Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 14:25
Behavioral task
behavioral1
Sample
b4ec0c44d110c57273dea44b24ded60d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4ec0c44d110c57273dea44b24ded60d.exe
Resource
win10v2004-20240226-en
General
-
Target
b4ec0c44d110c57273dea44b24ded60d.exe
-
Size
13KB
-
MD5
b4ec0c44d110c57273dea44b24ded60d
-
SHA1
8445fbc6da10e6445fc96f66a9e913e68f55d6e7
-
SHA256
c393614be368d623159c447cf93f9a6f1b94741528e85e0471345c9a06cb15ea
-
SHA512
302eb3eecda03486584872b0f06517d92cc8acd97fa494ea5c93514477597760bd8ea05d466d364181b72e895d5e745c5f5d15a64eb45bd0c6f114e10c397f2b
-
SSDEEP
384:2BXg69sWVUN6cK6adGYQ6R/LlTV7ANdkFfzpC:y9sWVq1ydGYQ4LlOdk1
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2972 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1496 kandawfk.exe -
Loads dropped DLL 2 IoCs
pid Process 1228 b4ec0c44d110c57273dea44b24ded60d.exe 1228 b4ec0c44d110c57273dea44b24ded60d.exe -
resource yara_rule behavioral1/memory/1228-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/files/0x000e000000013420-3.dat upx behavioral1/memory/1228-4-0x0000000000230000-0x0000000000240000-memory.dmp upx behavioral1/memory/1496-12-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1228-13-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\kandawf.dll b4ec0c44d110c57273dea44b24ded60d.exe File created C:\Windows\SysWOW64\kandawfk.exe b4ec0c44d110c57273dea44b24ded60d.exe File opened for modification C:\Windows\SysWOW64\kandawfk.exe b4ec0c44d110c57273dea44b24ded60d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1496 1228 b4ec0c44d110c57273dea44b24ded60d.exe 28 PID 1228 wrote to memory of 1496 1228 b4ec0c44d110c57273dea44b24ded60d.exe 28 PID 1228 wrote to memory of 1496 1228 b4ec0c44d110c57273dea44b24ded60d.exe 28 PID 1228 wrote to memory of 1496 1228 b4ec0c44d110c57273dea44b24ded60d.exe 28 PID 1228 wrote to memory of 2972 1228 b4ec0c44d110c57273dea44b24ded60d.exe 29 PID 1228 wrote to memory of 2972 1228 b4ec0c44d110c57273dea44b24ded60d.exe 29 PID 1228 wrote to memory of 2972 1228 b4ec0c44d110c57273dea44b24ded60d.exe 29 PID 1228 wrote to memory of 2972 1228 b4ec0c44d110c57273dea44b24ded60d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4ec0c44d110c57273dea44b24ded60d.exe"C:\Users\Admin\AppData\Local\Temp\b4ec0c44d110c57273dea44b24ded60d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\kandawfk.exeC:\Windows\system32\kandawfk.exe ˜‰2⤵
- Executes dropped EXE
PID:1496
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\b4ec0c44d110c57273dea44b24ded60d.exe.bat2⤵
- Deletes itself
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD530f1de4fba147e23108e4e5a292e5b12
SHA143b30fe3d8c84266c313fafd74e7f231a6cca3d2
SHA256b4045954d771fd7bcfd9dea919b66b4b2996a84a27eb54ea36d948bd14bb0f01
SHA512bace0579f45624cb364220dd265d90e4c2f874990482a9b69d4949fd2220cee3f07e8e84e2c710bcb5c9480081ae3a5f199a9501ec7b8736b13cb0edadeb653f
-
Filesize
13KB
MD5b4ec0c44d110c57273dea44b24ded60d
SHA18445fbc6da10e6445fc96f66a9e913e68f55d6e7
SHA256c393614be368d623159c447cf93f9a6f1b94741528e85e0471345c9a06cb15ea
SHA512302eb3eecda03486584872b0f06517d92cc8acd97fa494ea5c93514477597760bd8ea05d466d364181b72e895d5e745c5f5d15a64eb45bd0c6f114e10c397f2b