Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 07:09
Static task
static1
Behavioral task
behavioral1
Sample
2cce571c426a6471bb5583acd074c11c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cce571c426a6471bb5583acd074c11c.exe
Resource
win10v2004-20231222-en
General
-
Target
2cce571c426a6471bb5583acd074c11c.exe
-
Size
208KB
-
MD5
2cce571c426a6471bb5583acd074c11c
-
SHA1
3de12d16a3cfaae458dcfa91480255e0a2910904
-
SHA256
50f6d1c0f996165d9b02612b748ea1c9b20fb7d31fa9bc785fb99dbec4f170e0
-
SHA512
0e8d3453621d37e65abba2b5b640b09ef2d1113f7618cb893ce46dfcf6859bf4c30200eafd99561cb574026c30daf70227803d0b1c92c866d3e60d68799a794c
-
SSDEEP
6144:2RaWnu5W98TFK/fObT/bGiA14DFsqmVrWkMY9F4G:2sJ5W98TFK/fObT/bGidIrWY9F4G
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2cce571c426a6471bb5583acd074c11c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koudi.exe -
Executes dropped EXE 1 IoCs
pid Process 2436 koudi.exe -
Loads dropped DLL 2 IoCs
pid Process 2852 2cce571c426a6471bb5583acd074c11c.exe 2852 2cce571c426a6471bb5583acd074c11c.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /d" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /r" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /w" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /F" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /m" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /n" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /I" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /k" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /Y" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /x" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /y" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /C" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /L" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /V" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /N" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /J" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /j" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /G" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /e" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /A" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /X" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /R" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /c" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /D" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /U" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /H" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /s" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /E" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /g" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /P" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /B" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /v" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /q" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /p" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /z" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /T" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /t" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /a" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /K" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /Z" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /f" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /X" 2cce571c426a6471bb5583acd074c11c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /W" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /b" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /O" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /o" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /u" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /i" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /M" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /S" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /Q" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /l" koudi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\koudi = "C:\\Users\\Admin\\koudi.exe /h" koudi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2852 2cce571c426a6471bb5583acd074c11c.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe 2436 koudi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2852 2cce571c426a6471bb5583acd074c11c.exe 2436 koudi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2436 2852 2cce571c426a6471bb5583acd074c11c.exe 28 PID 2852 wrote to memory of 2436 2852 2cce571c426a6471bb5583acd074c11c.exe 28 PID 2852 wrote to memory of 2436 2852 2cce571c426a6471bb5583acd074c11c.exe 28 PID 2852 wrote to memory of 2436 2852 2cce571c426a6471bb5583acd074c11c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cce571c426a6471bb5583acd074c11c.exe"C:\Users\Admin\AppData\Local\Temp\2cce571c426a6471bb5583acd074c11c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\koudi.exe"C:\Users\Admin\koudi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD52a99e31e3205bfb184f44b4df7818926
SHA1ec79a9d7d6782ee5911af846d8c74cda9edb6d24
SHA2561160939848eda03db47f4ccddea66e48fbb3f1bbd9beda9f01388924b5548dc3
SHA5125430ddd7403aaba39fdec2f8b7cc04053bdd8a77d5aded4fb31bbc92eaec1d3321bea1147b97ac5c2cb6d019dc655371b461848e0075fc95aad1a5418587d895