MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2cd18c340d412d1c09215c828190621ce558d8ea43ba0ad28e3365ff0619fe8b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 2cd18c340d412d1c09215c828190621ce558d8ea43ba0ad28e3365ff0619fe8b
SHA3-384 hash: 5303acf641bc00631e08dd692ccbf50e331326ab1b11798c57d298ba79af35e63a30139157686d71ff94365992134450
SHA1 hash: 4c1103efe69f4a0b4f8a6dbb04d4e66008212830
MD5 hash: a0077ad153db781f02916c3561f08f0a
humanhash: east-network-pennsylvania-fourteen
File name:ksolaunch.exe
Download: download sample
File size:2'956'288 bytes
First seen:2021-05-28 16:08:51 UTC
Last seen:2021-05-28 16:40:46 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fda7dccb03a3dc575f34c307ba30e0b3
ssdeep 49152:13I7T2B5Ck/VOvFFh/H8J0Wenr/ZkQ4pT+go/aptezjJ7cwRrdAo7dBa4g0PmEaM:142B5Ck/VOZ0J0Jr/ZkQ4pT+t/J7cwRV
Threatray 1 similar samples on MalwareBazaar
TLSH 68D5CF203762947AC57F393184A4A365E73E5D311E32925B1EE03E3D7A346D39E2863B
Reporter James_inthe_box
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
105
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ksolaunch.exe
Verdict:
Malicious activity
Analysis date:
2021-05-28 16:15:13 UTC
Tags:
trojan plugx

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file
Enabling the 'hidden' option for recently created files
Using the Windows Management Instrumentation requests
Sending a UDP request
Creating a service
Launching a service
Launching a process
DNS request
Sending a custom TCP request
Sending an HTTP POST request
Deleting a recently created file
Creating a file in the Windows subdirectories
Adding an access-denied ACE
Enabling autorun for a service
Unauthorized injection to a system process
Deleting of the original file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to change the desktop window for a process (likely to hide graphical interactions)
Contains functionality to register a low level keyboard hook
Contains functionality to start reverse TCP shell (cmd.exe)
Creates processes via WMI
Deletes itself after installation
Detected non-DNS traffic on DNS port
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Opens network shares
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 426362 Sample: ksolaunch.exe Startdate: 28/05/2021 Architecture: WINDOWS Score: 100 55 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 Multi AV Scanner detection for submitted file 2->59 61 2 other signatures 2->61 7 ktmhelp.exe 15 2->7         started        11 ktmhelp.exe 1 12 2->11         started        13 ksolaunch.exe 4 2->13         started        16 11 other processes 2->16 process3 dnsIp4 45 update.chromeserver-dns.com 7->45 47 192.168.2.1 unknown unknown 7->47 75 Writes to foreign memory regions 7->75 77 Allocates memory in foreign processes 7->77 18 dllhost.exe 12 7->18         started        49 update.chromeserver-dns.com 11->49 79 Contains functionality to bypass UAC (CMSTPLUA) 11->79 81 Contains functionality to change the desktop window for a process (likely to hide graphical interactions) 11->81 83 Contains functionality to start reverse TCP shell (cmd.exe) 11->83 85 Contains functionality to register a low level keyboard hook 11->85 37 C:\Users\user\AppData\Local\...\ktmhelp.exe, PE32 13->37 dropped 39 C:\Users\user\AppData\Local\...\roboform.dll, PE32 13->39 dropped 22 ktmhelp.exe 6 13->22         started        51 127.0.0.1 unknown unknown 16->51 87 Changes security center settings (notifications, updates, antivirus, firewall) 16->87 25 MpCmdRun.exe 1 16->25         started        file5 signatures6 process7 dnsIp8 41 update.chromeserver-dns.com 18->41 43 192.168.2.255, 53 unknown unknown 18->43 63 System process connects to network (likely due to code injection or exploit) 18->63 65 Contains functionality to bypass UAC (CMSTPLUA) 18->65 67 Contains functionality to change the desktop window for a process (likely to hide graphical interactions) 18->67 73 3 other signatures 18->73 27 msiexec.exe 12 18->27         started        33 C:\ProgramData\Microsoft\...\ktmhelp.exe, PE32 22->33 dropped 35 C:\ProgramData\Microsoft\...\roboform.dll, PE32 22->35 dropped 69 Deletes itself after installation 22->69 71 Creates processes via WMI 22->71 31 conhost.exe 25->31         started        file9 signatures10 process11 dnsIp12 53 update.chromeserver-dns.com 27->53 89 Opens network shares 27->89 signatures13
Threat name:
Win32.Trojan.Korplug
Status:
Malicious
First seen:
2021-05-26 23:21:06 UTC
File Type:
PE (Exe)
Extracted files:
84
AV detection:
15 of 29 (51.72%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Deletes itself
Loads dropped DLL
Blocklisted process makes network request
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments