Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
koanvcd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
koanvcd.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20231222-en
General
-
Target
koanvcd.exe
-
Size
4.9MB
-
MD5
0ba02470dbcd7fff0d34e9627efad172
-
SHA1
ec8ece62cf17be713704504a544d3555ade7572f
-
SHA256
3f80b9f6d898273da0a7aeb3c342f1132215d1916888b3df4ea7d8bead58a4ad
-
SHA512
15b5c4ddbd67e0d8e68abc306cf58bddfa7b0169c780336fc9d9b811e03e995258782f7d9c0f878a96ce52dad3b7c5f943a679a21813bc460a381ca3d13683d2
-
SSDEEP
98304:Apc3HUGljmttNTPVJ3Ma+0Aa6CNy1chpffSyWtO2XZ3h6NnRfwR3C3p1iEAx+leS:p35k3h7caRNy1mpffS8a3ApkEA8NJ3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 788 is-TGF6C.tmp -
Loads dropped DLL 2 IoCs
pid Process 788 is-TGF6C.tmp 788 is-TGF6C.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3784 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2372 wrote to memory of 788 2372 koanvcd.exe 90 PID 2372 wrote to memory of 788 2372 koanvcd.exe 90 PID 2372 wrote to memory of 788 2372 koanvcd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\koanvcd.exe"C:\Users\Admin\AppData\Local\Temp\koanvcd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\is-ETSME.tmp\is-TGF6C.tmp"C:\Users\Admin\AppData\Local\Temp\is-ETSME.tmp\is-TGF6C.tmp" /SL4 $501D0 "C:\Users\Admin\AppData\Local\Temp\koanvcd.exe" 4930971 506882⤵
- Executes dropped EXE
- Loads dropped DLL
PID:788
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2324
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD562e88f8e307b0bf6cdcff9008fd6e4f6
SHA13a76f5b490f5390b49430a8d7ff3dd13e734d88b
SHA256bbc70c71ad37a0d823fcbb9849cfc843bfd1ee60b2c5677fbfc588386bba7e6c
SHA512f4f474e86bc03eaf74f05a4d7c893950fce11be0e2c3608035afb4ad007c6eff28450412ad638d60a210dbb0974adb15857c250430d9a003c7bf66cc14965be5
-
Filesize
32KB
MD5b4786eb1e1a93633ad1b4c112514c893
SHA1734750b771d0809c88508e4feb788d7701e6dada
SHA2562ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f
SHA5120882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6
-
Filesize
641KB
MD5fa8621bfc44318a0e45e5a3414345318
SHA129de99e82aa87911d0761c95632ffec405164d93
SHA2566297413b839879d5ca391c1b8a3568bb07bee509748bcc6aa5b9906eaab8ae84
SHA512797d3a9167b200f5eb8c2077d0e72d3359e602c8a665d6f0bec95387e7a8ffa5e7d4f3a0a827eb0cfb6f17392a8856624c01d9f5231d67d619dcc982c5ede1dc