Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 15:50

General

  • Target

    Koa_Paid_Tweak_Tool.bat

  • Size

    87KB

  • MD5

    2523b7ade7ef2ab0364cf7af2480780b

  • SHA1

    f0a796bbe87cbedb2422f1a30ed679910b16eec8

  • SHA256

    fb97d6ec1b1de59c4f02b55c8f95e756a13f9119f4bd08e77e832890ae529317

  • SHA512

    3cef3cd7f42f3950ae5d683762747cbc8fbbeba37d8e761e2dffb6ac2469db992023407ed8dd62f2f4bcdc3be91c3de03b8af834a93e423651f1c3548cd9fe3a

  • SSDEEP

    384:0jW4urpgB0TBp1uFuyIBmGlngbuPPqoeV9WIblw8WGDyLNZfKGDyLNZfU9a1QL:n80TBWQyEjPqoC9yiU0QL

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Koa_Paid_Tweak_Tool.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\system32\reg.exe
      Reg.exe ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f
      2⤵
      • UAC bypass
      PID:2376
    • C:\Windows\system32\reg.exe
      Reg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f
      2⤵
        PID:2384
      • C:\Windows\system32\reg.exe
        Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f
        2⤵
          PID:2560
        • C:\Windows\system32\reg.exe
          Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f
          2⤵
            PID:2124
          • C:\Windows\system32\reg.exe
            Reg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f
            2⤵
              PID:2060
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2504
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -ExecutionPolicy Bypass -Command "Checkpoint-Computer -Description 'KoaPaid' -RestorePointType 'MODIFY_SETTINGS'"
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3044
            • C:\Windows\system32\chcp.com
              chcp 65001
              2⤵
                PID:2604
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "prompt #$H#$E# & echo on & for %b in (1) do rem"
                2⤵
                  PID:1756
              • C:\Windows\system32\vssvc.exe
                C:\Windows\system32\vssvc.exe
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2888
              • C:\Windows\system32\DrvInst.exe
                DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003AC" "0000000000000534"
                1⤵
                • Drops file in Windows directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:1432

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                      Filesize

                      7KB

                      MD5

                      89eac446359ca2a5dd5d8ca7843ccbdc

                      SHA1

                      a8401783347e70964daf0ba5b88d64da2d434ef1

                      SHA256

                      ef3aaca8f57c2b55d16dd55964ae8b586298389f6ad9df14943f7686dacce464

                      SHA512

                      a5b8f26141678f101322094cc262fee70dd69282941dc1b2bb719eddbf531200cddf58cff1467fc675f74567f7145653a681f3523e41352e3e2ba4126398b519

                    • memory/2504-4-0x000007FEF648E000-0x000007FEF648F000-memory.dmp

                      Filesize

                      4KB

                    • memory/2504-5-0x000000001B620000-0x000000001B902000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2504-7-0x000007FEF61D0000-0x000007FEF6B6D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2504-6-0x0000000001D20000-0x0000000001D28000-memory.dmp

                      Filesize

                      32KB

                    • memory/2504-8-0x000007FEF61D0000-0x000007FEF6B6D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2504-9-0x000007FEF61D0000-0x000007FEF6B6D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2504-10-0x000007FEF61D0000-0x000007FEF6B6D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2504-11-0x000007FEF61D0000-0x000007FEF6B6D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/3044-17-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/3044-18-0x0000000002290000-0x0000000002298000-memory.dmp

                      Filesize

                      32KB