Analysis
-
max time kernel
21s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 08:59
Static task
static1
Behavioral task
behavioral1
Sample
k1XJSSO.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
k1XJSSO.exe
Resource
win10v2004-20240709-en
Errors
General
-
Target
k1XJSSO.exe
-
Size
90KB
-
MD5
1c7f572b36e436360fcbf142aad58689
-
SHA1
bf60b1168ad8aa921501fa37b3a66edbc6ef5936
-
SHA256
22e2f0cb23c47b359f8eca3872596e6d4c67033568bba09ac0043bf1f5b1a314
-
SHA512
9596c7c534ede05082bd80245116df7ba0f4d0d88465ebd3d83579d7dbfdddf72ecad01ea19c1795fda089aeb070a58adf8883f5d7a72bb9144edf0930323a2a
-
SSDEEP
1536:H7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfvwoOl:b7DhdC6kzWypvaQ0FxyNTBfvo
Malware Config
Signatures
-
Delays execution with timeout.exe 1 IoCs
pid Process 2172 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1400 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1876 shutdown.exe Token: SeRemoteShutdownPrivilege 1876 shutdown.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2796 2632 k1XJSSO.exe 31 PID 2632 wrote to memory of 2796 2632 k1XJSSO.exe 31 PID 2632 wrote to memory of 2796 2632 k1XJSSO.exe 31 PID 2632 wrote to memory of 2796 2632 k1XJSSO.exe 31 PID 2796 wrote to memory of 2172 2796 cmd.exe 32 PID 2796 wrote to memory of 2172 2796 cmd.exe 32 PID 2796 wrote to memory of 2172 2796 cmd.exe 32 PID 2796 wrote to memory of 1876 2796 cmd.exe 33 PID 2796 wrote to memory of 1876 2796 cmd.exe 33 PID 2796 wrote to memory of 1876 2796 cmd.exe 33 PID 2796 wrote to memory of 1400 2796 cmd.exe 35 PID 2796 wrote to memory of 1400 2796 cmd.exe 35 PID 2796 wrote to memory of 1400 2796 cmd.exe 35 PID 2796 wrote to memory of 988 2796 cmd.exe 36 PID 2796 wrote to memory of 988 2796 cmd.exe 36 PID 2796 wrote to memory of 988 2796 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\k1XJSSO.exe"C:\Users\Admin\AppData\Local\Temp\k1XJSSO.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\F19F.tmp\F1A0.tmp\F1A1.bat C:\Users\Admin\AppData\Local\Temp\k1XJSSO.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\timeout.exetimeout /t 203⤵
- Delays execution with timeout.exe
PID:2172
-
-
C:\Windows\system32\shutdown.exeshutdown /s /t 0 /f3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
C:\Windows\system32\tasklist.exetasklist /FI "WINDOWTITLE eq Recursive File Renamer and Fake Ransomware"3⤵
- Enumerates processes with tasklist
PID:1400
-
-
C:\Windows\system32\find.exefind /I /N "cmd.exe"3⤵PID:988
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1412
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b6e1919a9ca970827428552753afb18c
SHA11838733ac35d669133de530f4a007b3e07bf52ad
SHA256a5e9d19b518f9ff6c1b7921cc1d36af8aef7ca7c14c996a11a8fc337f9c277da
SHA512e8ca15278f02086594b1ad134bbd09a7f101bda9f908f028e4585382a6d4ae04e202f3773fec8a88f8fd7f66b45f21b462e4b7e053b2301145c84f0cee64c26b