Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 00:55

General

  • Target

    KAPE/Modules/bin/PECmd.exe

  • Size

    3.8MB

  • MD5

    1afed4afcb86c8ac6ba2aa3c6160072a

  • SHA1

    cf40e1d89b3c6f4b2d2c4848c2d6e657c0f70214

  • SHA256

    26759e06a61e5089273fba882d3238dfe6a3d16b89784943a4191991c8a22a42

  • SHA512

    5dbd0acf74e2649ea5a4c741d7424abfabfb5f3aeb0c165e48969b47d84f02ec93ee7211236f3d597355f8de3c7104eed738d74d9a256e228023e953236c2514

  • SSDEEP

    98304:PRSn0/973980eGeJxsBzKTHJbWSg+Nt2G2dy1E26+Geu9v:ZSnY8RqzK1qSb6ynsv

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KAPE\Modules\bin\PECmd.exe
    "C:\Users\Admin\AppData\Local\Temp\KAPE\Modules\bin\PECmd.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:3996

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3996-0-0x000001F462130000-0x000001F4624FC000-memory.dmp
    Filesize

    3.8MB

  • memory/3996-2-0x000001F47CA50000-0x000001F47CB4A000-memory.dmp
    Filesize

    1000KB

  • memory/3996-1-0x000001F462890000-0x000001F4628B6000-memory.dmp
    Filesize

    152KB

  • memory/3996-4-0x000001F47CB50000-0x000001F47CBB2000-memory.dmp
    Filesize

    392KB

  • memory/3996-5-0x000001F47CA40000-0x000001F47CA50000-memory.dmp
    Filesize

    64KB

  • memory/3996-3-0x00007FFC5BAF0000-0x00007FFC5C5B1000-memory.dmp
    Filesize

    10.8MB

  • memory/3996-6-0x000001F47CBB0000-0x000001F47CBEC000-memory.dmp
    Filesize

    240KB

  • memory/3996-8-0x000001F462A70000-0x000001F462A80000-memory.dmp
    Filesize

    64KB

  • memory/3996-7-0x000001F462A90000-0x000001F462AAA000-memory.dmp
    Filesize

    104KB

  • memory/3996-24-0x000001F47CCD0000-0x000001F47CCD8000-memory.dmp
    Filesize

    32KB

  • memory/3996-25-0x000001F47CCE0000-0x000001F47CD06000-memory.dmp
    Filesize

    152KB

  • memory/3996-26-0x000001F47CD40000-0x000001F47CD48000-memory.dmp
    Filesize

    32KB

  • memory/3996-28-0x000001F47CCC0000-0x000001F47CCCC000-memory.dmp
    Filesize

    48KB

  • memory/3996-29-0x000001F47CD10000-0x000001F47CD40000-memory.dmp
    Filesize

    192KB

  • memory/3996-30-0x000001F47CD70000-0x000001F47CD80000-memory.dmp
    Filesize

    64KB

  • memory/3996-31-0x000001F47CD90000-0x000001F47CD98000-memory.dmp
    Filesize

    32KB

  • memory/3996-32-0x000001F47D510000-0x000001F47D5A6000-memory.dmp
    Filesize

    600KB

  • memory/3996-33-0x000001F47CDA0000-0x000001F47CDAC000-memory.dmp
    Filesize

    48KB

  • memory/3996-35-0x00007FFC5BAF0000-0x00007FFC5C5B1000-memory.dmp
    Filesize

    10.8MB