Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
5s -
max time network
82s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
Kayflockmp4.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
Kayflockmp4.exe
Resource
win10v2004-20231215-en
General
-
Target
Kayflockmp4.exe
-
Size
429KB
-
MD5
b88444cf2c03ce4efe2a1608a379ee53
-
SHA1
68d9285ee72288656c258cf9db9c564226a48ddb
-
SHA256
d70e292a21ebc5ca1675ca585bcae52a51aad4bcee9bbbaf44b0a2cc635b64c7
-
SHA512
7c9e116a417f2a15d2ca3f70b61697c9e34b6131b12221032cde9d64c41993f6f8cfa34196ed99122aa34d59159955d6362827f0d4eee1688bce465539e8d633
-
SSDEEP
12288:Zt5NpMGK6Ia5Jr4IQAvq3eSKXvVZhuwxHvh:Zt5NGGzIo3QSqOS+VZhT
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ loader.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion loader.exe -
Executes dropped EXE 1 IoCs
pid Process 5068 loader.exe -
resource yara_rule behavioral2/files/0x001000000002313c-3.dat themida behavioral2/files/0x001000000002313c-2.dat themida behavioral2/memory/5068-4-0x00007FF63C020000-0x00007FF63CABF000-memory.dmp themida behavioral2/memory/5068-7-0x00007FF63C020000-0x00007FF63CABF000-memory.dmp themida behavioral2/memory/5068-6-0x00007FF63C020000-0x00007FF63CABF000-memory.dmp themida behavioral2/memory/5068-8-0x00007FF63C020000-0x00007FF63CABF000-memory.dmp themida behavioral2/memory/5068-9-0x00007FF63C020000-0x00007FF63CABF000-memory.dmp themida behavioral2/memory/5068-10-0x00007FF63C020000-0x00007FF63CABF000-memory.dmp themida behavioral2/memory/5068-11-0x00007FF63C020000-0x00007FF63CABF000-memory.dmp themida behavioral2/memory/5068-12-0x00007FF63C020000-0x00007FF63CABF000-memory.dmp themida behavioral2/memory/5068-13-0x00007FF63C020000-0x00007FF63CABF000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5068 loader.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5068 loader.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5068 loader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1260 wrote to memory of 3536 1260 Kayflockmp4.exe 92 PID 1260 wrote to memory of 3536 1260 Kayflockmp4.exe 92 PID 3536 wrote to memory of 5068 3536 cmd.exe 93 PID 3536 wrote to memory of 5068 3536 cmd.exe 93 PID 5068 wrote to memory of 2880 5068 loader.exe 99 PID 5068 wrote to memory of 2880 5068 loader.exe 99 PID 2880 wrote to memory of 4756 2880 cmd.exe 100 PID 2880 wrote to memory of 4756 2880 cmd.exe 100 PID 2880 wrote to memory of 5116 2880 cmd.exe 102 PID 2880 wrote to memory of 5116 2880 cmd.exe 102 PID 2880 wrote to memory of 1228 2880 cmd.exe 101 PID 2880 wrote to memory of 1228 2880 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\Kayflockmp4.exe"C:\Users\Admin\AppData\Local\Temp\Kayflockmp4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\celex-v2\loader.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Roaming\celex-v2\loader.exeC:\Users\Admin\AppData\Roaming\celex-v2\loader.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Roaming\celex-v2\loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"4⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Roaming\celex-v2\loader.exe" MD55⤵PID:4756
-
-
C:\Windows\system32\find.exefind /i /v "certutil"5⤵PID:1228
-
-
C:\Windows\system32\find.exefind /i /v "md5"5⤵PID:5116
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5013f74cfeee40a328b2caad8877bc31a
SHA13cf8b79640aefac1eff40a9f02c33580ff2ae519
SHA256e48319f91145a6cda95994fa05d0d06dbdc8ad43b86929540d1c05863fb91f23
SHA512e4f23a943768a41960e10141c3c52191e402eca5ba65d00f0e54e082cdc81fc13f53d64211e8cc17ad296edc811214195245a64cf8d612edeb6b382e8ea3b9f8