Analysis
-
max time kernel
64s -
max time network
73s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/01/2024, 17:33
Static task
static1
General
-
Target
Kayflockmp4.exe
-
Size
429KB
-
MD5
b88444cf2c03ce4efe2a1608a379ee53
-
SHA1
68d9285ee72288656c258cf9db9c564226a48ddb
-
SHA256
d70e292a21ebc5ca1675ca585bcae52a51aad4bcee9bbbaf44b0a2cc635b64c7
-
SHA512
7c9e116a417f2a15d2ca3f70b61697c9e34b6131b12221032cde9d64c41993f6f8cfa34196ed99122aa34d59159955d6362827f0d4eee1688bce465539e8d633
-
SSDEEP
12288:Zt5NpMGK6Ia5Jr4IQAvq3eSKXvVZhuwxHvh:Zt5NGGzIo3QSqOS+VZhT
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ loader.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion loader.exe -
Executes dropped EXE 1 IoCs
pid Process 5044 loader.exe -
resource yara_rule behavioral1/files/0x000200000002a7ca-3.dat themida behavioral1/files/0x000200000002a7ca-2.dat themida behavioral1/memory/5044-4-0x00007FF641090000-0x00007FF641B2F000-memory.dmp themida behavioral1/memory/5044-6-0x00007FF641090000-0x00007FF641B2F000-memory.dmp themida behavioral1/memory/5044-7-0x00007FF641090000-0x00007FF641B2F000-memory.dmp themida behavioral1/memory/5044-8-0x00007FF641090000-0x00007FF641B2F000-memory.dmp themida behavioral1/memory/5044-9-0x00007FF641090000-0x00007FF641B2F000-memory.dmp themida behavioral1/memory/5044-10-0x00007FF641090000-0x00007FF641B2F000-memory.dmp themida behavioral1/memory/5044-11-0x00007FF641090000-0x00007FF641B2F000-memory.dmp themida behavioral1/memory/5044-12-0x00007FF641090000-0x00007FF641B2F000-memory.dmp themida behavioral1/memory/5044-13-0x00007FF641090000-0x00007FF641B2F000-memory.dmp themida behavioral1/memory/5044-14-0x00007FF641090000-0x00007FF641B2F000-memory.dmp themida behavioral1/memory/5044-15-0x00007FF641090000-0x00007FF641B2F000-memory.dmp themida behavioral1/memory/5044-18-0x00007FF641090000-0x00007FF641B2F000-memory.dmp themida behavioral1/memory/5044-19-0x00007FF641090000-0x00007FF641B2F000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5044 loader.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5044 loader.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5044 loader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2884 wrote to memory of 1744 2884 Kayflockmp4.exe 80 PID 2884 wrote to memory of 1744 2884 Kayflockmp4.exe 80 PID 1744 wrote to memory of 5044 1744 cmd.exe 81 PID 1744 wrote to memory of 5044 1744 cmd.exe 81 PID 5044 wrote to memory of 4208 5044 loader.exe 83 PID 5044 wrote to memory of 4208 5044 loader.exe 83 PID 4208 wrote to memory of 5064 4208 cmd.exe 84 PID 4208 wrote to memory of 5064 4208 cmd.exe 84 PID 4208 wrote to memory of 1464 4208 cmd.exe 86 PID 4208 wrote to memory of 1464 4208 cmd.exe 86 PID 4208 wrote to memory of 4320 4208 cmd.exe 85 PID 4208 wrote to memory of 4320 4208 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Kayflockmp4.exe"C:\Users\Admin\AppData\Local\Temp\Kayflockmp4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\celex-v2\loader.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Roaming\celex-v2\loader.exeC:\Users\Admin\AppData\Roaming\celex-v2\loader.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Roaming\celex-v2\loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"4⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Roaming\celex-v2\loader.exe" MD55⤵PID:5064
-
-
C:\Windows\system32\find.exefind /i /v "certutil"5⤵PID:4320
-
-
C:\Windows\system32\find.exefind /i /v "md5"5⤵PID:1464
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD51e2867e4f0c07da6a132d7694e238882
SHA1265bec89666ea429d0606f05cddf334a3b69b043
SHA256290b2abac6de033aff7f336a09772076edd2b877585210d47bcde949206788cd
SHA5123337ae8feb83ae9bf7a2eb982afee9924e6fea60c8b40d80db7adc1160493edb430c36bdbebf74812e2748eef7310475250282d5d36202967cd617b05b0a1395
-
Filesize
1.9MB
MD5a7bc206525c7892cfbaa59a544c13849
SHA154d4a284b005cccbe40700cbebd0762b5512241f
SHA2560cdc6c1be8071c7fdf64c365ea7ce1fc411c4cae867afdc256eb8d6b729859c5
SHA5124506ff3e95346ecaa4a6480c8c9328bf9e0dd2860583dfff0e393972cb9e13f6a7d5d526c6853289a8522a7db113e9294e3bf8be386a78b2e88f6a8626c79068