Analysis
-
max time kernel
65s -
max time network
87s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 01:27
Behavioral task
behavioral1
Sample
KKKApi.exe
Resource
win7-20240705-en
General
-
Target
KKKApi.exe
-
Size
45KB
-
MD5
2c147ac800cab2d7899c22768c586f3d
-
SHA1
e9774daaffc7b312fc8162cf8d4a6dbf28d47361
-
SHA256
62633f30dcde970ba66ae44c9175ece9953c8f39fcbb54ef2fcd54d473cba808
-
SHA512
d67272bafabf95a1c1d818d8d5a67aa4052e646e8c9394d7d37995d39f47d814c08d8c539927747437ddd4ec73c4e1a14149aa06fe9b11e452b659ef6423918a
-
SSDEEP
768:muokxmFTkUE1YAgWUOl1nyamo2qR6ITnyfaaPIVzjbMgX3iPogj5CWQcttzUBDZw:muokxmFTkUMYi1t2lEhV3bDXSPnj5lvF
Malware Config
Extracted
asyncrat
0.5.8
Default
193.23.160.13:7707
GAD1XUdwNDb7
-
delay
3
-
install
true
-
install_file
Server-Host.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023403-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation KKKApi.exe -
Executes dropped EXE 1 IoCs
pid Process 3344 Server-Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KKKApi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server-Host.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4928 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1984 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe 1500 KKKApi.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1500 KKKApi.exe Token: SeDebugPrivilege 3344 Server-Host.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1016 1500 KKKApi.exe 94 PID 1500 wrote to memory of 1016 1500 KKKApi.exe 94 PID 1500 wrote to memory of 1016 1500 KKKApi.exe 94 PID 1500 wrote to memory of 5100 1500 KKKApi.exe 96 PID 1500 wrote to memory of 5100 1500 KKKApi.exe 96 PID 1500 wrote to memory of 5100 1500 KKKApi.exe 96 PID 1016 wrote to memory of 1984 1016 cmd.exe 98 PID 1016 wrote to memory of 1984 1016 cmd.exe 98 PID 1016 wrote to memory of 1984 1016 cmd.exe 98 PID 5100 wrote to memory of 4928 5100 cmd.exe 99 PID 5100 wrote to memory of 4928 5100 cmd.exe 99 PID 5100 wrote to memory of 4928 5100 cmd.exe 99 PID 5100 wrote to memory of 3344 5100 cmd.exe 101 PID 5100 wrote to memory of 3344 5100 cmd.exe 101 PID 5100 wrote to memory of 3344 5100 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\KKKApi.exe"C:\Users\Admin\AppData\Local\Temp\KKKApi.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Server-Host" /tr '"C:\Users\Admin\AppData\Roaming\Server-Host.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Server-Host" /tr '"C:\Users\Admin\AppData\Roaming\Server-Host.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAB34.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4928
-
-
C:\Users\Admin\AppData\Roaming\Server-Host.exe"C:\Users\Admin\AppData\Roaming\Server-Host.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD50860cbb445800bc8de4db076ef90d4a6
SHA156b2f398882a64e16be7e13f9344646434c9172a
SHA256d91522b44585dd3a4c88bbdfdc857d3969b0c114b1c27620596de5f1990e1b67
SHA512f955f0e0ac606d9452a1ba8c8741df58957ea9c402ac8028afbf6d9492fbe55eb07a2e612c2ede85199fd77a529166246095150350266fd2d76f0138ed29752c
-
Filesize
45KB
MD52c147ac800cab2d7899c22768c586f3d
SHA1e9774daaffc7b312fc8162cf8d4a6dbf28d47361
SHA25662633f30dcde970ba66ae44c9175ece9953c8f39fcbb54ef2fcd54d473cba808
SHA512d67272bafabf95a1c1d818d8d5a67aa4052e646e8c9394d7d37995d39f47d814c08d8c539927747437ddd4ec73c4e1a14149aa06fe9b11e452b659ef6423918a