Analysis
-
max time kernel
1799s -
max time network
1801s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/07/2024, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
KKONE.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
KKONE.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
KKONE.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral4
Sample
KKONE.exe
Resource
win11-20240611-en
General
-
Target
KKONE.exe
-
Size
29.2MB
-
MD5
8983e7e265ff83298ce0c40ce36cdf96
-
SHA1
c1eefcf3be7e83a544a2c06f86d10b24af820eaa
-
SHA256
ba67cbef72f567a51fbc61ae525c1930f3d5da8d916f5f3b1f0af14e006f51d5
-
SHA512
dcd554e6f8fed824998a644f41850bfe6fc5bed5ca161eb316d2690470d757e59803a7afb869cbe0abba26d51bcd30f555c1d36021d9ecedf01f181271b22fc5
-
SSDEEP
786432:Yl8BsR1jDxZq9ROVLpo3/zAFJf+j9sZXmPHt6XRgvL5u2RlN3YVEP:jsR5DjqPcNo3MFJf+xsRWN6eE2RLoV2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1012 kkoneshell.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File created C:\Program Files (x86)\bin\Plugins\ÖØҪ˵Ã÷.txt KKONE.exe File created C:\Program Files (x86)\bin\sound\ÖØҪ˵Ã÷.txt KKONE.exe File created C:\Program Files (x86)\bin\ÉñÆæÔ¶¿Ø.ini KKONE.exe File created C:\Program Files (x86)\bin\Cache\Loader.lib KKONE.exe File created C:\Program Files (x86)\bin\sound\Login.wav KKONE.exe File created C:\Program Files (x86)\bin\Cache\Loader.dat KKONE.exe File created C:\Program Files (x86)\bin\Plugins\qqwry.dat KKONE.exe File created C:\Program Files (x86)\bin\Plugins\C_sunlogin.h KKONE.exe File created C:\Program Files (x86)\bin\Plugins\Example.Cpp KKONE.exe File created C:\Program Files (x86)\bin\Plugins\ShllCodeDecX64.bat KKONE.exe File created C:\Program Files (x86)\bin\KKONE.zip KKONE.exe File created C:\Program Files (x86)\bin\ÉñÆæÔ¶¿Ø.exe KKONE.exe File created C:\Program Files (x86)\bin\Éú³ÉÆ÷.exe KKONE.exe File created C:\Program Files (x86)\bin\Plugins\upx.exe KKONE.exe File created C:\Program Files (x86)\bin\Plugins\Plugin32.dll KKONE.exe File created C:\Program Files (x86)\bin\Plugins\sk_32.dll KKONE.exe File created C:\Program Files (x86)\bin\Plugins\ShllCodeDec.exe KKONE.exe File created C:\Program Files (x86)\bin\Plugins\kkone.exe KKONE.exe File created C:\Program Files (x86)\bin\Plugins\upx394.exe KKONE.exe File created C:\Program Files (x86)\bin\sound\Offline.wav KKONE.exe File created C:\Program Files (x86)\bin\Plugins\AnyFileToByte.exe KKONE.exe File created C:\Program Files (x86)\bin\Plugins\ShllCodeDec.bat KKONE.exe File created C:\Program Files (x86)\bin\Plugins\kkoneshell.exe KKONE.exe File created C:\Program Files (x86)\bin\ÖØҪ˵Ã÷.txt KKONE.exe File created C:\Program Files (x86)\bin\Plugins\GotoHTTP.h KKONE.exe File created C:\Program Files (x86)\bin\Cache\ÖØҪ˵Ã÷.txt KKONE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3740 wrote to memory of 1012 3740 KKONE.exe 81 PID 3740 wrote to memory of 1012 3740 KKONE.exe 81 PID 3740 wrote to memory of 1012 3740 KKONE.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\KKONE.exe"C:\Users\Admin\AppData\Local\Temp\KKONE.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Program Files (x86)\bin\Plugins\kkoneshell.exe"C:\Program Files (x86)\bin\Plugins\kkoneshell.exe"2⤵
- Executes dropped EXE
PID:1012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426KB
MD5e78da4d7a4fa70fe57602963f93002dd
SHA1498c010a318c258a1b68d443fed5064aef0b16c0
SHA256d860d3da5e98de6b7b192c923c05193b49d61270d4ae9c132caa4549a299d4bc
SHA51294266165c0e02e9b7929416c94fe33a7f0b56c57ad0e4d2c25310b1c17b188ed37bed37932a775737e178eb74061963748ccd16ec2ff104d2bb3f8e6938facfb