Analysis

  • max time kernel
    51s
  • max time network
    45s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-11-2024 23:57

Errors

Reason
Machine shutdown

General

  • Target

    Kawaii.exe

  • Size

    5.3MB

  • MD5

    d9dabab21dc0ae729cd41a81850e8593

  • SHA1

    afca150f0964df9bf4c9336465ed0ff3c7ed4900

  • SHA256

    14c2553770ce1d8784cdd691d03f2d215c7112e29cc01701c9c5e8cd27b122f6

  • SHA512

    0caf4e854dd4458f8a2d730fe56d6a4c19cf1af5eb7e4b3534b34fd6758be15fbe320c4f823bd53d22d983a0f2fc14e4a8662d7d6c223e823ffa6423f617c5a3

  • SSDEEP

    98304:X3u3YBR2ycevqJZUfYLceHQIJ/xvSBIcevqJZUfYLcN3HQIJ/xvf2:nvcLrvLcqQIJjcLrvLc5QIJ

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops file in Drivers directory 1 IoCs
  • Possible privilege escalation attempt 6 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 11 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies registry class 43 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Kawaii.exe
    "C:\Users\Admin\AppData\Local\Temp\Kawaii.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k takeown /f C:\Windows\System32\gpedit.msc && icacls C:\Windows\System32\gpedit.msc /grant %username%:F && takeown /f C:\Windows\System32\mmc.exe && icacls C:\Windows\System32\mmc.exe /grant %username%:F && takeown /f C:\Windows\System32\taskkill.exe && icacls C:\Windows\System32\taskkill.exe /grant %username%:F && exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4520
      • C:\Windows\system32\takeown.exe
        takeown /f C:\Windows\System32\gpedit.msc
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:744
      • C:\Windows\system32\icacls.exe
        icacls C:\Windows\System32\gpedit.msc /grant Admin:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:968
      • C:\Windows\system32\takeown.exe
        takeown /f C:\Windows\System32\mmc.exe
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:5916
      • C:\Windows\system32\icacls.exe
        icacls C:\Windows\System32\mmc.exe /grant Admin:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2952
      • C:\Windows\system32\takeown.exe
        takeown /f C:\Windows\System32\taskkill.exe
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:2500
      • C:\Windows\system32\icacls.exe
        icacls C:\Windows\System32\taskkill.exe /grant Admin:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:5748
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k regedit /s "C:/Windows/System32/Win32/Windows/Kawaii/Temp/control.reg && exit" && exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3680
      • C:\Windows\regedit.exe
        regedit /s "C:/Windows/System32/Win32/Windows/Kawaii/Temp/control.reg && exit"
        3⤵
        • Runs .reg file with regedit
        PID:4044
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k notepad C:/Users/nota.txt && exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4764
      • C:\Windows\system32\notepad.exe
        notepad C:/Users/nota.txt
        3⤵
          PID:5728
      • C:\Windows\System32\shutdown.exe
        "C:\Windows\System32\shutdown.exe" -f -r -t 3
        2⤵
          PID:3556
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x00000000000004E8 0x00000000000004D0
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1640
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:3988
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3896
      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
        1⤵
        • Enumerates system info in registry
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3424
      • C:\Windows\System32\PickerHost.exe
        C:\Windows\System32\PickerHost.exe -Embedding
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3660
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x4 /state0:0xa39b5855 /state1:0x41c64e6d
        1⤵
          PID:3436

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Win32\Temp\Kawaii.exe

          Filesize

          5.3MB

          MD5

          d9dabab21dc0ae729cd41a81850e8593

          SHA1

          afca150f0964df9bf4c9336465ed0ff3c7ed4900

          SHA256

          14c2553770ce1d8784cdd691d03f2d215c7112e29cc01701c9c5e8cd27b122f6

          SHA512

          0caf4e854dd4458f8a2d730fe56d6a4c19cf1af5eb7e4b3534b34fd6758be15fbe320c4f823bd53d22d983a0f2fc14e4a8662d7d6c223e823ffa6423f617c5a3

        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\JGX6DE9O\www.bing[1].xml

          Filesize

          15KB

          MD5

          6aa927185311072211088b5c774c97c8

          SHA1

          c0fc436772c38c072ffb5e4c35e357954106dfb7

          SHA256

          d7178ae01e54a6d604067af3ae1194574a206740d89f70001c6d7add9b79af8f

          SHA512

          71eeb0bd691f0e932e1e48d993f5a0a58b4a6f780202d51f9256a28c3653cba63ef2dc2f7fbceaee9d286de60f8138b2dbf06bd72470674da31212fe2112d8ef

        • C:\Users\nota.txt

          Filesize

          471B

          MD5

          0aea1502a4192f4fcd8d25d4172ec0e5

          SHA1

          adcc286452580eee1a6d651c63f54cdaaadc23e0

          SHA256

          acab5764875cdbb4a37299d32da3680ff66221072eb8a044375a872d3b1a9eee

          SHA512

          33ed0647cd4a81e1aa71fa9faa3d548b6fd2596822315dc41eefde1e57dae4440476e128d79288c47636e3ceac0a435b532b6d2c7eefc52c5910385b57771edb

        • memory/688-21-0x000000001CA80000-0x000000001CAC6000-memory.dmp

          Filesize

          280KB

        • memory/688-2-0x00007FFC57630000-0x00007FFC580F2000-memory.dmp

          Filesize

          10.8MB

        • memory/688-5-0x00007FFC57630000-0x00007FFC580F2000-memory.dmp

          Filesize

          10.8MB

        • memory/688-3-0x00007FFC57630000-0x00007FFC580F2000-memory.dmp

          Filesize

          10.8MB

        • memory/688-23-0x000000001CD80000-0x000000001CD8D000-memory.dmp

          Filesize

          52KB

        • memory/688-24-0x000000001CD90000-0x000000001CDAE000-memory.dmp

          Filesize

          120KB

        • memory/688-25-0x000000001CDB0000-0x000000001CDBB000-memory.dmp

          Filesize

          44KB

        • memory/688-0-0x00007FFC57633000-0x00007FFC57635000-memory.dmp

          Filesize

          8KB

        • memory/688-22-0x000000001CAD0000-0x000000001CAD9000-memory.dmp

          Filesize

          36KB

        • memory/688-4-0x00007FFC57630000-0x00007FFC580F2000-memory.dmp

          Filesize

          10.8MB

        • memory/688-1-0x0000000000A20000-0x0000000000F6C000-memory.dmp

          Filesize

          5.3MB

        • memory/688-51-0x000000001CA80000-0x000000001CAC6000-memory.dmp

          Filesize

          280KB

        • memory/3424-175-0x000001BDB72E0000-0x000001BDB7300000-memory.dmp

          Filesize

          128KB

        • memory/3424-176-0x000001BDB7500000-0x000001BDB7600000-memory.dmp

          Filesize

          1024KB

        • memory/3424-177-0x000001BDB5BA0000-0x000001BDB5BC0000-memory.dmp

          Filesize

          128KB

        • memory/3424-264-0x000001BDBADA0000-0x000001BDBAEA0000-memory.dmp

          Filesize

          1024KB

        • memory/3424-46-0x000001BD81D00000-0x000001BD81E00000-memory.dmp

          Filesize

          1024KB