Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 18:45
Behavioral task
behavioral1
Sample
af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73N.exe
Resource
win7-20240903-en
General
-
Target
af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73N.exe
-
Size
76KB
-
MD5
0010e4bf515c5eb0d852672d0fd11d90
-
SHA1
26e19f96d91b32dce2a61b4bf4871ee50e7fbefb
-
SHA256
af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73
-
SHA512
0c5f0e81e59e818a6d8efd4f70d3c3e79e0c9c17128afacc39a20d268b68c339296369d8a383b81010946641aa1c24ab428593aad586a211375d967fbeda7730
-
SSDEEP
1536:53Bi77wAlPQzRssMm0wlm0yQzRssI1bOJPqnwHzc3VGu53VUYxC7Cvn39IYMRNb/:53Bg1lQzRssiCyQzRssywHzc3VGu53VI
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\kdwco.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
kdwco.exepid process 2520 kdwco.exe -
Loads dropped DLL 1 IoCs
Processes:
af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73N.exepid process 2100 af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73N.exekdwco.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kdwco.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73N.exedescription pid process target process PID 2100 wrote to memory of 2520 2100 af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73N.exe kdwco.exe PID 2100 wrote to memory of 2520 2100 af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73N.exe kdwco.exe PID 2100 wrote to memory of 2520 2100 af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73N.exe kdwco.exe PID 2100 wrote to memory of 2520 2100 af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73N.exe kdwco.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73N.exe"C:\Users\Admin\AppData\Local\Temp\af373298e90af70361a0228e788a49da2fa02ea4cc409aa0d57cf6de562fad73N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\kdwco.exe"C:\Users\Admin\AppData\Local\Temp\kdwco.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD503a2ff08cf485a1fb6e1871e2c824107
SHA1683843fca2643af0887842b4cc321fa7e7789343
SHA256a6c6be64217fcf10a7882fd666b23f437e8c684cde3f43bfef93dfccba3d898b
SHA51275785246432e7a5e2dc09308a92f3aa32c3b1016240759a84778979918f5f8cb70d6d2773472af1530e4d6703a542c70c1aa550a8870b22b0796876e788c5c4e