Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/01/2024, 16:49

General

  • Target

    750275be8b7a59683214567ba5032dc0.exe

  • Size

    88KB

  • MD5

    750275be8b7a59683214567ba5032dc0

  • SHA1

    dbe35201b79b8ac74430d450485314dde69211d7

  • SHA256

    f3855a4136db942476d91e007c610b3f9d0454201616f2e63a1a1fc7fbd98af0

  • SHA512

    4fdcb76420a6d40968afe8e2d8d0db40052244df065e6a95715f09df599f80e45b05cc184148126f8c3a38a3b01d7889d0dcd779ca53cf59670ea35bb4240220

  • SSDEEP

    1536:SdS4HSpy8tXG06YpqdXTsYJ/F+FBFIFGFYF7DUZxTZNCa:ZuSs0G0mZAD

Malware Config

Signatures

  • Kinsing

    Kinsing is a loader written in Golang.

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\750275be8b7a59683214567ba5032dc0.exe
    "C:\Users\Admin\AppData\Local\Temp\750275be8b7a59683214567ba5032dc0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\gwcex.exe
      "C:\Users\Admin\gwcex.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gwcex.exe

    Filesize

    88KB

    MD5

    0f61713c9aacc025b0f1a517e57b9749

    SHA1

    f1c2875f97b3242a2f2a9ff396598e60b1a74251

    SHA256

    7afd27d86e735dbd099917797abf1be94f152b6102252c0ed45f4747ddf1c8df

    SHA512

    ccec664af79783f86d7ff2cafc1cd5a18dfe2258c407b8b2855c57a68d3396bf1b2222cfec6476919d321af680b160eaa6522ce7b52803781a960c4167aeb1aa