Analysis
-
max time kernel
119s -
max time network
61s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
0c305aa7e29543ed07b581fb035d44f0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c305aa7e29543ed07b581fb035d44f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
0c305aa7e29543ed07b581fb035d44f0N.exe
-
Size
123KB
-
MD5
0c305aa7e29543ed07b581fb035d44f0
-
SHA1
f9297fb44a8ada5202d38845c41f27e9069dff02
-
SHA256
56a0ef6b4418afd3eca2b852c8f0efdace0363f826007b440fb8227952a4068b
-
SHA512
a58baabe33556b7a6918993ddd1736ef876e4c0ecdc75faf693825fc4e5003c5dcc4a9c385e83a40ca4b16d6e9449ede38fbb4527424bbc71b5d004e952b5e07
-
SSDEEP
1536:bW+gAu7KvYjk4p+NLMwL4csFkcUbVuyfjDLYujjX4m4GuDOHXVUUqpJtq9rY+OLT:aqwgG8h+S4y/LYKMXpD2ypjq9rY+O
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0c305aa7e29543ed07b581fb035d44f0N.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kioug.exe -
Executes dropped EXE 2 IoCs
pid Process 2772 kioug.exe 2316 kioug.exe -
Loads dropped DLL 3 IoCs
pid Process 3032 0c305aa7e29543ed07b581fb035d44f0N.exe 3032 0c305aa7e29543ed07b581fb035d44f0N.exe 2772 kioug.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /r" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /f" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /c" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /t" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /e" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /a" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /b" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /p" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /d" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /o" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /j" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /l" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /y" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /k" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /u" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /z" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /q" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /s" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /i" 0c305aa7e29543ed07b581fb035d44f0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /n" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /i" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /h" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /w" kioug.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\kioug = "C:\\Users\\Admin\\kioug.exe /v" kioug.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0c305aa7e29543ed07b581fb035d44f0N.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 0c305aa7e29543ed07b581fb035d44f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum kioug.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 kioug.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\c\autorun.inf kioug.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2088 set thread context of 3032 2088 0c305aa7e29543ed07b581fb035d44f0N.exe 30 PID 2772 set thread context of 2316 2772 kioug.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c305aa7e29543ed07b581fb035d44f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c305aa7e29543ed07b581fb035d44f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kioug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kioug.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3032 0c305aa7e29543ed07b581fb035d44f0N.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe 2316 kioug.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2088 0c305aa7e29543ed07b581fb035d44f0N.exe 3032 0c305aa7e29543ed07b581fb035d44f0N.exe 2772 kioug.exe 2316 kioug.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2088 wrote to memory of 3032 2088 0c305aa7e29543ed07b581fb035d44f0N.exe 30 PID 2088 wrote to memory of 3032 2088 0c305aa7e29543ed07b581fb035d44f0N.exe 30 PID 2088 wrote to memory of 3032 2088 0c305aa7e29543ed07b581fb035d44f0N.exe 30 PID 2088 wrote to memory of 3032 2088 0c305aa7e29543ed07b581fb035d44f0N.exe 30 PID 2088 wrote to memory of 3032 2088 0c305aa7e29543ed07b581fb035d44f0N.exe 30 PID 2088 wrote to memory of 3032 2088 0c305aa7e29543ed07b581fb035d44f0N.exe 30 PID 2088 wrote to memory of 3032 2088 0c305aa7e29543ed07b581fb035d44f0N.exe 30 PID 2088 wrote to memory of 3032 2088 0c305aa7e29543ed07b581fb035d44f0N.exe 30 PID 2088 wrote to memory of 3032 2088 0c305aa7e29543ed07b581fb035d44f0N.exe 30 PID 2088 wrote to memory of 3032 2088 0c305aa7e29543ed07b581fb035d44f0N.exe 30 PID 3032 wrote to memory of 2772 3032 0c305aa7e29543ed07b581fb035d44f0N.exe 31 PID 3032 wrote to memory of 2772 3032 0c305aa7e29543ed07b581fb035d44f0N.exe 31 PID 3032 wrote to memory of 2772 3032 0c305aa7e29543ed07b581fb035d44f0N.exe 31 PID 3032 wrote to memory of 2772 3032 0c305aa7e29543ed07b581fb035d44f0N.exe 31 PID 2772 wrote to memory of 2316 2772 kioug.exe 32 PID 2772 wrote to memory of 2316 2772 kioug.exe 32 PID 2772 wrote to memory of 2316 2772 kioug.exe 32 PID 2772 wrote to memory of 2316 2772 kioug.exe 32 PID 2772 wrote to memory of 2316 2772 kioug.exe 32 PID 2772 wrote to memory of 2316 2772 kioug.exe 32 PID 2772 wrote to memory of 2316 2772 kioug.exe 32 PID 2772 wrote to memory of 2316 2772 kioug.exe 32 PID 2772 wrote to memory of 2316 2772 kioug.exe 32 PID 2772 wrote to memory of 2316 2772 kioug.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c305aa7e29543ed07b581fb035d44f0N.exe"C:\Users\Admin\AppData\Local\Temp\0c305aa7e29543ed07b581fb035d44f0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\0c305aa7e29543ed07b581fb035d44f0N.exe742⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\kioug.exe"C:\Users\Admin\kioug.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\kioug.exe744⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD583222bae53a8ff644998d8b3a78b0522
SHA1c76fb08f5088100dd094e9747c09c062496360d3
SHA256158a0d1d98887659ea34f54fdad7eebcd92eb41d66b23fb19ad06010f31bd3ef
SHA512100636d4ccf43fd69f1a75597bcfccbd23beb28b1179aade56aa4da975d19f986c1f6d040a1bf6f4b16f8a01e2b6873ac8c7f77780606ab7b40338422ba3961c
-
Filesize
123KB
MD5e87a2ebc6e97cb54e774f353eb4385b2
SHA18512e2a3aabcdd3a12131a49385415a44fb979bf
SHA256c02b398d3831b8f3f06cf306e4811e6e498d3d1d2244d820e1c554a5acbd4f25
SHA512a1acdd562543c0266dacdf817668f4f06a2a91624791d24b3a59664e33c35738fa3d3129aeb4631600665641498e70dc19c04cb050824caf62997ca16ed9c0a2
-
Filesize
123KB
MD50c305aa7e29543ed07b581fb035d44f0
SHA1f9297fb44a8ada5202d38845c41f27e9069dff02
SHA25656a0ef6b4418afd3eca2b852c8f0efdace0363f826007b440fb8227952a4068b
SHA512a58baabe33556b7a6918993ddd1736ef876e4c0ecdc75faf693825fc4e5003c5dcc4a9c385e83a40ca4b16d6e9449ede38fbb4527424bbc71b5d004e952b5e07