Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 06:16
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
rkill.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
rkill.exe
Resource
win10v2004-20241007-en
General
-
Target
rkill.exe
-
Size
1.7MB
-
MD5
6d622dcc87edc9a7b10d35372ade816b
-
SHA1
47d98825b03c507b85dec02a2297e03ebc925f30
-
SHA256
d4ac5b3c525a5fd94019d80ff81b552e73b19b1bd0a554b9609cdd5e1b00955a
-
SHA512
ed06f872a7c66ffeeb8cb8f6fedca06ccabf623f9cd188c4c7105428e8d6521ef8da0bac0564e14d2da914d2846369a9c04577a8cf7fb80cb62831e5497f2a58
-
SSDEEP
49152:KpEsgw14kZV2HXsMnmjEREseBSsxHnfXsrHYi2Yijig:0wYJYW
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
rkill64.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts rkill64.exe -
Executes dropped EXE 1 IoCs
Processes:
rkill64.exepid process 2708 rkill64.exe -
Loads dropped DLL 3 IoCs
Processes:
rkill.exepid process 2664 rkill.exe 1196 1196 -
Modifies system executable filetype association 2 TTPs 64 IoCs
Processes:
rkill64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\ = "@shell32.dll,-50944" rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\PropertySheetHandlers\ShimLayer Property Page rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\DefaultIcon\ = "%SystemRoot%\\System32\\shell32.dll,2" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runasuser rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\DefaultIcon rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\Extended rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\ContextMenuHandlers\Compatibility\ = "{1d27f844-3a1f-4410-85ac-14651078412d}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\FriendlyTypeName = "@%SystemRoot%\\System32\\shell32.dll,-8464" rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-68" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\PropertySheetHandlers\ShimLayer Property Page rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\ContextMenuHandlers rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\PropertySheetHandlers rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runasuser\command rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runasuser\Extended rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\command\DelegateExecute = "{ea72d00e-4960-42fa-ba92-7792a7944c1d}" rkill64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\EditFlags = "0" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "%1" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\edit\command rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\EditFlags = 00000000 rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\print\command rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\Compatibility\ = "{1d27f844-3a1f-4410-85ac-14651078412d}" rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\ShimLayer Property Page rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runas\command rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\SuppressionPolicyEx = "{F211AA05-D4DF-4370-A2A0-9F19C09756A7}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\DefaultIcon rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\ = "Compatibility" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\ContextMenuHandlers\Compatibility rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runasuser\SuppressionPolicyEx = "{F211AA05-D4DF-4370-A2A0-9F19C09756A7}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runasuser\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\DefaultIcon rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runasuser\command\DelegateExecute = "{ea72d00e-4960-42fa-ba92-7792a7944c1d}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\DropHandler rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\ = "MS-DOS Application" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\HasLUAShield rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\{8895b1c6-b41f-4c1c-a562-0d564250836f}\ = "{1531d583-8375-4d3f-b5fb-d23bbd169f22}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\shell\open rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex\DropHandler\ = "{86C86720-42A0-1069-A2E8-08002B30309D}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Application" rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\EditFlags = 38070000 rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\shell\open\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\PropertySheetHandlers\ShimLayer Property Page rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\shellex\DropHandler rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\DropHandler\ = "{86C86720-42A0-1069-A2E8-08002B30309D}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\ContextMenuHandlers\Compatibility rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\EditFlags = 00000000 rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runas\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runas rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\FriendlyTypeName = "@%SystemRoot%\\System32\\shell32.dll,-10156" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runasuser\ = "@shell32.dll,-50944" rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\EditFlags = 30000000 rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shellex rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\EditFlags = 30040000 rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\open rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runas\HasLUAShield rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\{8895b1c6-b41f-4c1c-a562-0d564250836f} rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\ContextMenuHandlers\ = "Compatibility" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runas rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\ContextMenuHandlers rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\DropHandler\ = "{86C86720-42A0-1069-A2E8-08002B30309D}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\FriendlyTypeName = "@%SystemRoot%\\System32\\acppage.dll,-6002" rkill64.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rkill.exe -
Modifies registry class 64 IoCs
Processes:
rkill64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ = "Windows Batch File" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\ContextMenuHandlers\ = "Compatibility" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\PropertySheetHandlers\ShimLayer Property Page rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runasuser\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\DropHandler rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\DropHandler\ = "{86C86720-42A0-1069-A2E8-08002B30309D}" rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\.bat rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Application" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "%1" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runas rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-68" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runas rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\{8895b1c6-b41f-4c1c-a562-0d564250836f}\ = "{1531d583-8375-4d3f-b5fb-d23bbd169f22}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runasuser\SuppressionPolicyEx = "{F211AA05-D4DF-4370-A2A0-9F19C09756A7}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\ = "Compatibility" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\DefaultIcon rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runas\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\DefaultIcon rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\PropertySheetHandlers\ShimLayer Property Page rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\PersistentHandler\ = "{5e941d80-bf96-11cd-b579-08002b30bfeb}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\ContextMenuHandlers rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.com\PersistentHandler\ = "{098f2470-bae0-11cd-b579-08002b30bfeb}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\.exe rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runasuser\ = "@shell32.dll,-50944" rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\EditFlags = 00000000 rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\.com rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\.com\PersistentHandler\ rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\shell\open rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\open rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\command\DelegateExecute = "{ea72d00e-4960-42fa-ba92-7792a7944c1d}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runas\HasLUAShield rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runasuser\command rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\ = "@shell32.dll,-50944" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\SuppressionPolicyEx = "{F211AA05-D4DF-4370-A2A0-9F19C09756A7}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\ContextMenuHandlers\Compatibility\ = "{1d27f844-3a1f-4410-85ac-14651078412d}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\Content Type = "application/x-msdownload" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\EditFlags = 30040000 rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\PropertySheetHandlers rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\DefaultIcon\ = "%SystemRoot%\\System32\\shell32.dll,2" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\ContextMenuHandlers rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\edit\command rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex\DropHandler\ = "{86C86720-42A0-1069-A2E8-08002B30309D}" rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\EditFlags = 00000000 rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\shell\open\command rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\ContextMenuHandlers\Compatibility rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\HasLUAShield rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runas\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\open\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\.bat\PersistentHandler\ rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\.exe\PersistentHandler rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runasuser\command\DelegateExecute = "{ea72d00e-4960-42fa-ba92-7792a7944c1d}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\ContextMenuHandlers\Compatibility rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\PropertySheetHandlers\ShimLayer Property Page rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runasuser rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\{8895b1c6-b41f-4c1c-a562-0d564250836f} rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\ = "MS-DOS Application" rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\EditFlags = 30000000 rkill64.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
Notepad.exepid process 1412 Notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rkill64.exepid process 2708 rkill64.exe 2708 rkill64.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rkill.exerkill64.exedescription pid process Token: SeDebugPrivilege 2664 rkill.exe Token: SeDebugPrivilege 2708 rkill64.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rkill.exerkill64.exedescription pid process target process PID 2664 wrote to memory of 2708 2664 rkill.exe rkill64.exe PID 2664 wrote to memory of 2708 2664 rkill.exe rkill64.exe PID 2664 wrote to memory of 2708 2664 rkill.exe rkill64.exe PID 2664 wrote to memory of 2708 2664 rkill.exe rkill64.exe PID 2708 wrote to memory of 1412 2708 rkill64.exe Notepad.exe PID 2708 wrote to memory of 1412 2708 rkill64.exe Notepad.exe PID 2708 wrote to memory of 1412 2708 rkill64.exe Notepad.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\rkill.exe"C:\Users\Admin\AppData\Local\Temp\rkill.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\rkill64.exeC:\Users\Admin\AppData\Local\Temp\rkill.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\System32\Notepad.exeNotepad.exe C:\Users\Admin\Desktop\Rkill.txt3⤵
- Opens file in notepad (likely ransom note)
PID:1412
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e7a05f4a5d20d6e66813ac8afcce9ce4
SHA156e325e9276e6a995040fcb367a193099658722d
SHA256070e3fae740f87379d86584746cd68b88c8f974409783df108089a596ccbbccc
SHA512fa9493c27274b7510d9ec50b0223fcf394e5c83ac109c565feba9efb1101ba50dcdef7e693e545823eec3742bbf41a20ba9942adb86c431fc00aaba4654186a7
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
964KB
MD5ae368c10327fe7a8e5c875360e529b35
SHA1d69fad67631f48f2eee9109a368eb176356da531
SHA256797f0917162e74e64f556fd467cc13d10401e826309c3ed889574889a96b88c7
SHA512e7e6e4d29dfdc537b21fdffc6c1ac0674b55fdf6c61e5fecfbdde1fa271903db1291c50bac3263bc9f4ee7797689542f29770e0d98b8180453c39bc6058a5c67