Overview
overview
10Static
static
1048db28a1f4...c5.exe
windows7-x64
148db28a1f4...c5.exe
windows10-2004-x64
1595539b200...6e.exe
windows7-x64
7595539b200...6e.exe
windows10-2004-x64
7689ca565d8...33.exe
windows7-x64
7689ca565d8...33.exe
windows10-2004-x64
1079c92912e5...1e.exe
windows7-x64
179c92912e5...1e.exe
windows10-2004-x64
17c7a1691b4...c8.exe
windows7-x64
77c7a1691b4...c8.exe
windows10-2004-x64
7Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 06:23
Behavioral task
behavioral1
Sample
48db28a1f4bd01050aa13f021c3b1dfd7aa7ed807592e0a23f3c7afbb7db78c5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
48db28a1f4bd01050aa13f021c3b1dfd7aa7ed807592e0a23f3c7afbb7db78c5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
595539b2009fdf8e53a409f7a21b779e7a670ca61f0a8dc216b226d753a54e6e.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
595539b2009fdf8e53a409f7a21b779e7a670ca61f0a8dc216b226d753a54e6e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
689ca565d836bb3ee3d52797c7d7c89e7d5b941259bc47403703355049c0dd33.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
689ca565d836bb3ee3d52797c7d7c89e7d5b941259bc47403703355049c0dd33.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
79c92912e557a1cbd3299221952a42beb62ce12baa8aafaae285171bd88cf71e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
79c92912e557a1cbd3299221952a42beb62ce12baa8aafaae285171bd88cf71e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe
Resource
win10v2004-20241007-en
General
-
Target
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe
-
Size
3.9MB
-
MD5
c8420fe03d088ed9558dea175de7711f
-
SHA1
2feece2652375bee5171f31d10caf9ea4291ed36
-
SHA256
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8
-
SHA512
ef935456d3fd0a7f32b1abb8bfc2ccb9b37443835157f9b8805875fce15ab1b9ec1639253d6ec20b83dadae714531e49f6c26621fbb5ffca46af665a5df88a2a
-
SSDEEP
98304:rUg3G64EgdhTNuQmT19jSxkUDsY5HJFWHzFJkyTnIDQVVNdM8LtUIgCfhsT:lGNXNu/LjeOY5pFovkyTIDQs8LqIgCK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe -
Executes dropped EXE 2 IoCs
Processes:
Setup.exekodoes.exepid process 4412 Setup.exe 4864 kodoes.exe -
Drops file in Program Files directory 22 IoCs
Processes:
Setup.exedescription ioc process File created C:\Program Files\kameos\nexos.exe Setup.exe File opened for modification C:\Program Files\NSWUSB\NSWUSB¦µ¦ó+v+¦¦˜-¦+˜.txt Setup.exe File opened for modification C:\Program Files\NSWUSB\unin000.exe Setup.exe File opened for modification C:\Program Files\NSWUSB\uninstall.exe Setup.exe File opened for modification C:\Program Files\kameos\gozos\soneos.dll Setup.exe File opened for modification C:\Program Files\kameos\gozos\sonoes.dll Setup.exe File created C:\Program Files\NSWUSB\NSWUSB¦µ¦ó+v+¦¦˜-¦+˜.txt Setup.exe File opened for modification C:\Program Files\NSWUSB\NSW+++º¦-¦¦+¦-¦+˜¦+¦-.txt Setup.exe File created C:\Program Files\NSWUSB\uninstall.exe Setup.exe File created C:\Program Files\kameos\gozos\sonoes.dll Setup.exe File created C:\Program Files\kameos\jy.ini Setup.exe File created C:\Program Files\NSWUSB\ForWin2000XP2003VNSWUSB¦µ¦ó+v+¦¦˜071211.exe Setup.exe File created C:\Program Files\NSWUSB\NSW+++º¦-¦¦+¦-¦+˜¦+¦-.txt Setup.exe File opened for modification C:\Program Files\kameos\kodoes.exe Setup.exe File opened for modification C:\Program Files\kameos\nexos.exe Setup.exe File created C:\Program Files\kameos\kodoes.exe Setup.exe File opened for modification C:\Program Files\NSWUSB\ForWin2000XP2003VNSWUSB¦µ¦ó+v+¦¦˜071211.exe Setup.exe File created C:\Program Files\NSWUSB\unin000.exe Setup.exe File created C:\Program Files\NSWUSB\install.log Setup.exe File opened for modification C:\Program Files\NSWUSB\install.log Setup.exe File created C:\Program Files\kameos\gozos\soneos.dll Setup.exe File opened for modification C:\Program Files\kameos\jy.ini Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exeSetup.exekodoes.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kodoes.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exeSetup.exedescription pid process target process PID 2836 wrote to memory of 4412 2836 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe Setup.exe PID 2836 wrote to memory of 4412 2836 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe Setup.exe PID 2836 wrote to memory of 4412 2836 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe Setup.exe PID 4412 wrote to memory of 4864 4412 Setup.exe kodoes.exe PID 4412 wrote to memory of 4864 4412 Setup.exe kodoes.exe PID 4412 wrote to memory of 4864 4412 Setup.exe kodoes.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe"C:\Users\Admin\AppData\Local\Temp\7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Program Files\kameos\kodoes.exe"C:\Program Files\kameos\kodoes.exe" /install /Silent3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD5143022c9ee4ef7bd1a1385176d67b8a2
SHA1f1a9d4281344226b4ffca6ae32c6dafacf4c8a86
SHA256a604f66cec56e771c8856f7653b1cf1d171fca7d166bf0396d81f7aa9856799e
SHA5124c76cb207b0424bc00ded29b8f95da6c2a2d7f9225fa91fa250ac21896d6f762f3d5f9f093f2755e25ab20426b86867e58ef8421607bcbeea41e45c10ae7cfc8
-
Filesize
87B
MD555a05bfe666f1e978320951c40eddeb8
SHA1a57ba2e8a8cc37918f837b19105ad67095bfbaea
SHA256dde851b8bed5f3d9fbd0da96203b5a9510a5efb67eaf84987fbc74fd8667df68
SHA512a0e5f939b2ff00b7c2b614f5f2ce902e23be1330a2a672ee80907f5daee388345f05f4b2f6c7523d318dafa3b11a2254f3315232f91ace0c7fe1d3c31595899b
-
Filesize
695KB
MD522ae62f7fc1d0e086e188618d6ce846b
SHA129ec7a5c578b0706dbbe56995f265650f7a0c355
SHA256ed86b5ae8fb89dc3f7919e74deb1bb6f4a97de3a104e2570c4aeda0ee9d28fa2
SHA512d64d483ca3ca864294d90ead7137fded970fccfdb4957b26d400e2074ecec5878ad2af6f98b386fe96d499673c972dce0f08bf8539081cf251bc433838e18eb4
-
Filesize
999KB
MD57940573022d81cbdb9c04a22f5d88ad5
SHA17352716c480ee92ab212bfcd2627f802d03907cc
SHA2563d413208468ad2a4a8f865ba41544ddad94b020084597ef971848425b38d3d14
SHA512df06e17515e3e3b1b2b97b49272dd69163fde07ae18ba49b86ae9f9c406b267bb152eaa0b325d044994c328627424b56e9e14948b7d3b93679b165062eeaf60b
-
Filesize
2.0MB
MD5c624d07853622e885fa662a927807d18
SHA1f81b52bba0104240b9f4ff1f838ab4638a238904
SHA256ba79004542219a0e08a2d235f4a543169fe09c1a3a5cca58b890021ca04abb00
SHA512f05809a72dc84b966dc485a6cd19c354adf0e8f3e4c04788b400fe489a1b34ab290747aa817149b9dc75d45f5e77d0281d501624a007b2c80a0f489cd6e0935c
-
Filesize
1.4MB
MD59a630944845e65577765696a0457e4f9
SHA1dcdd73f2ba4be4a2503ac46c510ccaa8cd121ad7
SHA256f90dc276829be8938fee827c009e536b4872e3ddf39d893a18b041d14fbdf6d5
SHA512e204b3d2c4d793411c0d87c6c1b4fa72e11971a09f88031136624651c443c0f98311687a5b2b6e77ff0e53630b05577a99efd13891dc8ee7cb2b6eeefb3c1de5
-
Filesize
2KB
MD59d8bed25504dd1b9917372c1fed19959
SHA1670d697925f635170b5730751e631c0a445e6c36
SHA25621ccc1539893ea5d65c18cb259edcc72ac8d9b84ba9c654ba3070fabb4f765f6
SHA51298dbd6bf1befca6afd93bf3ba35bdcfadc28303a158796aa76f0e9d8380e99e5e716116d1e712e4fd02e4793c75c43fff0b01a74bd49da7c3052d527e19599f4
-
Filesize
227B
MD5387fd915fa13d669dc58a84c88eaa943
SHA135745ce0cbabf6eecd6fe9719807ef95850ce150
SHA2560033c9906f7b33f25e12cee7d1e7e07163d509d4569dfd5175ca321587b7fe5b
SHA512c4e49cce74c81b0c020f28bc9806c118b4863dda464977379146bffc72cb1e9bea3492aed31f62f1499d8d778da676cf1154bc5176a974c46422eeb3a986e5af