Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:13
Behavioral task
behavioral1
Sample
2b5cee00ff82e1daa01d7e126bf5f717.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b5cee00ff82e1daa01d7e126bf5f717.exe
Resource
win10v2004-20231215-en
General
-
Target
2b5cee00ff82e1daa01d7e126bf5f717.exe
-
Size
12KB
-
MD5
2b5cee00ff82e1daa01d7e126bf5f717
-
SHA1
841e24c623f99927f2bb7ad25944c08015b238b6
-
SHA256
d0ee363254e339c6bb1c0c2a6f23dbe1df41033f7946c964cfd46865fa3651a9
-
SHA512
272bb96087699804976f64486874efcac0a23c7a1d22d9779459fb2eb8de7121531c57f6433fc93049b6df4c30f78e14728e759e56a89a7a274110033a8b9c74
-
SSDEEP
192:DerTNS2LWYWzbRpjt201el5SoDZ70VNydMHJBeuw3ZPoQDgb+e:DerZZWf5uR0gMH6uUFA
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4268 kandofttk.exe -
resource yara_rule behavioral2/memory/1048-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0007000000023229-4.dat upx behavioral2/memory/1048-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4268-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\kandoftt.dll 2b5cee00ff82e1daa01d7e126bf5f717.exe File created C:\Windows\SysWOW64\kandofttk.exe 2b5cee00ff82e1daa01d7e126bf5f717.exe File opened for modification C:\Windows\SysWOW64\kandofttk.exe 2b5cee00ff82e1daa01d7e126bf5f717.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1048 wrote to memory of 4268 1048 2b5cee00ff82e1daa01d7e126bf5f717.exe 88 PID 1048 wrote to memory of 4268 1048 2b5cee00ff82e1daa01d7e126bf5f717.exe 88 PID 1048 wrote to memory of 4268 1048 2b5cee00ff82e1daa01d7e126bf5f717.exe 88 PID 1048 wrote to memory of 1068 1048 2b5cee00ff82e1daa01d7e126bf5f717.exe 100 PID 1048 wrote to memory of 1068 1048 2b5cee00ff82e1daa01d7e126bf5f717.exe 100 PID 1048 wrote to memory of 1068 1048 2b5cee00ff82e1daa01d7e126bf5f717.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b5cee00ff82e1daa01d7e126bf5f717.exe"C:\Users\Admin\AppData\Local\Temp\2b5cee00ff82e1daa01d7e126bf5f717.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\kandofttk.exeC:\Windows\system32\kandofttk.exe ˜‰2⤵
- Executes dropped EXE
PID:4268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2b5cee00ff82e1daa01d7e126bf5f717.exe.bat2⤵PID:1068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5483f7669b291c4f514c81652933c5cb4
SHA1afa2d6de277a75b56edab4c953eb4eef70f873ab
SHA256f6a69070d3d8ad365c2791460a5839d48bee7f4972985a7f475ddc8a1521d43d
SHA5129cb198c39691450148611a3dc93b081a00249db86df3a223e47c1bebf52f818e7b72b95f89887c8a71bda5af712cbac07ef7050a3bc1c732f39f41cc41b434aa
-
Filesize
12KB
MD52b5cee00ff82e1daa01d7e126bf5f717
SHA1841e24c623f99927f2bb7ad25944c08015b238b6
SHA256d0ee363254e339c6bb1c0c2a6f23dbe1df41033f7946c964cfd46865fa3651a9
SHA512272bb96087699804976f64486874efcac0a23c7a1d22d9779459fb2eb8de7121531c57f6433fc93049b6df4c30f78e14728e759e56a89a7a274110033a8b9c74