Analysis

  • max time kernel
    134s
  • max time network
    94s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-11-2024 14:41

Errors

Reason
Machine shutdown

General

  • Target

    Kawaii.exe

  • Size

    5.8MB

  • MD5

    006fe3fc14a6c1e45bf484878e69d8f8

  • SHA1

    680ca4367f114a726ff9233fe942b8f615823968

  • SHA256

    a7c98b50f8a332367c7bb72e1a4eacf6911a3ac3deaf8328b6645a62ededc08c

  • SHA512

    0f3ffe6596a354e78993248372d67c8da89e585cf8854628a6541e8c1d70b752cf704900f511c49484ec0a6eaeccf65dc32268e9033fc8e4089572fe6a25a00d

  • SSDEEP

    98304:ku3aEGA+Bf2ycevqJZUfYLceHQIJ/xvXEGAzBIcevqJZUfYLcN3HQIJ/xvf2:kD3cLrvLcqQIJ5TcLrvLc5QIJ

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • Blocks application from running via registry modification 9 IoCs

    Adds application to list of disallowed applications.

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 1 IoCs
  • Possible privilege escalation attempt 6 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Modifies boot configuration data using bcdedit 1 IoCs
  • Drops file in System32 directory 11 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 62 IoCs
  • Suspicious use of SendNotifyMessage 62 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Kawaii.exe
    "C:\Users\Admin\AppData\Local\Temp\Kawaii.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5788
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1124
    • C:\Users\Admin\AppData\Local\Temp\Kawaii.exe
      "C:\Users\Admin\AppData\Local\Temp\Kawaii.exe"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5480
    • C:\Windows\System32\Taskmgr.exe
      "C:\Windows\System32\Taskmgr.exe"
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5040
    • C:\Users\Admin\Desktop\Kawaii.exe
      "C:\Users\Admin\Desktop\Kawaii.exe"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4424
      • C:\Users\Admin\AppData\Local\Temp\Kawaii.exe
        "C:\Users\Admin\AppData\Local\Temp\Kawaii.exe"
        2⤵
        • Modifies WinLogon for persistence
        • Modifies Windows Defender Real-time Protection settings
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Blocks application from running via registry modification
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Deletes itself
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:4624
        • C:\Windows\system32\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\README.txt
          3⤵
          • Opens file in notepad (likely ransom note)
          PID:948
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /k takeown /f C:\Windows\System32\gpedit.msc && icacls C:\Windows\System32\gpedit.msc /grant %username%:F && takeown /f C:\Windows\System32\mmc.exe && icacls C:\Windows\System32\mmc.exe /grant %username%:F && takeown /f C:\Windows\System32\taskkill.exe && icacls C:\Windows\System32\taskkill.exe /grant %username%:F && exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4480
          • C:\Windows\system32\takeown.exe
            takeown /f C:\Windows\System32\gpedit.msc
            4⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            • Suspicious use of AdjustPrivilegeToken
            PID:5828
          • C:\Windows\system32\icacls.exe
            icacls C:\Windows\System32\gpedit.msc /grant Admin:F
            4⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            PID:816
          • C:\Windows\system32\takeown.exe
            takeown /f C:\Windows\System32\mmc.exe
            4⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            • Suspicious use of AdjustPrivilegeToken
            PID:5636
          • C:\Windows\system32\icacls.exe
            icacls C:\Windows\System32\mmc.exe /grant Admin:F
            4⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            PID:1612
          • C:\Windows\system32\takeown.exe
            takeown /f C:\Windows\System32\taskkill.exe
            4⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            • Suspicious use of AdjustPrivilegeToken
            PID:5704
          • C:\Windows\system32\icacls.exe
            icacls C:\Windows\System32\taskkill.exe /grant Admin:F
            4⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            PID:1492
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /k regedit /s "C:/Windows/System32/Win32/Windows/Kawaii/Temp/control.reg && exit" && exit
          3⤵
            PID:5256
            • C:\Windows\regedit.exe
              regedit /s "C:/Windows/System32/Win32/Windows/Kawaii/Temp/control.reg && exit"
              4⤵
              • Runs .reg file with regedit
              PID:1336
          • C:\Windows\System32\taskkillH1BUmuE4gUjeryUQt6yB.exe
            "C:\Windows\System32\taskkillH1BUmuE4gUjeryUQt6yB.exe" -f -im explorer.exe
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3544
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /k notepad C:/Users/nota.txt && exit
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4272
            • C:\Windows\system32\notepad.exe
              notepad C:/Users/nota.txt
              4⤵
                PID:4572
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /k bcdedit /deletevalue {current} safeboot
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1456
              • C:\Windows\system32\bcdedit.exe
                bcdedit /deletevalue {current} safeboot
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:3584
            • C:\Windows\System32\shutdown.exe
              "C:\Windows\System32\shutdown.exe" -f -r -t 3
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4280
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004B8
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:6008
        • C:\Windows\System32\PickerHost.exe
          C:\Windows\System32\PickerHost.exe -Embedding
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:1568

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Kawaii.exe.log

          Filesize

          660B

          MD5

          284393596fdd49bebd7b861bf339b82d

          SHA1

          a36767dfc423b3c7fd3ff439b616862743a053c8

          SHA256

          0e692bcbba51ca4e766a427c9f28a7a4a9e326d2cf835493e57a9dc2121326b5

          SHA512

          8d3247ee0c3bf9a9fceea23eb5c646dbd8b3d954f4d62622f49070629e642d6a13bfb0d27949e2355c081d45f5a1101f05a9972782a0f0a478ed90f551d2efeb

        • C:\Users\Admin\AppData\Local\Temp\Kawaii.exe

          Filesize

          5.8MB

          MD5

          006fe3fc14a6c1e45bf484878e69d8f8

          SHA1

          680ca4367f114a726ff9233fe942b8f615823968

          SHA256

          a7c98b50f8a332367c7bb72e1a4eacf6911a3ac3deaf8328b6645a62ededc08c

          SHA512

          0f3ffe6596a354e78993248372d67c8da89e585cf8854628a6541e8c1d70b752cf704900f511c49484ec0a6eaeccf65dc32268e9033fc8e4089572fe6a25a00d

        • C:\Users\Admin\AppData\Local\Temp\Kawaii.txt

          Filesize

          33B

          MD5

          96e37f60fd45018f8cc3584b8039c24a

          SHA1

          2074fc66db6e2b3a479b2db51b7e12e72de0c298

          SHA256

          5bdf6be01d3cedc700aa3fb0af683647572e9397772df37dee655c2922f7039f

          SHA512

          7060cf41861c9643ebcb92ac3609a0eebaf77ae32eef20d43647b23406055e3d674d059857832e3a5986835cc8d005bd5bc67849961aec95ffd29c79c93e43da

        • C:\Users\Admin\AppData\Local\Temp\README.txt

          Filesize

          3KB

          MD5

          e112806beda4a929cbe26940cb822ebc

          SHA1

          fc98b9590dea8d27e522fe9db219b2a179b89d4b

          SHA256

          7f0f487d9225c70725e84b1fcb74b7256647435ebc07af36f19225d1fb9f2713

          SHA512

          c13629ce1ab7f54bc5e44d8242ca2f6761238812a8151edfd866ae81216783624c26c26f94065f277fef7d245ee90886c62eaa1c76f1ab8b4494488e5c13af7f

        • C:\Users\Admin\AppData\Local\Temp\arrow.gif

          Filesize

          2KB

          MD5

          ef6a786076b3909cec81413787b03ba9

          SHA1

          9ab1f856e9c6edef7c64dd69e1738eb850b86495

          SHA256

          c092c58b668b11997ded36cd9d729a30125c62d4acdc5baf926cc8d59f7ad8e0

          SHA512

          4063820e477ba43710bd6a0a01655165c1e238af21ec1ec2bc5737ee97744bf12b6696408a8183d1ea6ff01188a8283bc0685510f73c45aff9b39fc526911598

        • C:\Users\nota.txt

          Filesize

          452B

          MD5

          7262703d3cae9563bd0aa9358f12d879

          SHA1

          e69d2d8c84fbb54f448ed3f8631008351d7062dd

          SHA256

          2958f669e7336fae71f4679a440b0915b941fa7b10ca37467cdb5d0e3d8d7042

          SHA512

          33eadb284ea91b2a8c9285afe261232537b64b03656faf26ab90f139b6fc592fc9346dae93045bfda2c1ea07f2f9661bd4aae9cf62dc5b36b7ce7b6d6ee5bded

        • memory/5040-6-0x00000202B4450000-0x00000202B4451000-memory.dmp

          Filesize

          4KB

        • memory/5040-12-0x00000202B4450000-0x00000202B4451000-memory.dmp

          Filesize

          4KB

        • memory/5040-11-0x00000202B4450000-0x00000202B4451000-memory.dmp

          Filesize

          4KB

        • memory/5040-16-0x00000202B4450000-0x00000202B4451000-memory.dmp

          Filesize

          4KB

        • memory/5040-15-0x00000202B4450000-0x00000202B4451000-memory.dmp

          Filesize

          4KB

        • memory/5040-14-0x00000202B4450000-0x00000202B4451000-memory.dmp

          Filesize

          4KB

        • memory/5040-13-0x00000202B4450000-0x00000202B4451000-memory.dmp

          Filesize

          4KB

        • memory/5040-10-0x00000202B4450000-0x00000202B4451000-memory.dmp

          Filesize

          4KB

        • memory/5040-5-0x00000202B4450000-0x00000202B4451000-memory.dmp

          Filesize

          4KB

        • memory/5040-4-0x00000202B4450000-0x00000202B4451000-memory.dmp

          Filesize

          4KB

        • memory/5480-3-0x00007FFFB4690000-0x00007FFFB5152000-memory.dmp

          Filesize

          10.8MB

        • memory/5480-2-0x00007FFFB4690000-0x00007FFFB5152000-memory.dmp

          Filesize

          10.8MB

        • memory/5788-0-0x00007FFFB4833000-0x00007FFFB4835000-memory.dmp

          Filesize

          8KB

        • memory/5788-1-0x00000000008E0000-0x0000000000EB4000-memory.dmp

          Filesize

          5.8MB