Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
5s -
max time network
80s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
07/01/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
Kayflockmp4.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
Kayflockmp4.exe
Resource
win10v2004-20231215-en
General
-
Target
Kayflockmp4.exe
-
Size
429KB
-
MD5
b88444cf2c03ce4efe2a1608a379ee53
-
SHA1
68d9285ee72288656c258cf9db9c564226a48ddb
-
SHA256
d70e292a21ebc5ca1675ca585bcae52a51aad4bcee9bbbaf44b0a2cc635b64c7
-
SHA512
7c9e116a417f2a15d2ca3f70b61697c9e34b6131b12221032cde9d64c41993f6f8cfa34196ed99122aa34d59159955d6362827f0d4eee1688bce465539e8d633
-
SSDEEP
12288:Zt5NpMGK6Ia5Jr4IQAvq3eSKXvVZhuwxHvh:Zt5NGGzIo3QSqOS+VZhT
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ loader.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion loader.exe -
Executes dropped EXE 1 IoCs
pid Process 3044 loader.exe -
resource yara_rule behavioral1/memory/3044-4-0x00007FF732D20000-0x00007FF7337BF000-memory.dmp themida behavioral1/files/0x000700000001ac1f-3.dat themida behavioral1/memory/3044-7-0x00007FF732D20000-0x00007FF7337BF000-memory.dmp themida behavioral1/memory/3044-8-0x00007FF732D20000-0x00007FF7337BF000-memory.dmp themida behavioral1/memory/3044-6-0x00007FF732D20000-0x00007FF7337BF000-memory.dmp themida behavioral1/files/0x000700000001ac1f-2.dat themida behavioral1/memory/3044-9-0x00007FF732D20000-0x00007FF7337BF000-memory.dmp themida behavioral1/memory/3044-10-0x00007FF732D20000-0x00007FF7337BF000-memory.dmp themida behavioral1/memory/3044-12-0x00007FF732D20000-0x00007FF7337BF000-memory.dmp themida behavioral1/memory/3044-11-0x00007FF732D20000-0x00007FF7337BF000-memory.dmp themida behavioral1/memory/3044-13-0x00007FF732D20000-0x00007FF7337BF000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3044 loader.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3044 loader.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3044 loader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2112 wrote to memory of 4308 2112 Kayflockmp4.exe 62 PID 2112 wrote to memory of 4308 2112 Kayflockmp4.exe 62 PID 4308 wrote to memory of 3044 4308 cmd.exe 63 PID 4308 wrote to memory of 3044 4308 cmd.exe 63 PID 3044 wrote to memory of 1136 3044 loader.exe 77 PID 3044 wrote to memory of 1136 3044 loader.exe 77 PID 1136 wrote to memory of 3504 1136 cmd.exe 80 PID 1136 wrote to memory of 3504 1136 cmd.exe 80 PID 1136 wrote to memory of 1324 1136 cmd.exe 79 PID 1136 wrote to memory of 1324 1136 cmd.exe 79 PID 1136 wrote to memory of 1360 1136 cmd.exe 78 PID 1136 wrote to memory of 1360 1136 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\Kayflockmp4.exe"C:\Users\Admin\AppData\Local\Temp\Kayflockmp4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\celex-v2\loader.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Roaming\celex-v2\loader.exeC:\Users\Admin\AppData\Roaming\celex-v2\loader.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Roaming\celex-v2\loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"4⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\system32\find.exefind /i /v "certutil"5⤵PID:1360
-
-
C:\Windows\system32\find.exefind /i /v "md5"5⤵PID:1324
-
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Roaming\celex-v2\loader.exe" MD55⤵PID:3504
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5dff3ba57c63f615ff2980c700f4e9bdc
SHA1606a493c14a1ead250f07f46e8a943a14d0788a8
SHA25690ec0d57ae44cb447d256d69daaaa3066d1c528f087a2eae6f0394c915e16fba
SHA5121c6521857ba197c3c60e437aa7a75a84959cee15137ee64695b81322d467e2d4cf7cf408ea1490f54edbd3b657c3b4b78f52b85b6835146f8b279cebebf56221