Overview
overview
10Static
static
10config.json
windows10-ltsc 2021-x64
3config.json
windows7-x64
3config.json
windows10-2004-x64
3config.json
windows10-ltsc 2021-x64
3config.json
windows11-21h2-x64
3kthmimu.exe
windows10-ltsc 2021-x64
1kthmimu.exe
windows7-x64
1kthmimu.exe
windows10-2004-x64
1kthmimu.exe
windows10-ltsc 2021-x64
1kthmimu.exe
windows11-21h2-x64
1start.ps1
windows10-ltsc 2021-x64
3start.ps1
windows7-x64
3start.ps1
windows10-2004-x64
3start.ps1
windows10-ltsc 2021-x64
3start.ps1
windows11-21h2-x64
3Analysis
-
max time kernel
34s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 03:47
Behavioral task
behavioral1
Sample
config.json
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
config.json
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
config.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
config.json
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
config.json
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
kthmimu.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral7
Sample
kthmimu.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
kthmimu.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
kthmimu.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral10
Sample
kthmimu.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
start.ps1
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral12
Sample
start.ps1
Resource
win7-20240708-en
Behavioral task
behavioral13
Sample
start.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
start.ps1
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral15
Sample
start.ps1
Resource
win11-20241007-en
General
-
Target
config.json
-
Size
4KB
-
MD5
090a7688f5a923bc032eaff7c0e2d0c5
-
SHA1
70d8898029400499c947be2193ff391bf5cc2333
-
SHA256
ae8191f550594cc8d652d9041aed4a9d82ee832733c01d5888bf6052517fc16b
-
SHA512
e8fbdc0d7c4bf7c33f0c5cbd00262f1d766584d0c5cdeedb658003b9bf266e5ea06be4b96f8af99dba8d5cafa856adc1db46666b0fb093272232a03afbace3df
-
SSDEEP
96:CtWTGy3BQ0K0qu125uGd0L+of0qCvfnCZCPY6f:Lgukv0pCHnCZCPYG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2848 AcroRd32.exe 2848 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2696 3044 cmd.exe 32 PID 3044 wrote to memory of 2696 3044 cmd.exe 32 PID 3044 wrote to memory of 2696 3044 cmd.exe 32 PID 2696 wrote to memory of 2848 2696 rundll32.exe 33 PID 2696 wrote to memory of 2848 2696 rundll32.exe 33 PID 2696 wrote to memory of 2848 2696 rundll32.exe 33 PID 2696 wrote to memory of 2848 2696 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\config.json1⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\config.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\config.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dea8427c55cd21ce48d20180c1ed7f35
SHA1d580b5c75ca99710ff61744a0e82a7f6b4ae9c87
SHA25629bd8fd782b730c912ea54583134cdf9b8134bee010de98aec39b3308197205c
SHA512e5bf7f49ff08c8d2b4586320e0b84a6880eab7f57c8e2e845e42103a9b858a8a21bb3d155d958995230ae9e9763e9a2f78bdb53f5db68b09b8aab0009759b83e