Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:48
Behavioral task
behavioral1
Sample
1661fe280e7b0547e0311427810b32eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1661fe280e7b0547e0311427810b32eb.exe
Resource
win10v2004-20231215-en
General
-
Target
1661fe280e7b0547e0311427810b32eb.exe
-
Size
12KB
-
MD5
1661fe280e7b0547e0311427810b32eb
-
SHA1
205348e83544ced96e69fc32b7b7a9329f69f8bd
-
SHA256
fc02f7a4f86c38c6c01c184574433562233ab915ddb96933512f865505076393
-
SHA512
1558d55875a33ada7252daa38776efb0501662c5a27ac83bd3d5601fe64ca4752c20a690c45761ea896bc5734ae6ed87002c3e1b57583700852f2ccab4619b13
-
SSDEEP
192:rgu7KSO71F/9yeeA7TI1agJ8Yb7gwGQAeHLkUb18btraXX2i5dNy+:rhWSO71R9lKVXb7eet8imi5dh
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2716 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1956 kandofttk.exe -
Loads dropped DLL 2 IoCs
pid Process 3020 1661fe280e7b0547e0311427810b32eb.exe 3020 1661fe280e7b0547e0311427810b32eb.exe -
resource yara_rule behavioral1/memory/3020-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000c000000015b12-3.dat upx behavioral1/memory/3020-4-0x00000000002B0000-0x00000000002BF000-memory.dmp upx behavioral1/memory/1956-11-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/3020-12-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\kandoftt.dll 1661fe280e7b0547e0311427810b32eb.exe File created C:\Windows\SysWOW64\kandofttk.exe 1661fe280e7b0547e0311427810b32eb.exe File opened for modification C:\Windows\SysWOW64\kandofttk.exe 1661fe280e7b0547e0311427810b32eb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1956 3020 1661fe280e7b0547e0311427810b32eb.exe 28 PID 3020 wrote to memory of 1956 3020 1661fe280e7b0547e0311427810b32eb.exe 28 PID 3020 wrote to memory of 1956 3020 1661fe280e7b0547e0311427810b32eb.exe 28 PID 3020 wrote to memory of 1956 3020 1661fe280e7b0547e0311427810b32eb.exe 28 PID 3020 wrote to memory of 2716 3020 1661fe280e7b0547e0311427810b32eb.exe 29 PID 3020 wrote to memory of 2716 3020 1661fe280e7b0547e0311427810b32eb.exe 29 PID 3020 wrote to memory of 2716 3020 1661fe280e7b0547e0311427810b32eb.exe 29 PID 3020 wrote to memory of 2716 3020 1661fe280e7b0547e0311427810b32eb.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1661fe280e7b0547e0311427810b32eb.exe"C:\Users\Admin\AppData\Local\Temp\1661fe280e7b0547e0311427810b32eb.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\kandofttk.exeC:\Windows\system32\kandofttk.exe ˜‰2⤵
- Executes dropped EXE
PID:1956
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1661fe280e7b0547e0311427810b32eb.exe.bat2⤵
- Deletes itself
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD516d172d028d93eb5e9c272ce166666a5
SHA1e083b2a23d25c23118c1baaffbb1d800b507920c
SHA2560632120362882df02f742ee872351d7f8412145792abf47a1f3e70f850c78586
SHA51247931f5f4c551b2b2e063003f90e598852e5a6c04612bbcf7687e91c529b4fd264a074f3f5b5ed8b38c7d267c200ea3046f407848b2a85fc3c38b933ac7fa99f
-
Filesize
12KB
MD51661fe280e7b0547e0311427810b32eb
SHA1205348e83544ced96e69fc32b7b7a9329f69f8bd
SHA256fc02f7a4f86c38c6c01c184574433562233ab915ddb96933512f865505076393
SHA5121558d55875a33ada7252daa38776efb0501662c5a27ac83bd3d5601fe64ca4752c20a690c45761ea896bc5734ae6ed87002c3e1b57583700852f2ccab4619b13