Analysis

  • max time kernel
    146s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 00:55

General

  • Target

    KAPE/Modules/bin/EvtxECmd/EvtxECmd.exe

  • Size

    4.9MB

  • MD5

    17a260381793fd1f9141aa06bb5dab7b

  • SHA1

    33ddaebf358de45a368036a328b2f3fea462c7fb

  • SHA256

    71f74d5c2f3561f785994bde913ccf30c0251b434fd08d690f25baa0817d37d9

  • SHA512

    52efdef14459663e79ab60243afe7cbf9b16e1df1cbed4000f5d44064ebd64642092c94e442ac1541a9ef8ad2dc3cac9673b0bb1963f88649c0f4251d49b06b7

  • SSDEEP

    98304:eRSV0/9bpRslSdzrN9cd883v8vUiIPYMRYqD/DF9fbAFSg+Nt2G2dy1E26+GebZ4:OSVsRsAzrBEv8vlIwLcHEFSb6ynS

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KAPE\Modules\bin\EvtxECmd\EvtxECmd.exe
    "C:\Users\Admin\AppData\Local\Temp\KAPE\Modules\bin\EvtxECmd\EvtxECmd.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2328

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2328-0-0x0000013925890000-0x0000013925D72000-memory.dmp
    Filesize

    4.9MB

  • memory/2328-1-0x00000139403C0000-0x00000139404BA000-memory.dmp
    Filesize

    1000KB

  • memory/2328-2-0x00000139261D0000-0x000001392620C000-memory.dmp
    Filesize

    240KB

  • memory/2328-3-0x0000013926210000-0x000001392622A000-memory.dmp
    Filesize

    104KB

  • memory/2328-4-0x0000013927B10000-0x0000013927B72000-memory.dmp
    Filesize

    392KB

  • memory/2328-5-0x00000139261B0000-0x00000139261C0000-memory.dmp
    Filesize

    64KB

  • memory/2328-6-0x00007FF972EA0000-0x00007FF973961000-memory.dmp
    Filesize

    10.8MB

  • memory/2328-7-0x0000013927BB0000-0x0000013927BC0000-memory.dmp
    Filesize

    64KB

  • memory/2328-23-0x0000013927BC0000-0x0000013927BC8000-memory.dmp
    Filesize

    32KB

  • memory/2328-24-0x00000139404C0000-0x00000139404E6000-memory.dmp
    Filesize

    152KB

  • memory/2328-25-0x0000013940500000-0x0000013940508000-memory.dmp
    Filesize

    32KB

  • memory/2328-27-0x0000013940910000-0x0000013940938000-memory.dmp
    Filesize

    160KB

  • memory/2328-28-0x0000013940940000-0x0000013940976000-memory.dmp
    Filesize

    216KB

  • memory/2328-29-0x0000013927BD0000-0x0000013927BE6000-memory.dmp
    Filesize

    88KB

  • memory/2328-30-0x00000139404F0000-0x0000013940500000-memory.dmp
    Filesize

    64KB

  • memory/2328-31-0x0000013940970000-0x0000013940A18000-memory.dmp
    Filesize

    672KB

  • memory/2328-32-0x0000013940A20000-0x0000013940A28000-memory.dmp
    Filesize

    32KB

  • memory/2328-33-0x0000013940A40000-0x0000013940A4C000-memory.dmp
    Filesize

    48KB

  • memory/2328-35-0x00007FF972EA0000-0x00007FF973961000-memory.dmp
    Filesize

    10.8MB