Analysis

  • max time kernel
    156s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 15:51

General

  • Target

    7a61f0eddaf4bf363f5f89271ca941de.exe

  • Size

    244KB

  • MD5

    7a61f0eddaf4bf363f5f89271ca941de

  • SHA1

    20f1c1845b32bcb410839547a9229795ac0de164

  • SHA256

    52a9947b3ecb449548ce297f7665cdfcb9695772e07b49d00a4690ee9b29a738

  • SHA512

    6c2725e90c897716bd74c86f839b4119d09897895d1bdd7f1026fd28cfe34fe35c4ef333858c88714da6cc0c8ee6704245fff4cbb6791b08897763d2e72bc711

  • SSDEEP

    3072:7hPBdnA+5sROnFQu5yIuSP9lqVinU3bp/PTm2moJ6BwA+GABMndgSq6e:7hJd57PnqVinU3bw2moJ6WAdgBH

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a61f0eddaf4bf363f5f89271ca941de.exe
    "C:\Users\Admin\AppData\Local\Temp\7a61f0eddaf4bf363f5f89271ca941de.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Users\Admin\kaare.exe
      "C:\Users\Admin\kaare.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\kaare.exe

    Filesize

    244KB

    MD5

    2465910ac873f4ed92233cf76086e539

    SHA1

    98a30fd035d3e47340a496d245a7b37a97804a10

    SHA256

    737dfdabded11ace080f3b07198d5c076c985f84bca3d1a00ad5bc891a722101

    SHA512

    27151ed608b0e2c7305bb7f6d4859279a2ceb033bac44f18352cf2645885ab0e376236bdd97687c0a6532d6ea17c22a803987b304c36c412d34157e77938d3f6