Resubmissions
13/09/2024, 08:50
240913-krrk1avbln 813/09/2024, 08:46
240913-kpfeysvdlb 313/09/2024, 08:34
240913-kgtbvavakd 8Analysis
-
max time kernel
103s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
em.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
em.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Launcherkks.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Launcherkks.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Launcherkks.pck
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Launcherkks.pck
Resource
win10v2004-20240802-en
General
-
Target
Launcherkks.pck
-
Size
374KB
-
MD5
629de0818f1ddcad721e870d8a211bdf
-
SHA1
d251a07f8be2abdd3f5f4032fd820f641f1b9750
-
SHA256
0d03c7c6335e06c45dd810fba6c52cdb9eafe02111da897696b83811bff0be92
-
SHA512
e0652bc32229e7cb4fe7f18a45c68d2a43c425982750ca64ba775e39a04cf0a373e231f9b8b7eaf6a281c8492342b6d720901139c970676f57324b38ed7ec7ae
-
SSDEEP
6144:1mKBG1eY8bMQ8aX7vlqyXTdhmDjmk0iPvsxFHGqhGnyfGD5ro9W3vEuFm8eidH:IKY1eXMQv7NqkHgj07GHn0GLhF
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\pck_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.pck rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\pck_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\pck_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\pck_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.pck\ = "pck_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\pck_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\pck_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2704 AcroRd32.exe 2704 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2104 1620 cmd.exe 31 PID 1620 wrote to memory of 2104 1620 cmd.exe 31 PID 1620 wrote to memory of 2104 1620 cmd.exe 31 PID 2104 wrote to memory of 2704 2104 rundll32.exe 32 PID 2104 wrote to memory of 2704 2104 rundll32.exe 32 PID 2104 wrote to memory of 2704 2104 rundll32.exe 32 PID 2104 wrote to memory of 2704 2104 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Launcherkks.pck1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Launcherkks.pck2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Launcherkks.pck"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e1dce97465aae293f27731c859faeb77
SHA1dc46d70e50b454c2c9c12a4aee134819d2699054
SHA25692ed13394fda8dac70ce04de2333b024e66b17ac0350e4164225380161f39ec8
SHA5129c763e2035e921bc46630bc0dbcb18a99b866154f727b065135e3a736516d8234252556ccfaf9069142ae23e3da9d60d2d116ee53d51d39585281df2589a64cb