Analysis
-
max time kernel
164s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:48
Behavioral task
behavioral1
Sample
1661fe280e7b0547e0311427810b32eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1661fe280e7b0547e0311427810b32eb.exe
Resource
win10v2004-20231215-en
General
-
Target
1661fe280e7b0547e0311427810b32eb.exe
-
Size
12KB
-
MD5
1661fe280e7b0547e0311427810b32eb
-
SHA1
205348e83544ced96e69fc32b7b7a9329f69f8bd
-
SHA256
fc02f7a4f86c38c6c01c184574433562233ab915ddb96933512f865505076393
-
SHA512
1558d55875a33ada7252daa38776efb0501662c5a27ac83bd3d5601fe64ca4752c20a690c45761ea896bc5734ae6ed87002c3e1b57583700852f2ccab4619b13
-
SSDEEP
192:rgu7KSO71F/9yeeA7TI1agJ8Yb7gwGQAeHLkUb18btraXX2i5dNy+:rhWSO71R9lKVXb7eet8imi5dh
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2736 kandofttk.exe -
resource yara_rule behavioral2/memory/344-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0006000000023140-4.dat upx behavioral2/memory/2736-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/344-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\kandoftt.dll 1661fe280e7b0547e0311427810b32eb.exe File created C:\Windows\SysWOW64\kandofttk.exe 1661fe280e7b0547e0311427810b32eb.exe File opened for modification C:\Windows\SysWOW64\kandofttk.exe 1661fe280e7b0547e0311427810b32eb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 344 wrote to memory of 2736 344 1661fe280e7b0547e0311427810b32eb.exe 90 PID 344 wrote to memory of 2736 344 1661fe280e7b0547e0311427810b32eb.exe 90 PID 344 wrote to memory of 2736 344 1661fe280e7b0547e0311427810b32eb.exe 90 PID 344 wrote to memory of 2560 344 1661fe280e7b0547e0311427810b32eb.exe 96 PID 344 wrote to memory of 2560 344 1661fe280e7b0547e0311427810b32eb.exe 96 PID 344 wrote to memory of 2560 344 1661fe280e7b0547e0311427810b32eb.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1661fe280e7b0547e0311427810b32eb.exe"C:\Users\Admin\AppData\Local\Temp\1661fe280e7b0547e0311427810b32eb.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\kandofttk.exeC:\Windows\system32\kandofttk.exe ˜‰2⤵
- Executes dropped EXE
PID:2736
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\1661fe280e7b0547e0311427810b32eb.exe.bat2⤵PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD516d172d028d93eb5e9c272ce166666a5
SHA1e083b2a23d25c23118c1baaffbb1d800b507920c
SHA2560632120362882df02f742ee872351d7f8412145792abf47a1f3e70f850c78586
SHA51247931f5f4c551b2b2e063003f90e598852e5a6c04612bbcf7687e91c529b4fd264a074f3f5b5ed8b38c7d267c200ea3046f407848b2a85fc3c38b933ac7fa99f
-
Filesize
12KB
MD51661fe280e7b0547e0311427810b32eb
SHA1205348e83544ced96e69fc32b7b7a9329f69f8bd
SHA256fc02f7a4f86c38c6c01c184574433562233ab915ddb96933512f865505076393
SHA5121558d55875a33ada7252daa38776efb0501662c5a27ac83bd3d5601fe64ca4752c20a690c45761ea896bc5734ae6ed87002c3e1b57583700852f2ccab4619b13