Analysis
-
max time kernel
140s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
kchdlive-v2.0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
kchdlive-v2.0.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240709-en
General
-
Target
kchdlive-v2.0.exe
-
Size
3.6MB
-
MD5
21a846ad82031eb74b238c5944c46f18
-
SHA1
58f496df3fa24c966dc8a50f75f4647bacc7c155
-
SHA256
afcbc06d70f9845cba935587688788f25aefe5be1c2b05a204bf97a66906f5ca
-
SHA512
35586ec3a5a3bdf251bed97154b999fd9684e9756534a19451a621f62412c4c08ef162fb0ecd52b12d4d7424d4a47af7016f1c66d31a6f69de3322f4823db418
-
SSDEEP
98304:LXzMySx36JT+PWAxfSImyaNDAXP+yRSYygNvn:LXzpS96IPWAxfS3NUXP+yRVyKvn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2360 kchdlive-v2.0.tmp -
Loads dropped DLL 3 IoCs
pid Process 2128 kchdlive-v2.0.exe 2360 kchdlive-v2.0.tmp 2360 kchdlive-v2.0.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2360 kchdlive-v2.0.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2360 2128 kchdlive-v2.0.exe 30 PID 2128 wrote to memory of 2360 2128 kchdlive-v2.0.exe 30 PID 2128 wrote to memory of 2360 2128 kchdlive-v2.0.exe 30 PID 2128 wrote to memory of 2360 2128 kchdlive-v2.0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\kchdlive-v2.0.exe"C:\Users\Admin\AppData\Local\Temp\kchdlive-v2.0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\is-833A9.tmp\kchdlive-v2.0.tmp"C:\Users\Admin\AppData\Local\Temp\is-833A9.tmp\kchdlive-v2.0.tmp" /SL5="$5014C,3464674,206848,C:\Users\Admin\AppData\Local\Temp\kchdlive-v2.0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
847KB
MD50b050d9f41bc6e6f52b55f8e103d9fe2
SHA1d02737dee7941fa546b5031b135b0ad28749d3ff
SHA2561ba871dc8dba2babe848467813e0d824f68ca97bb9d5bb6c3d50b17b0f0715af
SHA51215941d2a5e1f7d6a2e44a79a84116439b51faf4e284de8e6536b715e200bbe1fbc0f2e283f54f4064590c96a03d37d7623f25c0a4cd530bb72fc61c7f1204d34
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3