Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2024 17:51

General

  • Target

    Kiwi X External/onnxruntime.lib

  • Size

    3KB

  • MD5

    ca4908ed818ac768923571139b8aa5f3

  • SHA1

    b11d0cd21f707affb631d40807f1678512325af6

  • SHA256

    3c056212d5a26be8b66210a240ee5c546bac451521e93c75feceb9b6e2c82449

  • SHA512

    c1478f347b74ccfa5effd03fde232886300e8a291d8e58b9d6653fbe464670e08d0dd3196b5347d8f8c21e8f7cc79514ea6b4e2c19466cd636a9231ebe081d7d

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Kiwi X External\onnxruntime.lib"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Kiwi X External\onnxruntime.lib
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Kiwi X External\onnxruntime.lib"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8231843ee9301912ed0a474e81ed3c44

    SHA1

    13eb1a09debd43a2b7b047de8c91e1a1850ad1ec

    SHA256

    f1ae37bb2d2e8fb6282f5bf0d4208af4fc1275fea54467f134bda58b108076ec

    SHA512

    ae48ef6081b6c2717b2954da11d8809a6414171e9bafb19603ef2c04b9181b5178a36aea1997588ca0fb806c91afb9a964f225f3666a9f83d2765e3f7efd410c