Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 17:32

General

  • Target

    tmp.exe

  • Size

    301KB

  • MD5

    d7e07baf23641fa08a4067ca07ea4b4d

  • SHA1

    eda4e790cde8b30cb46558b94415e4a916f56e78

  • SHA256

    c7cbef34bbc2ae01c9131646954a2fec8ab6f7cbd70ee2d92eada6796884e1b8

  • SHA512

    ffc65c88345d482bbfe100f8ca804b4470dedab81c580873e5134872d41aa74c9bb11c3978165b0f62e275b2c95f2c158f02222d02e64f7e794bc157699f89a5

  • SSDEEP

    6144:HhjGvEehzo1urn+utlHJ3hfcAOqGJF/p/uwONct43j92UysA:H12Eehzo1uDkf9pGHNu4B2UW

Score
10/10

Malware Config

Signatures

  • Kinsing

    Kinsing is a loader written in Golang.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3048-2-0x0000000003140000-0x0000000003141000-memory.dmp

    Filesize

    4KB

  • memory/3048-3-0x0000000003170000-0x00000000031F1000-memory.dmp

    Filesize

    516KB

  • memory/3048-5-0x0000000003200000-0x0000000003222000-memory.dmp

    Filesize

    136KB

  • memory/3048-4-0x0000000003200000-0x0000000003222000-memory.dmp

    Filesize

    136KB

  • memory/3048-7-0x0000000003200000-0x0000000003222000-memory.dmp

    Filesize

    136KB

  • memory/3048-6-0x0000000003200000-0x0000000003222000-memory.dmp

    Filesize

    136KB

  • memory/3048-8-0x0000000003200000-0x0000000003222000-memory.dmp

    Filesize

    136KB

  • memory/3048-11-0x0000000003950000-0x0000000003988000-memory.dmp

    Filesize

    224KB

  • memory/3048-10-0x0000000003950000-0x0000000003988000-memory.dmp

    Filesize

    224KB

  • memory/3048-9-0x00000000037D0000-0x0000000003802000-memory.dmp

    Filesize

    200KB

  • memory/3048-12-0x0000000003950000-0x0000000003988000-memory.dmp

    Filesize

    224KB

  • memory/3048-14-0x0000000003950000-0x0000000003988000-memory.dmp

    Filesize

    224KB

  • memory/3048-13-0x0000000003950000-0x0000000003988000-memory.dmp

    Filesize

    224KB

  • memory/3048-15-0x0000000003200000-0x0000000003222000-memory.dmp

    Filesize

    136KB

  • memory/3048-16-0x0000000003200000-0x0000000003222000-memory.dmp

    Filesize

    136KB

  • memory/3048-17-0x0000000003950000-0x0000000003988000-memory.dmp

    Filesize

    224KB