Analysis
-
max time kernel
151s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
7f3987c0e62a0f3b39848202c79fb95e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f3987c0e62a0f3b39848202c79fb95e.exe
Resource
win10v2004-20231222-en
General
-
Target
7f3987c0e62a0f3b39848202c79fb95e.exe
-
Size
1.3MB
-
MD5
7f3987c0e62a0f3b39848202c79fb95e
-
SHA1
61bb8efc59d4b85262f123a5a5199abf1907121d
-
SHA256
dd4ed634c3494ae83f56337d774ba00a0617fc0fd27b1a5c7185ed5bf526ec76
-
SHA512
b83196292ec8a02ec7d401f070c1aa6a473a08083841ffb30aa18c9f50dc329f197d0457f3d44c616b8d7fcc6a7368b05865993c61b4ecc34921ec3297207515
-
SSDEEP
24576:3DSmDdU+YdDm0UaIwhgTJz6qP4lpEZXzTnby1ZU2vgxLy7Nt/M:pdfBatod6qP4DEdX+RvELy7N
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\KAPFA.sys KASetup.exe -
Executes dropped EXE 5 IoCs
pid Process 2364 KAgentSilent.exe 2648 KASetup.exe 1320 AgentMon.exe 2472 KaUsrTsk.exe 1148 AgentMon.exe -
Loads dropped DLL 16 IoCs
pid Process 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 2364 KAgentSilent.exe 2364 KAgentSilent.exe 2364 KAgentSilent.exe 2364 KAgentSilent.exe 2648 KASetup.exe 2648 KASetup.exe 2648 KASetup.exe 2648 KASetup.exe 2648 KASetup.exe 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 1148 AgentMon.exe 1148 AgentMon.exe 1148 AgentMon.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\KASHPLLT9905823878822487 = "\"C:\\Program Files (x86)\\Kaseya\\PLLT9905823878822487\\KaUsrTsk.exe\"" KASetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\KaseyaSP.dll KASetup.exe -
Drops file in Program Files directory 27 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KASetup.exe KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KAgentExt.dll KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\drivers\KAPFA.sys KASetup.exe File opened for modification C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KaseyaD.ini 7f3987c0e62a0f3b39848202c79fb95e.exe File opened for modification C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KasError.log AgentMon.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KasError.log KASetup.exe File opened for modification C:\Program Files (x86)\Kaseya\PLLT9905823878822487\AgentMon.log AgentMon.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KaseyaFW.ini KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KasFirewall.log KASetup.exe File opened for modification C:\Program Files (x86)\Kaseya\PLLT9905823878822487\lastChk.txt AgentMon.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KaUsrTsk.exe KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\sporder.dll KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\drivers\KaseyaD.VXD KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KaseyaD.ini KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KasAgent.log KASetup.exe File opened for modification C:\Program Files (x86)\Kaseya\PLLT9905823878822487\AgentMon.log AgentMon.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\Package.xml KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\drivers\KaseyaSP.dll KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\lastChk.txt AgentMon.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\kGetELMg64.exe KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KPrtPng.exe KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\LogParser.dll KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\drivers\KAPFA64.sys KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KasStats.log KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KASetup.exe KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\AgentMon.exe KASetup.exe File created C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KEventLog.dll KASetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2472 KaUsrTsk.exe 2472 KaUsrTsk.exe 2472 KaUsrTsk.exe 2472 KaUsrTsk.exe 2472 KaUsrTsk.exe 2472 KaUsrTsk.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2472 KaUsrTsk.exe 2472 KaUsrTsk.exe 2472 KaUsrTsk.exe 2472 KaUsrTsk.exe 2472 KaUsrTsk.exe 2472 KaUsrTsk.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2364 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 28 PID 2132 wrote to memory of 2364 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 28 PID 2132 wrote to memory of 2364 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 28 PID 2132 wrote to memory of 2364 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 28 PID 2132 wrote to memory of 2364 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 28 PID 2132 wrote to memory of 2364 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 28 PID 2132 wrote to memory of 2364 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 28 PID 2364 wrote to memory of 2648 2364 KAgentSilent.exe 29 PID 2364 wrote to memory of 2648 2364 KAgentSilent.exe 29 PID 2364 wrote to memory of 2648 2364 KAgentSilent.exe 29 PID 2364 wrote to memory of 2648 2364 KAgentSilent.exe 29 PID 2364 wrote to memory of 2648 2364 KAgentSilent.exe 29 PID 2364 wrote to memory of 2648 2364 KAgentSilent.exe 29 PID 2364 wrote to memory of 2648 2364 KAgentSilent.exe 29 PID 2132 wrote to memory of 2472 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 30 PID 2132 wrote to memory of 2472 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 30 PID 2132 wrote to memory of 2472 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 30 PID 2132 wrote to memory of 2472 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 30 PID 2132 wrote to memory of 1320 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 31 PID 2132 wrote to memory of 1320 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 31 PID 2132 wrote to memory of 1320 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 31 PID 2132 wrote to memory of 1320 2132 7f3987c0e62a0f3b39848202c79fb95e.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f3987c0e62a0f3b39848202c79fb95e.exe"C:\Users\Admin\AppData\Local\Temp\7f3987c0e62a0f3b39848202c79fb95e.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\KAgentSilent.exeKAgentSilent.exe /a /k /g PLLT9905823878822487 /l "C:\Users\Admin\AppData\Local\Temp\KASetup.log"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\pft737D.tmp\KASetup.exe"C:\Users\Admin\AppData\Local\Temp\pft737D.tmp\KASetup.exe" /k /g PLLT9905823878822487 /l "C:\Users\Admin\AppData\Local\Temp\KASetup.log" /s3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2648
-
-
-
C:\Program Files (x86)\Kaseya\PLLT9905823878822487\KaUsrTsk.exeKaUsrTsk.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2472
-
-
C:\Program Files (x86)\Kaseya\PLLT9905823878822487\AgentMon.exeagentmon.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1320
-
-
C:\Program Files (x86)\Kaseya\PLLT9905823878822487\AgentMon.exe"C:\Program Files (x86)\Kaseya\PLLT9905823878822487\AgentMon.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5f3ccb1bf0ff71f07ae1f58e0d62036d7
SHA1fa05b46e44619e50ee779479543a408596438282
SHA256c845a1a401e3c323c542fe00e9f0c15601664a8f60394c956b4dd61e6ebd7b3e
SHA512e518eb38116dd47acb4df59d34af5583f556fcecbcff9d1f294a8cb5cdae66dd1b2857f67e466b97ecb47cb6c391f222b9efd72ecc38c99f6972d0a3c382751c
-
Filesize
128KB
MD5dc8417c616031edb1b83f1ab2ec44ce9
SHA140cdd6356929b78367829981281fd5ab58e99a0a
SHA2560b75a4525030e63dd0dab96897e7400b774c492aa98ba54c2ba75838a3b2f77c
SHA512a19462ebdf9bc52435275ad512ab08ef3dcf6843e96b85551366b81b38eb1ac676d37518830d6eb3a3b38ba7654b570b3938f6f9543d4e027fb8da79d0bf0b52
-
Filesize
728KB
MD5ddeb42b13cdb7b05521edb45c25a0151
SHA1eaaf15fa2f31dc9881b0f50bf0b9fa6472be774a
SHA25658b6392eef742b2420c8f5ee2b97d25f16e67fcaaf124ef2a751d324e51898cd
SHA512596b4b351d8fc2d4bf5cbc5a0262d22fbcc58d87a04219e5ce9441e5553c73562fabb5ca68fcada88d7a33bcd7262a1d71493e70b7503b1c0e98d525f8ad503f
-
Filesize
113B
MD5b2ec2c7091bf451a7c8fa79c5470afa6
SHA1783fc12f6c36364f804ee24aa386888e730a3843
SHA2566df809c2561177a9b5feac2dfd2142175062f1705f3abaf1a6b901289ae92feb
SHA51206f831a5de9814acf539003aca6ff6777cb08f595570f674cf71bbdab7b3e0b4b07d33f0e62096b80ba9ea51558fa02087f1166cd0b4fb16b46e418d2c389e1e
-
Filesize
316KB
MD561e0870e8352fc42a42e414ed55bf837
SHA1b0ef19d08f40c77b2d31e9dd9aad087fd847a294
SHA256501caa9f031da6a00bfefb5fe1123c730838e5d16476c103218b625935594e82
SHA512aa52a44135095223ae4c0c00deffdba34ceebb693e3877af20d08cccc4d4270cab78b63ca6834e02b9abe676eb09a361a1a17dc5882c6d1aa072db7b1296b12d
-
Filesize
192KB
MD5c294a458a74b57d679307f51f72a22c4
SHA18935aabbd66557956378066c72ea6dc1cd7ee4a5
SHA25661d003402266c86b86180922bf57745424cac42a96770ad3a3b5ae37f8e1948d
SHA5120e7f15ff80b4ef33b5e9665c6d8e87a859630f58bd0b76677b8cd7b238ed0f6dc72ca059def40aae2f34df9abadb7f47a45642f710615b7dfe0231e8debe4160
-
Filesize
2KB
MD5110bcfd4a9b3ace873e40d41ad039b72
SHA15f652ecfb90311a8a2e5a52424d333cc6234f0e0
SHA25604e0218852ef83d415f1497c56088ec001e3fb72af3b487dbe171be13c636c04
SHA512fe9f8c2062f4c2280fd6aaab244d97047e53989ba5817911580744d86177fd42f812a402a740c346e891bdd2b95d2086de19b9822239da025860dfd263616f6a
-
Filesize
130B
MD591b53fe6d4112c8e2902b2503b77b34f
SHA18c5d9afecde2dcbab3d7fca1a72a71419e0fe175
SHA256832c7239546815495b5e1a2676030cfa9999d97278a115db007b6a1a4de36aa2
SHA5124cb779a64fc9aeeb7f08f1bfe11be812e8cfa2a719829a081299ef6b9b039e9cbd92fecdbcb640e15cc117adfe0ae06ed01a2a484db02f6cbda9c173b6cf28cc
-
Filesize
1KB
MD5fbb96c4e7dea859f38b3b63770a95dc8
SHA1adbeebda919089da9d1a7d7176d95c10f9b93588
SHA2564a441b371b7b4f8395cfec3929ef7d776b67780daa3aec3ccf39d1117ab52e7a
SHA512ef7ea131662c2e8435abdaae5db8e4299107d1210746599fbf8524836c5a83ccce2144a85ad41c206e1cd8eb1097099b306eee047b4fdb7dcabdae699fdf3f6f
-
Filesize
10KB
MD5b92aee1727dcfd51ec72c2e0ea48be78
SHA11a7473c4467d0f3c2b38ba13e3461ea8107c357f
SHA256f0ea8bece08e98af97cd1097e0d087284ee6af855ac489e58c969e495499dda9
SHA512a932eb0fef58b0b376429c9a587c2aba28917286961be9b3f447a401478b6be68f2e34825c751cfee5e28941393c897f3677b5a3def591d2f754e99469b983bd
-
Filesize
768KB
MD535937a6b09c3bf0030f8e2f1e3d384f9
SHA12f1ff4503a80065b024ff32c735397b11ff7d044
SHA256738b97ffb0502272b9fbdf1901878b9c1a07e0ff8560939102dacbf4167de3cf
SHA512b75e7e2d490a34a9bfd5d104f12b7443a5a94e82a8d377b28f712297585075fd035899c78d942f0f5fbd5e6931d9463f4346474dc54a87ed35e5d1efe7cd5979
-
Filesize
2KB
MD513644346010e3adc72ba0351f6deb01f
SHA1ca5d893bb118a0e13bb789a8c801e9c355807cc3
SHA256cedba80b7716ecc6afcfe107b2ca9a2ec6ba3db92b805ec35e24e66f91193d26
SHA512ba9287fb35d9495104011f796336507845a2d56fbd92d12eb7be953a829329e4fabbfff83e69fb0bb610eea6d7b0e429cd6a77ccb8c6f5bd756f0c3cc42ef3bf
-
Filesize
92KB
MD5eee3f2a1235b1b098e3b80e75c0f6dc8
SHA183378106bebd65e75c67e148dd490c306dc5c599
SHA2566ec9f8501fef28f0529465be4fc4bf0724d1415ac8883d82ff52c1a86a21447e
SHA5124244370aa297b553e86dd9d280ccf7bd118305a28478f0906dcef3c21263cfac456c1845bda6f48a44c73a569312874ff9dfb6402f87a5fee3da2af768315c7d
-
Filesize
256KB
MD5595f06c2c71ff317679154bd522ab658
SHA1a7431435acc6c8ff1bb15cf738285f128940d935
SHA256cfc77bdfa7c912604a398ebf772581826512d6c0277f293e1182a4084b782170
SHA512cd18cb484dd3ed0706a7175e8c4f9433938669ec87f9317f82e911e4386b1de7cb3f66694139b56842cd9c78252c98094088e11f88b3e99422568beb4145e81b
-
Filesize
128KB
MD5e40db8437c308abfe09305933a92cec2
SHA177a3f4e991ca5ea48c9965f48bf735bbd55e7289
SHA256dba05618ce322ea06a362208239d926ca07ebf8b149e1ff4b30494aff297770c
SHA512478cc07f1fb1f3161a2633118a4226fd5cbe1a153aaed071d68105cf7b4a15ec365b92ad6028e5f5dd7658416b42135592d9e731db0599eec1a6b6cef2bd69a5
-
Filesize
132KB
MD5f97b6619d66d8c7dfe933d19bad26c30
SHA147ef3f568d01a291da2b67bf87085726457f7c9c
SHA256092383b5ca5cdc01969e33f316a775be3bb39e68bd45b8f6cd8943f35383b242
SHA51299c8c172870f6dc57870ad6a69df85c709bc0386b5e898d658bc8f2219e31324f2e2ac82a6ae4c85a65ddd58f5961ffb4fa3aa3e679ecb24b393f6c077f8a2e3
-
Filesize
1.2MB
MD5b88dbe0131aa4cdf9f764f7245badca6
SHA1a9f39985a4104956d45343aba2de4973a4fa07a4
SHA2560c1af4b264fa29fc61c672f1eca7f001cb69fa768dad880a0885c694a5272718
SHA512e2edcc0ea8417104344fe1173e8aa11cc947adafe987f5b6f6d30a1ab8f0d8f3a1e15e163b4745293dd1c75af8e8cc216529ae6b0fa00d7f496f6c3efd863c80
-
Filesize
92KB
MD5abb2df997564f558518fa0a8ec68c719
SHA1cadcbb5731e56114ab4763fbc36f68fe2e7d2c57
SHA256c5be9afb72892b8e45480e9b65d7aec5d04f952d2b092d39c9782387fb901366
SHA51263cac1bdcc601d626a9e52616970386c4ce41b7022e9216cf4e40d962f7cce12e7c42123ef6a52e6a75e212270506e68ff2f6e9223cfb6332479559104ad6b86
-
Filesize
93KB
MD5b9307c8eba7196604005e665d3f1c27f
SHA10bf7a491511f669507a90a09971f3820c1016cba
SHA2566dcfca54a964ec089f7545bf720fe2a3d7092c187df8b729f28a0a266f77f97c
SHA512bcd7d8c029d89111f84feff74700eefd03e0142bbab10bd8e69b12d0c638af69501663fd87f3f7b59771bfbcbe7f7dc44581893949ad33dfa23a4867e7c946c3