Analysis
-
max time kernel
171s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
3d21dd3959166c87ef0fdeaed773998a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d21dd3959166c87ef0fdeaed773998a.exe
Resource
win10v2004-20231215-en
General
-
Target
3d21dd3959166c87ef0fdeaed773998a.exe
-
Size
859KB
-
MD5
3d21dd3959166c87ef0fdeaed773998a
-
SHA1
a351e73c40a33c57054c8485e90de28e6fc60376
-
SHA256
095740b1c9a55ecadf092a977256456eb4e55b98679ca3307e26faa4d9ff76a6
-
SHA512
68eb78bb8c4723c95364b92440bcdd050db520d25242bc1fb2ed4c29b3660cea9f6bbd5607d81155f0fc78cac3dc08e348dafa05cf3a95b1895a77a7558e2c05
-
SSDEEP
24576:I0O+3i+6NjunrVOrE7ofKBeDybRrmFwLTjH:I05VwwVsOmuv7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2740 mr5.exe -
Loads dropped DLL 1 IoCs
pid Process 2788 3d21dd3959166c87ef0fdeaed773998a.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Manager 1 = "C:\\Windows\\KlD.exe" mr5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Manager 2 = "C:\\Windows\\KKl2.exe" mr5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Manager 3 = "C:\\Windows\\KKl3.exe" mr5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Manager 4 = "C:\\Windows\\KKl4.exe" mr5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2788 3d21dd3959166c87ef0fdeaed773998a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2740 mr5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2740 2788 3d21dd3959166c87ef0fdeaed773998a.exe 27 PID 2788 wrote to memory of 2740 2788 3d21dd3959166c87ef0fdeaed773998a.exe 27 PID 2788 wrote to memory of 2740 2788 3d21dd3959166c87ef0fdeaed773998a.exe 27 PID 2788 wrote to memory of 2740 2788 3d21dd3959166c87ef0fdeaed773998a.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d21dd3959166c87ef0fdeaed773998a.exe"C:\Users\Admin\AppData\Local\Temp\3d21dd3959166c87ef0fdeaed773998a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\mr5.exe"C:\Users\Admin\AppData\Local\Temp\mr5.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD56cdccd3e402831bc64ff749875c1d1d9
SHA120739aa83a73599f4fd7fe65906a3c65bff469b1
SHA2565387f7d6572c83a9df2a18909e463e53907a56eebb5478de07150f7a0360a5a5
SHA51274df0d0270a22f31f5428db0dc5291ca35f2ac3c66d8818e59aab52313d5b528b128fffe189825c0917dda46ed140e41c06ce2407de0e758ab63b99099ebe40d