Analysis

  • max time kernel
    63s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    29-04-2024 14:12

General

  • Target

    KIWI CE V3/!Kiwi CE V3.exe

  • Size

    16.3MB

  • MD5

    bfcedc7b86fff9e36e0889a8b321a3b1

  • SHA1

    b0a6af2ce0580f1d629886ec26b1ffa4eab43d8f

  • SHA256

    df2108aaa31cab9f7b965f7c1652a446693cb529c96ea852869c85e037c438b2

  • SHA512

    0478733da658c4269abe0075c467b6f176cbefd7c4c188ef66c6d959dc5443ed94fa182e705b67682f33254c43f3e745e6b2cec2f877fade1f3f1ef3e4f6f5e6

  • SSDEEP

    393216:y3Z8A06vEQ3ITvzx46SxiILGREuV3WjRI85:y3ZIzx46YNL6W9Ie

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 50 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KIWI CE V3\!Kiwi CE V3.exe
    "C:\Users\Admin\AppData\Local\Temp\KIWI CE V3\!Kiwi CE V3.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3068-0-0x0000000007FE0000-0x0000000007FE1000-memory.dmp

    Filesize

    4KB

  • memory/3068-3-0x0000000007FE0000-0x0000000007FE1000-memory.dmp

    Filesize

    4KB

  • memory/3068-7-0x0000000007FF0000-0x0000000007FF1000-memory.dmp

    Filesize

    4KB

  • memory/3068-11-0x0000000008000000-0x0000000008001000-memory.dmp

    Filesize

    4KB

  • memory/3068-15-0x0000000008020000-0x0000000008021000-memory.dmp

    Filesize

    4KB

  • memory/3068-19-0x0000000008030000-0x0000000008031000-memory.dmp

    Filesize

    4KB

  • memory/3068-27-0x0000000008030000-0x0000000008031000-memory.dmp

    Filesize

    4KB

  • memory/3068-31-0x0000000008040000-0x0000000008041000-memory.dmp

    Filesize

    4KB

  • memory/3068-35-0x0000000008040000-0x0000000008041000-memory.dmp

    Filesize

    4KB

  • memory/3068-39-0x0000000008040000-0x0000000008041000-memory.dmp

    Filesize

    4KB

  • memory/3068-40-0x00000000082C0000-0x00000000082C1000-memory.dmp

    Filesize

    4KB

  • memory/3068-49-0x00000000082C0000-0x00000000082C1000-memory.dmp

    Filesize

    4KB