Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-03-2024 01:08

General

  • Target

    Email-Worm/Kiray.exe

  • Size

    13KB

  • MD5

    f22ae972aee081ec86faa30e73d9675f

  • SHA1

    a559057e10f7e524688043ca283e2380739d6744

  • SHA256

    166865fdb90e7964e7ea57a282343026d878230215e5694145f88a8afb56132f

  • SHA512

    80c000c1ee73a402d0960ee768272096541786eacda7b938f9791ca3da067f5838c6850c74dff466cccde11851989062328b4a3d87b2eb99a6cac0efcf45f4c1

  • SSDEEP

    384:XTm/Ye8zdTyBsyqAIZhgMFfpX5xqd1SJ5m:XHWsyqAggUnJI

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Email-Worm\Kiray.exe
    "C:\Users\Admin\AppData\Local\Temp\Email-Worm\Kiray.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2684
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2976

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT
    Filesize

    240KB

    MD5

    507e3c7de7367c22743c8dad80a5c458

    SHA1

    22c3ecf97bc9c306a0f785a399debbfd94d95a00

    SHA256

    9c66bd2231de909b331f31b69d422673b7cd6a6625e1acb3db0d89b4e2c88dc5

    SHA512

    3c26a3a30f44163bc2441726005e8e0fda70cbab03f8095e32b9c87c7a0c5cffe704efc28c707f720a0032fd90de2a8bf97f77189c5deb141797cd098190c24c

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT
    Filesize

    240KB

    MD5

    ec85cfee2e5fe87c540ebc1e3d5b3cf7

    SHA1

    c6d0fdba3ae6364de6417f0a443375d39173d400

    SHA256

    28293843f0e23fc859f38d82adb0edd043de2476e4221fc5dc8f3e05cf3d21ca

    SHA512

    74fda25f4a0460a26581ed35e159af21645eb0a932cfca9b19368c32d0d4e675fe2162241dcd4adf805c2c7a2461a5bb7931e133a2d332bac8d648ff93928daa

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf
    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • memory/2684-0-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2684-130-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2976-3-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/2976-4-0x0000000073B7D000-0x0000000073B88000-memory.dmp
    Filesize

    44KB

  • memory/2976-104-0x000000006CB31000-0x000000006CB32000-memory.dmp
    Filesize

    4KB

  • memory/2976-132-0x0000000073B7D000-0x0000000073B88000-memory.dmp
    Filesize

    44KB