Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
1af1533ac75b4f97a14379e2ac40b443.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1af1533ac75b4f97a14379e2ac40b443.exe
Resource
win10v2004-20231215-en
General
-
Target
1af1533ac75b4f97a14379e2ac40b443.exe
-
Size
68KB
-
MD5
1af1533ac75b4f97a14379e2ac40b443
-
SHA1
8dceab38f06c928f1579cced18f2d4a8df9092bc
-
SHA256
e729074d65ce761b11fb67cac02a649429ffa5559ef4b26d2d4a6becc6a3f93e
-
SHA512
aab5e0ecb761408fedf7bb0bced84be591ad04fe5c23b114211d4305000ae3efc33af96284ce1b327a5cfdaa58de55408b074cb601aff19be090d9779ff3d407
-
SSDEEP
768:4kEKyxucojQ1lpocrtp/cLN15OAcJ2pzp4F9ZWyzhTqHJrm5SrQ3c:4f3ZFGo2tADzh2H1mc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2152 kcien32.exe 3064 kcien32.exe -
Loads dropped DLL 4 IoCs
pid Process 2436 1af1533ac75b4f97a14379e2ac40b443.exe 2436 1af1533ac75b4f97a14379e2ac40b443.exe 2152 kcien32.exe 2152 kcien32.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\kcien32.ini 1af1533ac75b4f97a14379e2ac40b443.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe 1af1533ac75b4f97a14379e2ac40b443.exe File created C:\Windows\SysWOW64\kcien32.exe 1af1533ac75b4f97a14379e2ac40b443.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2152 2436 1af1533ac75b4f97a14379e2ac40b443.exe 28 PID 2436 wrote to memory of 2152 2436 1af1533ac75b4f97a14379e2ac40b443.exe 28 PID 2436 wrote to memory of 2152 2436 1af1533ac75b4f97a14379e2ac40b443.exe 28 PID 2436 wrote to memory of 2152 2436 1af1533ac75b4f97a14379e2ac40b443.exe 28 PID 2152 wrote to memory of 3064 2152 kcien32.exe 29 PID 2152 wrote to memory of 3064 2152 kcien32.exe 29 PID 2152 wrote to memory of 3064 2152 kcien32.exe 29 PID 2152 wrote to memory of 3064 2152 kcien32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1af1533ac75b4f97a14379e2ac40b443.exe"C:\Users\Admin\AppData\Local\Temp\1af1533ac75b4f97a14379e2ac40b443.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe3⤵
- Executes dropped EXE
PID:3064
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260B
MD56f70799414a66f929b6558edd5532a90
SHA181c35b31b16823a3ffc4cb501a4d4717dc80d1db
SHA25642039061e9c93b4d450ab0cec73cfcf642f09e8eade9057df2921c5f5162d663
SHA5123ba5046e8b07a38cbcf541b878d4a69f7864bb4ed0558beb5e756344b665835c3bdc38c6d8f3da2ccca91873ee4ec9f460a4a26ffe346d38e99e6e4895bb647b
-
Filesize
68KB
MD51af1533ac75b4f97a14379e2ac40b443
SHA18dceab38f06c928f1579cced18f2d4a8df9092bc
SHA256e729074d65ce761b11fb67cac02a649429ffa5559ef4b26d2d4a6becc6a3f93e
SHA512aab5e0ecb761408fedf7bb0bced84be591ad04fe5c23b114211d4305000ae3efc33af96284ce1b327a5cfdaa58de55408b074cb601aff19be090d9779ff3d407