Resubmissions

27-04-2024 20:38

240427-ze5dnafh67 6

Analysis

  • max time kernel
    64s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-04-2024 20:38

General

  • Target

    kmspico_win_x64.rar

  • Size

    15.0MB

  • MD5

    41a8e5421e5648a748408d40aed0bdc5

  • SHA1

    3e30928d5890f2a76f302b03549fe1abe94aab0e

  • SHA256

    633f0b238922a9a0de166521b613401054be07117e7769c1c3b260fefce60790

  • SHA512

    b164372291c84e579e24339f22c628863139c5c54b32f448a6d28107e7db40e6413192fd05d09c2fa5c543598173fd324ccd94dd6f80ceee7080337bbcf7a9f7

  • SSDEEP

    393216:KO0OdZlDah37XyhcCcrhZ682eR3RmuKU2ABfRK1zDI/Zd5X7Xr:KOPxabCca6R3GU20RyHI/Zd5X77

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 14 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\kmspico_win_x64.rar
    1⤵
    • Modifies registry class
    PID:904
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:4832
  • C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\SearchIndexer.exe /Embedding
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Windows\System32\SearchProtocolHost.exe
      "C:\Windows\System32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
      2⤵
      • Modifies data under HKEY_USERS
      PID:4840
    • C:\Windows\system32\SearchFilterHost.exe
      "C:\Windows\system32\SearchFilterHost.exe" 832 1920 1924 812 {0E5DCEC5-7795-4E38-9621-94DFD9F9A421}
      2⤵
        PID:2744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4616-4-0x000001EB0E4D0000-0x000001EB0E4E0000-memory.dmp

      Filesize

      64KB

    • memory/4616-20-0x000001EB0E700000-0x000001EB0E710000-memory.dmp

      Filesize

      64KB

    • memory/4616-36-0x000001EB129C0000-0x000001EB129C8000-memory.dmp

      Filesize

      32KB