Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 01:12
Behavioral task
behavioral1
Sample
bf745977f9eaee8aa6a47cdfae600331.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bf745977f9eaee8aa6a47cdfae600331.exe
Resource
win10v2004-20240226-en
General
-
Target
bf745977f9eaee8aa6a47cdfae600331.exe
-
Size
11KB
-
MD5
bf745977f9eaee8aa6a47cdfae600331
-
SHA1
fd7b5322bd48d65b8825b09c633c904622c7045e
-
SHA256
c024b1cfe6e785a5dfadaac3ae967552ad9c899fd01a1eda80d4eddecaaecc16
-
SHA512
04070ca19809de33382d8fb9852f34dc54d0919bec41ae08ca9e02697ad700738c5a03ecf0623e813358856c24041fd336629e887196b40a06afa95aee500864
-
SSDEEP
192:E2AXq1se/llMlD02kHYHLZ+w0pu9OzPKF1WhSQgh9Y7ERa9xrGsS:Jwq1sglMy2kIZ+w0pu9OzCF1Wo127+aw
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2656 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2920 kandofnk.exe -
Loads dropped DLL 2 IoCs
pid Process 2064 bf745977f9eaee8aa6a47cdfae600331.exe 2064 bf745977f9eaee8aa6a47cdfae600331.exe -
resource yara_rule behavioral1/memory/2064-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000d000000015d59-3.dat upx behavioral1/memory/2920-11-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2064-12-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\kandofnk.exe bf745977f9eaee8aa6a47cdfae600331.exe File opened for modification C:\Windows\SysWOW64\kandofnk.exe bf745977f9eaee8aa6a47cdfae600331.exe File created C:\Windows\SysWOW64\kandofn.dll bf745977f9eaee8aa6a47cdfae600331.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2920 2064 bf745977f9eaee8aa6a47cdfae600331.exe 28 PID 2064 wrote to memory of 2920 2064 bf745977f9eaee8aa6a47cdfae600331.exe 28 PID 2064 wrote to memory of 2920 2064 bf745977f9eaee8aa6a47cdfae600331.exe 28 PID 2064 wrote to memory of 2920 2064 bf745977f9eaee8aa6a47cdfae600331.exe 28 PID 2064 wrote to memory of 2656 2064 bf745977f9eaee8aa6a47cdfae600331.exe 29 PID 2064 wrote to memory of 2656 2064 bf745977f9eaee8aa6a47cdfae600331.exe 29 PID 2064 wrote to memory of 2656 2064 bf745977f9eaee8aa6a47cdfae600331.exe 29 PID 2064 wrote to memory of 2656 2064 bf745977f9eaee8aa6a47cdfae600331.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf745977f9eaee8aa6a47cdfae600331.exe"C:\Users\Admin\AppData\Local\Temp\bf745977f9eaee8aa6a47cdfae600331.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\kandofnk.exeC:\Windows\system32\kandofnk.exe ˜‰2⤵
- Executes dropped EXE
PID:2920
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bf745977f9eaee8aa6a47cdfae600331.exe.bat2⤵
- Deletes itself
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD501902b410d748aa7087f5bcbf39afd23
SHA1e18980946c023a9d3c989a573a5efa5b4dedee07
SHA2561c2240e2329da991aa3c6c9845eed0508495968d7414625d369bdbf08720eed2
SHA512872214c727f89568ec5e9b11d70df5b72ec01f9eba1d17d0a240e02390d765771a26243a19bd62bf6cc79977836eee5121f9f01d1a964b9e90f5d016feb8deff
-
Filesize
11KB
MD5bf745977f9eaee8aa6a47cdfae600331
SHA1fd7b5322bd48d65b8825b09c633c904622c7045e
SHA256c024b1cfe6e785a5dfadaac3ae967552ad9c899fd01a1eda80d4eddecaaecc16
SHA51204070ca19809de33382d8fb9852f34dc54d0919bec41ae08ca9e02697ad700738c5a03ecf0623e813358856c24041fd336629e887196b40a06afa95aee500864