Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 02:37

General

  • Target

    988.exe

  • Size

    2.1MB

  • MD5

    8eadcc4d69631ce1252201d164bff08c

  • SHA1

    364278c807838bf3d75001c72bffa9b00bb42dd6

  • SHA256

    54334afc530f334754ec13761319c8ef536fc644fcd33e5c405ba4aedb8fd90b

  • SHA512

    97fa9dfd9444f711a31c6d017d00151664c8e1e7bc6cc157d55bb59ae13e0d453d1475b82ce6b577b7b3ad448df989550f7594283f016877cda0c8324fd84b6a

  • SSDEEP

    49152:TF4qX74X0XrtpUePzKtA+F3l7BPAeYKHdj/PAHD1QCizINk/Sap19W:a874X0JpUePzV+xl79AeYKHdj/PGDAIC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\988.exe
    "C:\Users\Admin\AppData\Local\Temp\988.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    PID:2872
  • C:\Program Files (x86)\Kuiqyse.exe
    "C:\Program Files (x86)\Kuiqyse.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Kuiqyse.exe

    Filesize

    2.1MB

    MD5

    8eadcc4d69631ce1252201d164bff08c

    SHA1

    364278c807838bf3d75001c72bffa9b00bb42dd6

    SHA256

    54334afc530f334754ec13761319c8ef536fc644fcd33e5c405ba4aedb8fd90b

    SHA512

    97fa9dfd9444f711a31c6d017d00151664c8e1e7bc6cc157d55bb59ae13e0d453d1475b82ce6b577b7b3ad448df989550f7594283f016877cda0c8324fd84b6a

  • C:\Users\Public\Documents\pass.txt

    Filesize

    8B

    MD5

    71d864b6b132a9235400af39917131b3

    SHA1

    b79d02acde8be0d57bedef9bd3edeab0a5a066f3

    SHA256

    f4392ea35b8bafc5813b48055be473c4eceb72f11936a67a92cd9086efc2492e

    SHA512

    f331a1c933e016667682d3339784e57f4518305954a7e02643b4deab5ff8ded663232f38190d535457f4351d506f642cea961ea09dc3182c7917f8e483dbd0d3

  • memory/2872-2-0x0000000010000000-0x0000000010024000-memory.dmp

    Filesize

    144KB