Analysis

  • max time kernel
    142s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2024, 16:41

General

  • Target

    Kiwi X/Open/Kiwi X Bootstrapper.exe

  • Size

    178KB

  • MD5

    9f07ff71a41d0707a88c679aeead9bc1

  • SHA1

    4c003b20f81fda703383c3751ac2bdeb41a57987

  • SHA256

    4d819c0df101498676f943c688edcd812161be8e82fd2a1877b5690cd3679ca9

  • SHA512

    c1537f0050fd22edcbd5e47bf4c13754a9126ebe897a2be42d45e302e1dbad2da69af0487a3d2eb373184ddb1c682dbef27ddef616faf5f0c19bd566ae767d62

  • SSDEEP

    768:TIEJncjFwUuDtL1uogdqbYBKuv4+CdQpKEBy0lGtCvvApflHp+jEJOxCjZonIrjs:TmMmKzz3GMIh5

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Kiwi X\Open\Kiwi X Bootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\Kiwi X\Open\Kiwi X Bootstrapper.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\AppData\Local\Temp\Kiwi X\Open\Kiwi X.exe
      "C:\Users\Admin\AppData\Local\Temp\Kiwi X\Open\Kiwi X.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2512

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8b859ab7892825f46c84918766f924e3

          SHA1

          dba4b3bd52ce91b0a08cc188e54d8d23b0380249

          SHA256

          d658430c1db2d6aa8080418e32ba77c799fb9cc01dd54a88e31162d75d81c38d

          SHA512

          7a69e1243d71fa49d732995abab15d8502d8a1bc655c7a1e70159cd592f866646935ae75255a19bd677f91be764e469dd129dcf208e72cd53b5388fda7447b93

        • C:\Users\Admin\AppData\Local\Kiwi_X_WPF\Kiwi_X.exe_Url_zrzex2zoxszvkjgx424vu2e3wkoawp0c\1.1.0.0\user.config

          Filesize

          800B

          MD5

          87946c5940249d12440b1cce22bfc7ea

          SHA1

          e0a1bc124fe907e8bc741a21d823c28e12c9ddde

          SHA256

          93dbec861a82964169fd542dd1cec94a0ffcf26712af353a4ee7a41962142dd0

          SHA512

          3d658b69475f1d1fff5281a0eed9e268ecaee23819d0e9c668e3128282f5569f44afa3af5aec3f58a4dbd75baea9ebb0e155840c66e7b6d0edb74a69db3561e1

        • C:\Users\Admin\AppData\Local\Kiwi_X_WPF\Kiwi_X.exe_Url_zrzex2zoxszvkjgx424vu2e3wkoawp0c\1.1.0.0\user.config

          Filesize

          906B

          MD5

          01b3e045880696941ed19da4d624f5c0

          SHA1

          7e0aa482ea6a7c2cf36270bc0f68ed790c0d30b3

          SHA256

          a478fff0adf4c6e9d451f091fd28c02ada52e5edd13c3292702ad6184ab007b5

          SHA512

          3f1de3403b679f33054d37dc2c657c380ebee62f35f7d80ac840fdea6948d2d709c5a2fcec687d486ec2fe10cf94304fe0a8246d58d93940e5c207fe9a7140f2

        • C:\Users\Admin\AppData\Local\Temp\Cab603B.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar60F9.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Local\Temp\Kiwi X\Open\Kiwi X.exe

          Filesize

          3.6MB

          MD5

          fec7d6eb28d5a5f7efa5c9ea650bc707

          SHA1

          1648cdc041fa877a1673f89e8bba55c907ebb482

          SHA256

          38dc036fe74786370f66ac38cd66f6a4e7afee80380e5253807fa3fdf1457020

          SHA512

          5562ef46650fc97340cbb17ae7f825a97167e183be90286f8e13b8528019c89f28ac10b94d0fb3ac4c1cae2363a1a734fcca3fb5f8b0ce24cc5f1bc298fbee39

        • memory/1860-0-0x00000000740EE000-0x00000000740EF000-memory.dmp

          Filesize

          4KB

        • memory/1860-1-0x0000000000A70000-0x0000000000AA2000-memory.dmp

          Filesize

          200KB

        • memory/1860-2-0x00000000740E0000-0x00000000747CE000-memory.dmp

          Filesize

          6.9MB

        • memory/1860-71-0x00000000740E0000-0x00000000747CE000-memory.dmp

          Filesize

          6.9MB

        • memory/2512-76-0x00000000004D0000-0x00000000004EA000-memory.dmp

          Filesize

          104KB

        • memory/2512-73-0x0000000001150000-0x00000000014F6000-memory.dmp

          Filesize

          3.6MB

        • memory/2512-74-0x00000000740E0000-0x00000000747CE000-memory.dmp

          Filesize

          6.9MB

        • memory/2512-78-0x00000000004F0000-0x00000000004FA000-memory.dmp

          Filesize

          40KB

        • memory/2512-77-0x00000000004F0000-0x00000000004FA000-memory.dmp

          Filesize

          40KB

        • memory/2512-72-0x00000000740E0000-0x00000000747CE000-memory.dmp

          Filesize

          6.9MB

        • memory/2512-92-0x0000000005510000-0x00000000055BA000-memory.dmp

          Filesize

          680KB

        • memory/2512-75-0x00000000740E0000-0x00000000747CE000-memory.dmp

          Filesize

          6.9MB

        • memory/2512-93-0x0000000005BF0000-0x0000000005C8E000-memory.dmp

          Filesize

          632KB

        • memory/2512-94-0x0000000005DB0000-0x0000000005E1A000-memory.dmp

          Filesize

          424KB

        • memory/2512-95-0x00000000740E0000-0x00000000747CE000-memory.dmp

          Filesize

          6.9MB

        • memory/2512-96-0x00000000740E0000-0x00000000747CE000-memory.dmp

          Filesize

          6.9MB

        • memory/2512-97-0x00000000004F0000-0x00000000004FA000-memory.dmp

          Filesize

          40KB

        • memory/2512-98-0x00000000004F0000-0x00000000004FA000-memory.dmp

          Filesize

          40KB