Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 03:18
Static task
static1
Behavioral task
behavioral1
Sample
4f9cced988a73931fd48ccb42050c7e7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f9cced988a73931fd48ccb42050c7e7.exe
Resource
win10v2004-20231215-en
General
-
Target
4f9cced988a73931fd48ccb42050c7e7.exe
-
Size
704KB
-
MD5
4f9cced988a73931fd48ccb42050c7e7
-
SHA1
9c40227ec20c8938213fe1b6e65ae7c78c201373
-
SHA256
6e5861addb5fd14b5a5e6d514d65357e4cf4ca108ac7e3e7240a3746b641819c
-
SHA512
9db9a3162021aedb86d5897ab65b935c920cd4a4e88983be7fc50fd615fb757a6da0cf7d936da7a1420aafa9ad70ea665d758653bc9e9e2b6cb53c662fb42f7a
-
SSDEEP
12288:l9Ot9JniEvpOoCUYO2wlv8ilSOW8RXOZoJQIcATRIk0xFJgh9up9V3ICwera4sPz:6nJ5xWUYlajSG+CaS0x/u9upb3Ze4sr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 4f9cced988a73931fd48ccb42050c7e7.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation rinst.exe -
Executes dropped EXE 3 IoCs
pid Process 2392 rinst.exe 4872 KidAutoPK4F4.30.exe 2912 cftmonn.exe -
Loads dropped DLL 5 IoCs
pid Process 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 4872 KidAutoPK4F4.30.exe 4052 4f9cced988a73931fd48ccb42050c7e7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cftmonn = "C:\\WINDOWS\\Web\\cftmonn.exe" cftmonn.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "PK IE Plugin" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} cftmonn.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\WINDOWS\Web\cftmonnhk.dll rinst.exe File created C:\WINDOWS\Web\cftmonnwb.dll rinst.exe File created C:\WINDOWS\Web\inst.dat rinst.exe File created C:\WINDOWS\Web\rinst.exe rinst.exe File opened for modification C:\WINDOWS\Web\pk.bin cftmonn.exe File created C:\WINDOWS\Web\pk.bin rinst.exe File created C:\WINDOWS\Web\cftmonn.exe rinst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0 cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\ = "IE Class" cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\ = "BPK IE Plugin Type Library" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS\ = "0" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1 cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID\ = "PK.IE" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\Programmable cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A} cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32\ = "C:\\WINDOWS\\Web\\cftmonnwb.dll" cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR\ = "C:\\WINDOWS\\Web\\" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ThreadingModel = "Apartment" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0 cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer\ = "PK.IE.1" cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID\ = "PK.IE.1" cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "IE Plugin Class" cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ = "C:\\WINDOWS\\Web\\cftmonnwb.dll" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\ = "IE Plugin Class" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32 cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32 cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" cftmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" cftmonn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID cftmonn.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2912 cftmonn.exe 2912 cftmonn.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe 2912 cftmonn.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4052 wrote to memory of 2392 4052 4f9cced988a73931fd48ccb42050c7e7.exe 92 PID 4052 wrote to memory of 2392 4052 4f9cced988a73931fd48ccb42050c7e7.exe 92 PID 4052 wrote to memory of 2392 4052 4f9cced988a73931fd48ccb42050c7e7.exe 92 PID 2392 wrote to memory of 4872 2392 rinst.exe 94 PID 2392 wrote to memory of 4872 2392 rinst.exe 94 PID 2392 wrote to memory of 4872 2392 rinst.exe 94 PID 2392 wrote to memory of 2912 2392 rinst.exe 95 PID 2392 wrote to memory of 2912 2392 rinst.exe 95 PID 2392 wrote to memory of 2912 2392 rinst.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f9cced988a73931fd48ccb42050c7e7.exe"C:\Users\Admin\AppData\Local\Temp\4f9cced988a73931fd48ccb42050c7e7.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KidAutoPK4F4.30.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KidAutoPK4F4.30.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4872
-
-
C:\WINDOWS\Web\cftmonn.exeC:\WINDOWS\Web\cftmonn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
510KB
MD5f9797a384e524345ea91424f0f6cdbbd
SHA167f9b429a1bbdd5dc46b0174a1e19a3b2a969103
SHA2562153b68233dec9f14516a81d4d323c128b08539c358d3d38aecf2ab292fa7b19
SHA51218974a4bad9d593888235e24760687c29dc666ad88b0d9a7632ea529f0e21aa16f98be6b8bb04540b018f10cb60af97d3683aa3b813cc7b02c5fd8fce900b47c
-
Filesize
428KB
MD59079881f212254a34660ec143ca3bcf9
SHA1e2e79f424d0de904751803b9aa3e2468122aa95f
SHA256307fb0a6dae9ec12525f0b53353e48184a6630c871834ee1f05bebefcf560bab
SHA51251599423d28bf3fad2bd5e09c842644f11b4fc9f5cb5646e5a6fb548a4e56b985f3ea8ca075c6501000b26ce25cd9f2b868a4c37d013aeaee6d9ebfe359b6fbe
-
Filesize
24KB
MD554f967692fa729c17c02b92c418e155a
SHA1fa900726cbe24cecd8c8d6c644a66c16a48d3aff
SHA25602603da01bb033e264c48fa00fa7d77f2cb1672f4eb6c8d2f7fad727b0486ad2
SHA512b441bd81520360f46118ad8d587924514bda2d366568ae3cc79e174fa222f96839c06d5ea1bee2038a890adbf7b84393f26092256380768393e651739770b8e8
-
Filesize
40KB
MD5cde4ef975f7f73787f9a8a9297246b6a
SHA1fb06c767d70b1f7b19444c195f67484281af703e
SHA2563c7e70341b4388ce13fb046975ada17c72612242a67f3bd54c996004152353d7
SHA512006f9ba7482a32ccb2240f73a426feecd8196de977310f31452c70ca34a80a895c96ca364cdb2738eb77fe19163aec1db8baf2a2ad25b994fb18c6262694905e
-
Filesize
996B
MD594ff38f9cc1eba2948f37979dee45b92
SHA1fde795bb23e7e45464137f479a0e730f85c723ed
SHA2561ec1b507ca7290111db1924ae3932edeefd012156ff0b5c06f76518001558692
SHA5127f1bc997426bfb12a39dbdae052e3c3b414935827203e4916365f794a3b80f96e1c913a170b286a1ca737de8e00e5866e8cc51c5c90d6036d376674eeb194d2d
-
Filesize
4KB
MD5818a9c7d936b26a12d136888f09ce891
SHA1f878de9cd714eca8e618180454f0adf7c26f292c
SHA2567d8261a2624553c78552e3e7b62440881999ada859892e3818775e4c63686d97
SHA51293aae33084a618c838b26ae57e374ae65b0f26c572960cae912a9622d37622b8e306fd532877bd0ab6ff7405686c25c4a8b2b25bf13b859602ea39f73cf737af
-
Filesize
7KB
MD5a455ca431e66975d886f1a8cfee8cb9f
SHA195868529973c77199b76ec593a686d9b324dee8b
SHA2566bba0b8d8bf03ba15828c53e72d83d766e44b3238b55ab75348d8ce93bfd0056
SHA51253e0c4edf9d91ebdea04bfb343c568190eaaeb066bc6742262f1e5943d2b27c375e1eca483419ae8753138dc2131c9d3c7742812c16863689c3bb266057c0531
-
Filesize
428KB
MD5bae0fb25bcf05a5da7fde8dce759ee0d
SHA1bc74b07d14a63ce572755c70ceb796136d129e20
SHA256b966953b0a0e0bf648b1043b4e708445b52b020a0485921138bbf3be58d9995d
SHA51274a61f7712df39194b2cb77186231d5960b8bfc5b37abdf20c357471a4e8dd8a8e648161cda7b1c8ee01d422926e3b30fd5ec9c6ebbf589a4feeaeba99ca2929
-
Filesize
4KB
MD59807fbc03a02f4dabd481efcaac71b0f
SHA1e816f33c220e357c3baeb7487768d82da08eea40
SHA256be30d29869038ed1ae2963221ceb223405b7b939e1474e2fb188fd412f774f39
SHA5122a9a5f831f0eb925d39fee38e371d4502b6e53f75ce2dc10c8a43008629a54ac264f08dbafd3827672dcb303046beecd190aa88cbb91359bca9565b1645279fc
-
Filesize
24KB
MD558129986fa29f6dacd99ab45f60bcb3c
SHA17f21995794a060fc8629e0d113cf568de14c509e
SHA256525414ffe5f797ebdd7de5620b75ff723de17bf8f399ffcd7ddec2d0b8a5dc4a
SHA51262ade2d2eb41cd99dcd9f6d66e7966d129be20551faadcf827558e85d669f885ad144d10a87c3be7faed08103b86ab523fb6756b44f9e0ba77cdff586214701a
-
Filesize
40KB
MD52e6016325548ab79e2d636640c6ec473
SHA1586e2b84d46ef00e26c1686033def28e8a9995a5
SHA25662e2948c3e3857e8304a657b7e7da30cdcb6842f71bd4c678a1734ebbf17198e
SHA5121dc89b9e15f5835dff3203e278f000df5c0d8d93cbef5059be3f1024ef1e16ae8087a4f8e1131b20b190942984e9dc6079dfe951a52de7f4d4ad7de8721a0e86