Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 06:13
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
rkill.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
rkill.exe
Resource
win10v2004-20241007-en
General
-
Target
rkill.exe
-
Size
1.7MB
-
MD5
6d622dcc87edc9a7b10d35372ade816b
-
SHA1
47d98825b03c507b85dec02a2297e03ebc925f30
-
SHA256
d4ac5b3c525a5fd94019d80ff81b552e73b19b1bd0a554b9609cdd5e1b00955a
-
SHA512
ed06f872a7c66ffeeb8cb8f6fedca06ccabf623f9cd188c4c7105428e8d6521ef8da0bac0564e14d2da914d2846369a9c04577a8cf7fb80cb62831e5497f2a58
-
SSDEEP
49152:KpEsgw14kZV2HXsMnmjEREseBSsxHnfXsrHYi2Yijig:0wYJYW
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
rkill64.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts rkill64.exe -
Executes dropped EXE 1 IoCs
Processes:
rkill64.exepid process 1592 rkill64.exe -
Loads dropped DLL 3 IoCs
Processes:
rkill.exepid process 1868 rkill.exe 1216 1216 -
Modifies system executable filetype association 2 TTPs 64 IoCs
Processes:
rkill64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\HasLUAShield rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\DefaultIcon rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\ContextMenuHandlers\Compatibility\ = "{1d27f844-3a1f-4410-85ac-14651078412d}" rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\EditFlags = 30000000 rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Application" rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\EditFlags = 00000000 rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\Extended rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shellex rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\EditFlags = 38070000 rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runasuser rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runas rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\ContextMenuHandlers\Compatibility rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\ContextMenuHandlers\Compatibility rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\ContextMenuHandlers rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\DropHandler\ = "{86C86720-42A0-1069-A2E8-08002B30309D}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runasuser\command\DelegateExecute = "{ea72d00e-4960-42fa-ba92-7792a7944c1d}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\edit\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\print\command rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\ = "MS-DOS Application" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\DefaultIcon\ = "%SystemRoot%\\System32\\shell32.dll,2" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\shellex\DropHandler rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\DefaultIcon rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runas\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runas\command rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\ = "@shell32.dll,-50944" rkill64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\EditFlags = "0" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\DropHandler rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\DefaultIcon rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "%1" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runasuser\SuppressionPolicyEx = "{F211AA05-D4DF-4370-A2A0-9F19C09756A7}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\DropHandler rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\SuppressionPolicyEx = "{F211AA05-D4DF-4370-A2A0-9F19C09756A7}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runas rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\{8895b1c6-b41f-4c1c-a562-0d564250836f}\ = "{1531d583-8375-4d3f-b5fb-d23bbd169f22}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex\DropHandler\ = "{86C86720-42A0-1069-A2E8-08002B30309D}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runasuser rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\{8895b1c6-b41f-4c1c-a562-0d564250836f} rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runasuser\Extended rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\ContextMenuHandlers rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\PropertySheetHandlers\ShimLayer Property Page rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\open rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\open\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\PropertySheetHandlers\ShimLayer Property Page rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\PropertySheetHandlers\ShimLayer Property Page rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\FriendlyTypeName = "@%SystemRoot%\\System32\\shell32.dll,-10156" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ = "Windows Batch File" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runasuser\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\shell\open\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\shell\open rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runasuser\command rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runasuser\ = "@shell32.dll,-50944" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\DropHandler\ = "{86C86720-42A0-1069-A2E8-08002B30309D}" rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\FriendlyTypeName = "@%SystemRoot%\\System32\\acppage.dll,-6002" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\command\DelegateExecute = "{ea72d00e-4960-42fa-ba92-7792a7944c1d}" rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\PropertySheetHandlers rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\FriendlyTypeName = "@%SystemRoot%\\System32\\shell32.dll,-8464" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\ = "Compatibility" rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\ShimLayer Property Page rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\EditFlags = 30040000 rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-68" rkill64.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rkill.exe -
Modifies registry class 64 IoCs
Processes:
rkill64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\Content Type = "application/x-msdownload" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\PersistentHandler\ = "{5e941d80-bf96-11cd-b579-08002b30bfeb}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\FriendlyTypeName = "@%SystemRoot%\\System32\\acppage.dll,-6002" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\ContextMenuHandlers\Compatibility\ = "{1d27f844-3a1f-4410-85ac-14651078412d}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\ = "MS-DOS Application" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\print\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\{8895b1c6-b41f-4c1c-a562-0d564250836f} rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\DefaultIcon rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runasuser\command rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\ = "Compatibility" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\DropHandler\ = "{86C86720-42A0-1069-A2E8-08002B30309D}" rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\EditFlags = 30040000 rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\EditFlags = 00000000 rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\SuppressionPolicyEx = "{F211AA05-D4DF-4370-A2A0-9F19C09756A7}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\ContextMenuHandlers\Compatibility rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\EditFlags = 30000000 rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runas rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\HasLUAShield rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\runasuser rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\ContextMenuHandlers rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.com\PersistentHandler\ = "{098f2470-bae0-11cd-b579-08002b30bfeb}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex\DropHandler\ = "{86C86720-42A0-1069-A2E8-08002B30309D}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-68" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runasuser\command rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\PropertySheetHandlers rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\DropHandler rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ = "Windows Batch File" rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\EditFlags = 00000000 rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\DropHandler\ = "{86C86720-42A0-1069-A2E8-08002B30309D}" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runasuser\SuppressionPolicyEx = "{F211AA05-D4DF-4370-A2A0-9F19C09756A7}" rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\DefaultIcon\ = "%SystemRoot%\\System32\\shell32.dll,2" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\shellex\DropHandler rkill64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\EditFlags = 38070000 rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shellex\ContextMenuHandlers\Compatibility rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\PropertySheetHandlers\ShimLayer Property Page rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\shell\open rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\shell\open\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\comfile\DefaultIcon rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\ShimLayer Property Page rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\open rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\ContextMenuHandlers rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shellex rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\Extended rkill64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\EditFlags = "0" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Application" rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\ShellEx\{8895b1c6-b41f-4c1c-a562-0d564250836f}\ = "{1531d583-8375-4d3f-b5fb-d23bbd169f22}" rkill64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\.com\PersistentHandler\ rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\.exe rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\DefaultIcon rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\runasuser\command\DelegateExecute = "{ea72d00e-4960-42fa-ba92-7792a7944c1d}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shellex\DropHandler rkill64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runasuser\command\DelegateExecute = "{ea72d00e-4960-42fa-ba92-7792a7944c1d}" rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runas\command rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\runas rkill64.exe Key created \REGISTRY\MACHINE\Software\Classes\.com rkill64.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
Notepad.exepid process 2992 Notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rkill64.exepid process 1592 rkill64.exe 1592 rkill64.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rkill.exerkill64.exedescription pid process Token: SeDebugPrivilege 1868 rkill.exe Token: SeDebugPrivilege 1592 rkill64.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rkill.exerkill64.exedescription pid process target process PID 1868 wrote to memory of 1592 1868 rkill.exe rkill64.exe PID 1868 wrote to memory of 1592 1868 rkill.exe rkill64.exe PID 1868 wrote to memory of 1592 1868 rkill.exe rkill64.exe PID 1868 wrote to memory of 1592 1868 rkill.exe rkill64.exe PID 1592 wrote to memory of 2992 1592 rkill64.exe Notepad.exe PID 1592 wrote to memory of 2992 1592 rkill64.exe Notepad.exe PID 1592 wrote to memory of 2992 1592 rkill64.exe Notepad.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\rkill.exe"C:\Users\Admin\AppData\Local\Temp\rkill.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\rkill64.exeC:\Users\Admin\AppData\Local\Temp\rkill.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\System32\Notepad.exeNotepad.exe C:\Users\Admin\Desktop\Rkill.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54f071695e8365426203fee885604b5d4
SHA1a4421229b249a73f93d36bda16d266bf39b952c9
SHA256a0ffc62ff9c749d9066fede80f4ba5c4fed8795b7eed8644b6f70602d94e9b5d
SHA512406153329bf80aef5894298e54e75fb855290c0e3a64e591dd4f00b53a1372337189e2bc9a84fc358508b054ee4bc7ffd2b3be7ba58345412b8739df55b7bfe4
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
964KB
MD5ae368c10327fe7a8e5c875360e529b35
SHA1d69fad67631f48f2eee9109a368eb176356da531
SHA256797f0917162e74e64f556fd467cc13d10401e826309c3ed889574889a96b88c7
SHA512e7e6e4d29dfdc537b21fdffc6c1ac0674b55fdf6c61e5fecfbdde1fa271903db1291c50bac3263bc9f4ee7797689542f29770e0d98b8180453c39bc6058a5c67