Overview
overview
3Static
static
3kg_patch.rar
windows7-x64
1kg_patch.rar
windows10-2004-x64
1kg_patch/i...hexlic
windows7-x64
3kg_patch/i...hexlic
windows10-2004-x64
3kg_patch/k...sha256
windows7-x64
3kg_patch/k...sha256
windows10-2004-x64
3kg_patch/keygen2.py
windows7-x64
3kg_patch/keygen2.py
windows10-2004-x64
3kg_patch/l...ida.so
windows7-x64
3kg_patch/l...ida.so
windows10-2004-x64
3kg_patch/l...a32.so
windows7-x64
3kg_patch/l...a32.so
windows10-2004-x64
3kg_patch/w...da.dll
windows7-x64
1kg_patch/w...da.dll
windows10-2004-x64
1kg_patch/w...32.dll
windows7-x64
1kg_patch/w...32.dll
windows10-2004-x64
1Analysis
-
max time kernel
1557s -
max time network
1558s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
kg_patch.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
kg_patch.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
kg_patch/idapro.hexlic
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
kg_patch/idapro.hexlic
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
kg_patch/keygen.sha256
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
kg_patch/keygen.sha256
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
kg_patch/keygen2.py
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
kg_patch/keygen2.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
kg_patch/linux/libida.so
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
kg_patch/linux/libida.so
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
kg_patch/linux/libida32.so
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
kg_patch/linux/libida32.so
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
kg_patch/windows/ida.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
kg_patch/windows/ida.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
kg_patch/windows/ida32.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
kg_patch/windows/ida32.dll
Resource
win10v2004-20241007-en
General
-
Target
kg_patch/linux/libida.so
-
Size
6.0MB
-
MD5
4fb6f5360f84714744c6fc6aedcd5df7
-
SHA1
d5c6e0bf0a44aa205892cf913e04b68caa5dbe35
-
SHA256
44cb257832616872237b4c8e01933de78c46f652f72f2d8cf13a88e7bf369a8a
-
SHA512
944f60cf816ba51c35a972ec8064c7702e841fc92d5ee7474568f6089fa2fe9f7d4e0f8670c169a92988a53a0cd01cb17c2c662de82d40d2dba341a773e78998
-
SSDEEP
98304:67Ljv5Y4j5sfeEZEi289UbqmX6XCVwrnNVdyvu/gEevPeQZl6AhDwN:q1liPMiVqjphEN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2196 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2196 AcroRd32.exe 2196 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2684 wrote to memory of 2432 2684 cmd.exe rundll32.exe PID 2684 wrote to memory of 2432 2684 cmd.exe rundll32.exe PID 2684 wrote to memory of 2432 2684 cmd.exe rundll32.exe PID 2432 wrote to memory of 2196 2432 rundll32.exe AcroRd32.exe PID 2432 wrote to memory of 2196 2432 rundll32.exe AcroRd32.exe PID 2432 wrote to memory of 2196 2432 rundll32.exe AcroRd32.exe PID 2432 wrote to memory of 2196 2432 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\kg_patch\linux\libida.so1⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\kg_patch\linux\libida.so2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\kg_patch\linux\libida.so"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55ea01bb06841c4b446887fd9f37336d8
SHA1cf2695c9f3aec19145f3410b4e3dcf3f40cb1d85
SHA256c683840ebedf831882d2000e456e3e5aaf491cec9eae991852cd579794fc8f3e
SHA512d5aa184f604f03a4c6b2bdb9a13b96cbe70c38e59974d56201165cad9be54450a6c1392c08d17ea1346dd3d11aaba2c8e75837efce8b33341f5a701c7665b8da