Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 16:21

General

  • Target

    74f54405991dc0d284f3158f9266d7e3.exe

  • Size

    1.8MB

  • MD5

    74f54405991dc0d284f3158f9266d7e3

  • SHA1

    eb8b23809c1a72144ef5d3dbec92b8445b790795

  • SHA256

    e68b96f0e99e4b6aebbedd626fbb369c369c8507f5b5cea9013eb3e0ea83e23f

  • SHA512

    3087f74eed15eb522b7938da4859daf0d0af1d13adc1ad23810b599839e94cdc7074ab06a48fae0cce4d2958c5a94ffe799cb9ea1891877ef0b812bf4f1cbbd9

  • SSDEEP

    12288:OsD8BFyOmcNPYmzQ5J0T0aTE6chIoLXGtfbapRVczyu1jZ9sM2cTWzEOk0ksmVgX:FHcNPYDj0T0z6UsapRVclccTWwPdse

Malware Config

Signatures

  • Kinsing

    Kinsing is a loader written in Golang.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74f54405991dc0d284f3158f9266d7e3.exe
    "C:\Users\Admin\AppData\Local\Temp\74f54405991dc0d284f3158f9266d7e3.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Windows\SysWOW64\FileEn.exe
      "C:\Windows\system32\FileEn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1268
    • C:\Windows\SysWOW64\FileEn.exe
      "C:\Windows\system32\FileEn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\FileEn.exe
    Filesize

    260KB

    MD5

    3c0a05b660e41423fec63815f4549e69

    SHA1

    4feb0a4a9a592f80d6f2d2a27396654fa3eea816

    SHA256

    b2d49e811a4702709533a500f857149647ac7b8c384c8e5a23a4cbecc664856e

    SHA512

    c54192e74d646d61a48b65a4df31b1a9757fe9855f91e60f932f9254ce735808bac17c6ada4a34ef38247852ca48d674140f93e135c008e3c4728f7b087105ce

  • C:\Windows\SysWOW64\face.dll
    Filesize

    276KB

    MD5

    71ae7d6dbb221bf825cc859f5db4a364

    SHA1

    71ba7e47e29f196d3a4b39747dc2ab287189409c

    SHA256

    5c02f694e1a8fcd4c81c01014f5aaa011fa5aa4e84ee4adf37f3006082b79083

    SHA512

    9a4a26b016912f94c3a4b68d23969dc60451bcbb37f0fa9f5c80b315d5819eab931a188618141dbe6972ca7d8dbaaf03c69001b6feb3fe83e9870efc13254a26

  • C:\Windows\win.ini
    Filesize

    137B

    MD5

    93613a490ade72e94dbc22fa31eb22b7

    SHA1

    81b7c3b0a65903269b1ce283d4116a3203e1f2cd

    SHA256

    506340e9929af77978ab54302c666617b5284d31445fec920fa4e45cfd8ab2fd

    SHA512

    f9c170d2b5dd8895f5f5c2c41760c1798b6c32b36c5c3578d181761cc0d7db434317e61b02a996717c38cb144e8ca26b9d1e1bb5954729d3403da1ee1fe6cf95

  • C:\Windows\win.ini
    Filesize

    145B

    MD5

    174407b874d65b40238230e03e6f320d

    SHA1

    5fb2257b55212fada41762620ef1790140596391

    SHA256

    abba7020e1302e30efcc8c81ec8990616746d826732ace729f18d3bae11e3dc4

    SHA512

    b58665ebe7a1dbbb0ecc86d0e864c2a22797434690a54681c5317893275faa326691c675d7faa939b5e5730e5e5c0c2c7cf90fd538c0ee18559def71c18cd231