Analysis
-
max time kernel
1800s -
max time network
1171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:12
Behavioral task
behavioral1
Sample
KAKEInjector.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
4 signatures
1800 seconds
General
-
Target
KAKEInjector.exe
-
Size
13.5MB
-
MD5
f1053bd6f2f6b5dd74d81af9db452f1f
-
SHA1
aa5f30c818dd8196e569c39126e73fb277fdc787
-
SHA256
cfc350c17f9f21c3cee709494d8945190be0d4838698e9161094f53f52c1bd02
-
SHA512
fc7455866addddda8850994b7b14f3dc3ad565f0dc5b6005699ea2a85b849cc3c331039905b19705e42d5194d65cbb9a1d3040be84636db14ff79eea963c204c
-
SSDEEP
393216:LD1rmILrAI3XmgJyL/s2jeUaUXtnseecncyeaGNjRtP7J/2g:n1rTvBXmUwljCebcyfGzl9
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/5104-3-0x00007FF632F40000-0x00007FF6348A8000-memory.dmp themida behavioral1/memory/5104-8-0x00007FF632F40000-0x00007FF6348A8000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
KAKEInjector.exepid process 5104 KAKEInjector.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
KAKEInjector.exepid process 5104 KAKEInjector.exe 5104 KAKEInjector.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
KAKEInjector.execmd.exedescription pid process target process PID 5104 wrote to memory of 1900 5104 KAKEInjector.exe cmd.exe PID 5104 wrote to memory of 1900 5104 KAKEInjector.exe cmd.exe PID 1900 wrote to memory of 3240 1900 cmd.exe certutil.exe PID 1900 wrote to memory of 3240 1900 cmd.exe certutil.exe PID 1900 wrote to memory of 4592 1900 cmd.exe find.exe PID 1900 wrote to memory of 4592 1900 cmd.exe find.exe PID 1900 wrote to memory of 3504 1900 cmd.exe find.exe PID 1900 wrote to memory of 3504 1900 cmd.exe find.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\KAKEInjector.exe"C:\Users\Admin\AppData\Local\Temp\KAKEInjector.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\KAKEInjector.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\KAKEInjector.exe" MD53⤵PID:3240
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4592
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:3504
-
-