Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 00:55

General

  • Target

    KAPE/kape.exe

  • Size

    6.7MB

  • MD5

    7e09af85742522ab31748c8992839ae6

  • SHA1

    a3b5cdfb814acf9e924e1cb29d4d2def537e8b90

  • SHA256

    6167472179d0b5b028560dcc84ea1a2e3cb2d7128dd18e4e9278263b86a4318b

  • SHA512

    ec5cfd135e619bab0343583cae1e7451715c5e065698116a20d4e895ee589d11aa8669423f81f46a2f96819b4cc7e0da88dbd98d2feb824029b315ac32706de2

  • SSDEEP

    196608:T2xOtwIsiGbSnXz/8QJLe6fD2NbnOY6gn83R29Xkj:oURTBHle6fDXY6gn4gN6

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KAPE\kape.exe
    "C:\Users\Admin\AppData\Local\Temp\KAPE\kape.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:4628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4628-0-0x000002C7559D0000-0x000002C756080000-memory.dmp

    Filesize

    6.7MB

  • memory/4628-1-0x00007FFD2AE10000-0x00007FFD2B8D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4628-2-0x000002C756440000-0x000002C756450000-memory.dmp

    Filesize

    64KB

  • memory/4628-4-0x000002C756420000-0x000002C756446000-memory.dmp

    Filesize

    152KB

  • memory/4628-3-0x000002C756410000-0x000002C756424000-memory.dmp

    Filesize

    80KB

  • memory/4628-5-0x000002C7705C0000-0x000002C770600000-memory.dmp

    Filesize

    256KB

  • memory/4628-6-0x000002C770600000-0x000002C770640000-memory.dmp

    Filesize

    256KB

  • memory/4628-7-0x000002C770640000-0x000002C7707A4000-memory.dmp

    Filesize

    1.4MB

  • memory/4628-8-0x000002C7707B0000-0x000002C7708F4000-memory.dmp

    Filesize

    1.3MB

  • memory/4628-9-0x000002C770900000-0x000002C770A92000-memory.dmp

    Filesize

    1.6MB

  • memory/4628-11-0x000002C770B00000-0x000002C770B3E000-memory.dmp

    Filesize

    248KB

  • memory/4628-10-0x000002C770A90000-0x000002C770AFA000-memory.dmp

    Filesize

    424KB

  • memory/4628-12-0x000002C770B40000-0x000002C770C3A000-memory.dmp

    Filesize

    1000KB

  • memory/4628-13-0x000002C757D70000-0x000002C757D80000-memory.dmp

    Filesize

    64KB

  • memory/4628-14-0x000002C770D80000-0x000002C770DE0000-memory.dmp

    Filesize

    384KB

  • memory/4628-15-0x000002C770F10000-0x000002C770FA8000-memory.dmp

    Filesize

    608KB

  • memory/4628-16-0x000002C771020000-0x000002C77116A000-memory.dmp

    Filesize

    1.3MB

  • memory/4628-18-0x000002C771360000-0x000002C7713BA000-memory.dmp

    Filesize

    360KB

  • memory/4628-17-0x000002C771210000-0x000002C77126E000-memory.dmp

    Filesize

    376KB

  • memory/4628-35-0x00007FFD2AE10000-0x00007FFD2B8D1000-memory.dmp

    Filesize

    10.8MB