Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 12:53

General

  • Target

    klmcodec157.exe

  • Size

    31.5MB

  • MD5

    aaaa1465406a2de2778b8062b4aa73d2

  • SHA1

    7f649c547f9849378a0216d5751ca72b68477464

  • SHA256

    67ec986d7f9b8f50e4d8fe11df1a65826cd30b8f7c23b1a237ecb06e4a08c701

  • SHA512

    d1fc4799f75978fd035646ba10eea81fad5d278c9420b5844dc16c33c9e96fad9202dff94be1a119ca98b6a2816343cfe839da191da8a3e18491fe2e8766b957

  • SSDEEP

    786432:UYAMS+oVcz29/sXlGXKzcS2nV7PWWnd72Qc1T:PVoVr9u86zfIQWR2B1T

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\klmcodec157.exe
    "C:\Users\Admin\AppData\Local\Temp\klmcodec157.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\is-2SFKK.tmp\is-QE96I.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2SFKK.tmp\is-QE96I.tmp" /SL4 $400EE "C:\Users\Admin\AppData\Local\Temp\klmcodec157.exe" 32667387 190464
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1752

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1752-22-0x0000000000400000-0x00000000004D2000-memory.dmp

          Filesize

          840KB

        • memory/2032-0-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2032-21-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB