Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 09:42

General

  • Target

    ab963de9a3c0910c956f143a25c852cf.exe

  • Size

    200KB

  • MD5

    ab963de9a3c0910c956f143a25c852cf

  • SHA1

    f44d8221f5025f5cab02014f2eab30e8025ee678

  • SHA256

    194f6c208e07e47126954b669ac23e5d4a3887446a11ba6413f833fc04559fa0

  • SHA512

    660533d8bbf50c16a4f908de69784c96cf6dd81ff2363550fbb32c50360a229757000dba2bcbebdc54abb6ad75257f8c4baa54aae471dfb64a61cc3f241c76e3

  • SSDEEP

    3072:qULVk0tQ9nLHbB9WHCS0AgTlhsp3mWK8:G4QxL7B9WHK9Jhsp3t

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab963de9a3c0910c956f143a25c852cf.exe
    "C:\Users\Admin\AppData\Local\Temp\ab963de9a3c0910c956f143a25c852cf.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Users\Admin\kaiivif.exe
      "C:\Users\Admin\kaiivif.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\kaiivif.exe

    Filesize

    200KB

    MD5

    b57247970adfa291b4e284fce779963c

    SHA1

    e696624774044ae8731ad4cf8f0101ae261d16b4

    SHA256

    740f97e03b88b6aea9500048e358ba97def227374694a6707dfbf5688f6e99ae

    SHA512

    35a874c3fa13f2ec66ea80a3906fa1c1f125be806cb7507151dbe2507901fa55c83ed6b59dfd47b53b26306bf2628507f78c6b74d56f3f5c11c943f678c59d4e