056948
SHA256fa877c1506f7ef2b887fd919145df4fc4885d326c826993ed2e0307600ce6c80
SHA51224c6774198db36c9a87cb26eefc70b187a5441d7abe11077e04a3564787022fe77a57da1ff783916d6778e416ea7df5b42ff7af2e64a8f0a0ca540f802da3cd8
-
Filesize
30KB
MD59e5a20a18492de0cee9445c63bc0a116
SHA144fb0f70516424d8722838a89bc340f1d0ab2bb0
SHA256f2db3283109737a0837a193cdf3d1900547ddeadaed4538359a9aeb7d7b5a8a4
SHA512e35e5626910f1a3fd0576fae1d9532a142f6c9786234a603f60f80f081b0b9ffbf6333eb11107ce6dfa903d58d63444a0c5b1447c8ea0f7c20c341c2b44308e5
-
Filesize
449KB
MD5c43c82fa2ab5cee1398a8e9a65d8418e
SHA1f6d3309fcbc761e275e6f54a5b93bca679337ed8
SHA256bb9b3d8510978675542a42faad0b884462ca7dc694fd73a578bc9d0458786717
SHA5121041fad80d4f1f9b1641458d70903712908546237ed25c6d842d4f24728bc49a8af186ec3375bc0d468fb5b633048996c5c088e65573fca58b2178a1381cc99b