Analysis

  • max time kernel
    151s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 04:06

General

  • Target

    27784be24de5515a2c100c56060fe098.exe

  • Size

    690KB

  • MD5

    27784be24de5515a2c100c56060fe098

  • SHA1

    1d0046bb0ac032246461019524a64537d8eebe35

  • SHA256

    63340c1887fa5b4a8cfe9b760e80f13b021d600c2e80a30e58f3efdc78cfce9f

  • SHA512

    832d0136f25241038ca029080862374b0d3ec880e5bc8920f68c476e2eecc03292db963e84209a18a073148c525fa849012818aecfd6da0153cb0f5181823859

  • SSDEEP

    6144:TniHo6nx2QY7slAFRWNBfrrWK0uTNRiuooqp6pfwWm+gIdJI7K0clyyvzpvT:TSo6xg5kN530xuooqMVwsgS0Tyv9

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 3 IoCs
  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 3 IoCs
  • AutoIT Executable 38 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 18 IoCs
  • Drops file in Windows directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27784be24de5515a2c100c56060fe098.exe
    "C:\Users\Admin\AppData\Local\Temp\27784be24de5515a2c100c56060fe098.exe"
    1⤵
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Windows\SysWOW64\KHATRA.exe
      C:\Windows\system32\KHATRA.exe
      2⤵
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\Xplorer.exe
        "C:\Windows\Xplorer.exe" /Windows
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Windows\System\gHost.exe
          "C:\Windows\System\gHost.exe" /Reproduce
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Suspicious behavior: GetForegroundWindowSpam
          PID:2756
        • C:\Windows\SysWOW64\KHATRA.exe
          C:\Windows\system32\KHATRA.exe
          4⤵
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Modifies WinLogon
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1932
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe
            5⤵
              PID:2604
              • C:\Windows\SysWOW64\at.exe
                AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe
                6⤵
                  PID:2556
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /C RegSvr32 /S C:\Windows\system32\avphost.dll
                5⤵
                  PID:2032
                  • C:\Windows\SysWOW64\regsvr32.exe
                    RegSvr32 /S C:\Windows\system32\avphost.dll
                    6⤵
                      PID:1428
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /C netsh firewall add allowedprogram program=C:\Windows\system32\KHATRA.exe name=System
                    5⤵
                      PID:2996
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh firewall add allowedprogram program=C:\Windows\system32\KHATRA.exe name=System
                        6⤵
                        • Modifies Windows Firewall
                        PID:2924
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /C AT /delete /yes
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2380
                  • C:\Windows\SysWOW64\at.exe
                    AT /delete /yes
                    4⤵
                      PID:1300
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:328
                    • C:\Windows\SysWOW64\at.exe
                      AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe
                      4⤵
                        PID:2456
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /C RegSvr32 /S C:\Windows\system32\avphost.dll
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:584
                      • C:\Windows\SysWOW64\regsvr32.exe
                        RegSvr32 /S C:\Windows\system32\avphost.dll
                        4⤵
                          PID:1348
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /C netsh firewall add allowedprogram program=C:\Windows\system32\KHATRA.exe name=System
                        3⤵
                          PID:2872
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /C AT /delete /yes
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2560
                        • C:\Windows\SysWOW64\at.exe
                          AT /delete /yes
                          3⤵
                            PID:2592
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1860
                          • C:\Windows\SysWOW64\at.exe
                            AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe
                            3⤵
                              PID:2612
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /C RegSvr32 /S C:\Windows\system32\avphost.dll
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2780
                            • C:\Windows\SysWOW64\regsvr32.exe
                              RegSvr32 /S C:\Windows\system32\avphost.dll
                              3⤵
                                PID:1516
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /C netsh firewall add allowedprogram program=C:\Windows\system32\KHATRA.exe name=System
                              2⤵
                                PID:2896
                                • C:\Windows\SysWOW64\netsh.exe
                                  netsh firewall add allowedprogram program=C:\Windows\system32\KHATRA.exe name=System
                                  3⤵
                                  • Modifies Windows Firewall
                                  PID:2884
                            • C:\Windows\SysWOW64\netsh.exe
                              netsh firewall add allowedprogram program=C:\Windows\system32\KHATRA.exe name=System
                              1⤵
                              • Modifies Windows Firewall
                              PID:300
                            • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
                              "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
                              1⤵
                              • Drops file in System32 directory
                              • Drops file in Windows directory
                              • Modifies Internet Explorer settings
                              • Modifies registry class
                              • Suspicious behavior: AddClipboardFormatListener
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of SetWindowsHookEx
                              PID:2096
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /C AT /delete /yes
                              1⤵
                                PID:2100
                                • C:\Windows\SysWOW64\at.exe
                                  AT /delete /yes
                                  2⤵
                                    PID:2788

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

                                  Filesize

                                  1KB

                                  MD5

                                  48dd6cae43ce26b992c35799fcd76898

                                  SHA1

                                  8e600544df0250da7d634599ce6ee50da11c0355

                                  SHA256

                                  7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

                                  SHA512

                                  c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

                                • C:\Windows\SysWOW64\KHATRA.exe

                                  Filesize

                                  99KB

                                  MD5

                                  211fe556d4f12bb44d3f11d775782efe

                                  SHA1

                                  ee6476708f5151d91dff88e019c04c3445215688

                                  SHA256

                                  4fe5995c40d9bbc8c89d78cf89845d9c9f0c760472b5cde4685eca9b139d385f

                                  SHA512

                                  8cdb3e555d96e57a75e15e3eddf332224d94f138dc2d45bfabdd7016a32592aa6f3b5352e59dc66b80b73c033ab27f8ef978b831b7bf9bdca8e241cfbebcd2c5

                                • C:\Windows\SysWOW64\KHATRA.exe

                                  Filesize

                                  30KB

                                  MD5

                                  09da7d0fbd5c71dd7090cb42d8807ec8

                                  SHA1

                                  fc284dc1f2e86b5659faf867a81412127ceaa3d8

                                  SHA256

                                  ebac54d77b1a417cd8d26a4563b0cb2c8a0ba6d50787abef76b5c06c2a7d40eb

                                  SHA512

                                  ed52086563ff47958ec9f675f1f57879d164e2dc002850abdf1663da0413a8fdefdf92b47783b2e1ac353bc0cb0900f3338252d3d196ae9239da1377a94a21e0

                                • C:\Windows\SysWOW64\KHATRA.exe

                                  Filesize

                                  690KB

                                  MD5

                                  27784be24de5515a2c100c56060fe098

                                  SHA1

                                  1d0046bb0ac032246461019524a64537d8eebe35

                                  SHA256

                                  63340c1887fa5b4a8cfe9b760e80f13b021d600c2e80a30e58f3efdc78cfce9f

                                  SHA512

                                  832d0136f25241038ca029080862374b0d3ec880e5bc8920f68c476e2eecc03292db963e84209a18a073148c525fa849012818aecfd6da0153cb0f5181823859

                                • C:\Windows\inf\Autoplay.inF

                                  Filesize

                                  234B

                                  MD5

                                  7ae2f1a7ce729d91acfef43516e5a84c

                                  SHA1

                                  ebbc99c7e5ac5679de2881813257576ec980fb44

                                  SHA256

                                  43b2fee4fbe5b4a83ae32589d11c3f45ad1988dd5357f790ec708fdfd6709a98

                                  SHA512

                                  915b67d31a7034659360355cb00f9620bf9c64cc06660ea55e5fcba0096f1ac782ac7550f778c4874f63082820c03fbbf4dd05169b0de61a661a202f10a4eff9

                                • \Windows\SysWOW64\KHATRA.exe

                                  Filesize

                                  449KB

                                  MD5

                                  a82760a480cd89ae3453c6ebb8d42654

                                  SHA1

                                  1011c008ca27b02dfaa995f366e7da8788b10024

                                  SHA256

                                  2f0c2361c2426561cc650283b73f85def1bb80bd01e9bed7d5c95ab658c0c5a0

                                  SHA512

                                  a92f1559f3a1e5375c014ecf6a4627bb4b2b9c2c1d6f94e23aa97467aca4f4eda862cde5b0782f3037c221f57fe66676fc5487760cc406112e03ba667ad69c5e

                                • \Windows\SysWOW64\KHATRA.exe

                                  Filesize

                                  304KB

                                  MD5

                                  ce970fa6c500a7fec67e688498492788

                                  SHA1

                                  d106d413090d6fb5c61e6ffa2d9b168fa231b899

                                  SHA256

                                  131bf5b96c40627ca40fe9afc22f579da0fa7bdf2bb7f8fb49f8858003867b6d

                                  SHA512

                                  c4c19d0be21a99b0cc644ccd4d4452ae37d777eca1d88ac83a87b631252cc47523c7e360865945a3af2a9548fb4766cc6522df33472046cca94fa3e0a2725b3d

                                • memory/1932-216-0x00000000001F0000-0x0000000000200000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1932-213-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/1932-231-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2096-232-0x000000007342D000-0x0000000073438000-memory.dmp

                                  Filesize

                                  44KB

                                • memory/2096-76-0x000000007342D000-0x0000000073438000-memory.dmp

                                  Filesize

                                  44KB

                                • memory/2096-177-0x000000006C1B1000-0x000000006C1B2000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2096-75-0x000000005FFF0000-0x0000000060000000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2496-228-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2496-30-0x00000000040F0000-0x00000000041E0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2496-0-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2496-56-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2496-176-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2496-5-0x00000000002A0000-0x00000000002B0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2588-212-0x0000000003820000-0x0000000003910000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-234-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-62-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-58-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-274-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-270-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-266-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-205-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-262-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-54-0x0000000003820000-0x0000000003910000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-258-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-253-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-247-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-50-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-229-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-243-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2588-239-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-55-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-63-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-235-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-275-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-240-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-230-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-244-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-59-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-248-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-271-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-254-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-267-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-259-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-206-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2756-263-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2792-57-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2792-31-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2792-208-0x0000000003CA0000-0x0000000003D61000-memory.dmp

                                  Filesize

                                  772KB

                                • memory/2792-204-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2792-207-0x0000000000400000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/2792-35-0x0000000000A80000-0x0000000000A90000-memory.dmp

                                  Filesize

                                  64KB