Overview
overview
3Static
static
3kg_patch.rar
windows7-x64
1kg_patch.rar
windows10-2004-x64
1kg_patch/i...hexlic
windows7-x64
3kg_patch/i...hexlic
windows10-2004-x64
3kg_patch/k...sha256
windows7-x64
3kg_patch/k...sha256
windows10-2004-x64
3kg_patch/keygen2.py
windows7-x64
3kg_patch/keygen2.py
windows10-2004-x64
3kg_patch/l...ida.so
windows7-x64
3kg_patch/l...ida.so
windows10-2004-x64
3kg_patch/l...a32.so
windows7-x64
3kg_patch/l...a32.so
windows10-2004-x64
3kg_patch/w...da.dll
windows7-x64
1kg_patch/w...da.dll
windows10-2004-x64
1kg_patch/w...32.dll
windows7-x64
1kg_patch/w...32.dll
windows10-2004-x64
1Analysis
-
max time kernel
1561s -
max time network
1566s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
kg_patch.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
kg_patch.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
kg_patch/idapro.hexlic
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
kg_patch/idapro.hexlic
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
kg_patch/keygen.sha256
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
kg_patch/keygen.sha256
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
kg_patch/keygen2.py
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
kg_patch/keygen2.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
kg_patch/linux/libida.so
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
kg_patch/linux/libida.so
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
kg_patch/linux/libida32.so
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
kg_patch/linux/libida32.so
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
kg_patch/windows/ida.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
kg_patch/windows/ida.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
kg_patch/windows/ida32.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
kg_patch/windows/ida32.dll
Resource
win10v2004-20241007-en
General
-
Target
kg_patch/linux/libida32.so
-
Size
5.8MB
-
MD5
77e963a6e35ca4edfde1c69eee71b91b
-
SHA1
3124cf98f4f03539122db10f5f614fb3f390f36d
-
SHA256
94e8afe3c416a25f07ad7feaf24da9037ec86f3ac35f6c5eb5d3c9999d88a3c8
-
SHA512
7222314493ae8c22cb583a4dbfadf8802a5d14051cf9082ff65a44cd894e0b5b1290debe3c40422611d91a6b4e698e0820e4d9013853302dd65c570de65f1da5
-
SSDEEP
98304:qyjxbtmXFYleUYjQIm4Pkx/KeLovd6QdXKCUNHKkGsy6fCJMOC0:fmVQ/s1doZaGq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2764 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2764 AcroRd32.exe 2764 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1520 wrote to memory of 2864 1520 cmd.exe rundll32.exe PID 1520 wrote to memory of 2864 1520 cmd.exe rundll32.exe PID 1520 wrote to memory of 2864 1520 cmd.exe rundll32.exe PID 2864 wrote to memory of 2764 2864 rundll32.exe AcroRd32.exe PID 2864 wrote to memory of 2764 2864 rundll32.exe AcroRd32.exe PID 2864 wrote to memory of 2764 2864 rundll32.exe AcroRd32.exe PID 2864 wrote to memory of 2764 2864 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\kg_patch\linux\libida32.so1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\kg_patch\linux\libida32.so2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\kg_patch\linux\libida32.so"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55dfb7c2aa8c26418ec844f61b87db7bd
SHA1399030f97af74248df2f57e2f36f69496bc16f23
SHA2564ce4e82900adfdaeac03f1e3d79dcd81826dfb463ba73b518a2fc79182d6d91f
SHA5123fc18a592eee2a321edae1f36e9ff4eb8bd08ada32416f4c931976a5abd31ecf8f4c537f1af24d2db05eeabd378bf36927986d2289316b7ae4c35082dc443bb7