Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18-02-2024 14:55

General

  • Target

    Kiyauri.exe

  • Size

    1020KB

  • MD5

    18d09b9b04700f6c7f428601d7a67bbd

  • SHA1

    1638862d728bd1f85f82bbb317d4fd1b8527785c

  • SHA256

    3e76a0e462731f17352f844a607b4aab947e33939e69748892e787fb1391e11d

  • SHA512

    5780dd070f74cf709c4d69bb34e92982719a1276b57f40bc148d2296d9cc0b329bc9c362a15db51b04cab6312f74f6ad8cc61bd496a444b7a4272ea1de5362b4

  • SSDEEP

    12288:em58Vkc0ZX3FVks7iGSq5cR5e/SnWa6BQy4y9wZYsC9xqsXiCAzqc0CSLxidFCvd:em59jkIuzeqx92c0CSlidQrn5Ldq+Lb

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Kiyauri.exe
    "C:\Users\Admin\AppData\Local\Temp\Kiyauri.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2156

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads