General
-
Target
Kawaii.exe
-
Size
5.8MB
-
Sample
241120-r2ms5ayeql
-
MD5
006fe3fc14a6c1e45bf484878e69d8f8
-
SHA1
680ca4367f114a726ff9233fe942b8f615823968
-
SHA256
a7c98b50f8a332367c7bb72e1a4eacf6911a3ac3deaf8328b6645a62ededc08c
-
SHA512
0f3ffe6596a354e78993248372d67c8da89e585cf8854628a6541e8c1d70b752cf704900f511c49484ec0a6eaeccf65dc32268e9033fc8e4089572fe6a25a00d
-
SSDEEP
98304:ku3aEGA+Bf2ycevqJZUfYLceHQIJ/xvXEGAzBIcevqJZUfYLcN3HQIJ/xvf2:kD3cLrvLcqQIJ5TcLrvLc5QIJ
Static task
static1
Behavioral task
behavioral1
Sample
Kawaii.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Kawaii.exe
-
Size
5.8MB
-
MD5
006fe3fc14a6c1e45bf484878e69d8f8
-
SHA1
680ca4367f114a726ff9233fe942b8f615823968
-
SHA256
a7c98b50f8a332367c7bb72e1a4eacf6911a3ac3deaf8328b6645a62ededc08c
-
SHA512
0f3ffe6596a354e78993248372d67c8da89e585cf8854628a6541e8c1d70b752cf704900f511c49484ec0a6eaeccf65dc32268e9033fc8e4089572fe6a25a00d
-
SSDEEP
98304:ku3aEGA+Bf2ycevqJZUfYLceHQIJ/xvXEGAzBIcevqJZUfYLcN3HQIJ/xvf2:kD3cLrvLcqQIJ5TcLrvLc5QIJ
Score10/10-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Drops file in Drivers directory
-
Possible privilege escalation attempt
-
Deletes itself
-
Executes dropped EXE
-
Modifies file permissions
-
Modifies WinLogon
-
Modifies boot configuration data using bcdedit
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Winlogon Helper DLL
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Winlogon Helper DLL
2Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
8