Analysis

  • max time kernel
    193s
  • max time network
    232s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 09:45

General

  • Target

    f34c9b4015e383f5ecb8ece4e6e814790354d20b090994b294b54b384e4a7012.exe

  • Size

    529KB

  • MD5

    125fdce11caf609db2be0fe2a15ef486

  • SHA1

    e3697659b49e8c575a4325f7239e5d08df77ba52

  • SHA256

    f34c9b4015e383f5ecb8ece4e6e814790354d20b090994b294b54b384e4a7012

  • SHA512

    a9f15861658f84495d88cbbff19d16b65461162687722f33ade9aeb411010ddbca69420475b0886cffdaff5c7de55a5cd33ab6a83712406fbb0f89b69254f36e

  • SSDEEP

    6144:E46tGdytJTDEpULgU8L94jDV9U1woU8LSHP0x8Taj9u:E3N/DEpUE9QDV9U11SR

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2692
      • C:\Users\Admin\AppData\Local\Temp\f34c9b4015e383f5ecb8ece4e6e814790354d20b090994b294b54b384e4a7012.exe
        "C:\Users\Admin\AppData\Local\Temp\f34c9b4015e383f5ecb8ece4e6e814790354d20b090994b294b54b384e4a7012.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4832
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2824
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:5076
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aF1F1.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4568
            • C:\Users\Admin\AppData\Local\Temp\f34c9b4015e383f5ecb8ece4e6e814790354d20b090994b294b54b384e4a7012.exe
              "C:\Users\Admin\AppData\Local\Temp\f34c9b4015e383f5ecb8ece4e6e814790354d20b090994b294b54b384e4a7012.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2000
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5060
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:480
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:5016
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:4064
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:4668

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$$aF1F1.bat

            Filesize

            722B

            MD5

            e68496698822cb3d9f8c710526e13131

            SHA1

            c6920f9587f83cafe96f57f0fe55172710fe4f1b

            SHA256

            e7bcd2bd77cc79aab863090d76608c0fdf645210439fbdc8c69638e7e2d543cf

            SHA512

            853e5606820207888e93d3120f545a673e2ea8d1a59b79b30d53b6a9c08ed487378cf8c01dd226f5c355704afe816ec7de65a5b9cecf12664b217bc9b5b754f2

          • C:\Users\Admin\AppData\Local\Temp\f34c9b4015e383f5ecb8ece4e6e814790354d20b090994b294b54b384e4a7012.exe

            Filesize

            495KB

            MD5

            fb33bcc98a626b8e21a676c45fcc8aaa

            SHA1

            98e0904a3f4738bb72869b933d2bff914e0d50a6

            SHA256

            35b828646910d417350e2b3d109c66ec560cb4163de989892e7180d69aef0607

            SHA512

            bf12ca9b631386e4460a9f1fefb550ffe0cbe8a3307b1de1f289c77e4f2cdb1a2eed57e6cda18523a134641a276f3e9f88c90defa4417109ec61a3dd1e830205

          • C:\Users\Admin\AppData\Local\Temp\f34c9b4015e383f5ecb8ece4e6e814790354d20b090994b294b54b384e4a7012.exe.exe

            Filesize

            495KB

            MD5

            fb33bcc98a626b8e21a676c45fcc8aaa

            SHA1

            98e0904a3f4738bb72869b933d2bff914e0d50a6

            SHA256

            35b828646910d417350e2b3d109c66ec560cb4163de989892e7180d69aef0607

            SHA512

            bf12ca9b631386e4460a9f1fefb550ffe0cbe8a3307b1de1f289c77e4f2cdb1a2eed57e6cda18523a134641a276f3e9f88c90defa4417109ec61a3dd1e830205

          • C:\Users\Admin\AppData\Local\Temp\nsjF686.tmp\System.dll

            Filesize

            10KB

            MD5

            05e52213cfa17dee760186462a9645ed

            SHA1

            f6d5e82080bbba65db7d54e89250c95af833aae3

            SHA256

            d9d3ffa4c7d7a152f435f4777e72aa1b6a6c0555f277e59eedebc587c3b66ba5

            SHA512

            586eea0bec6345b437667ce528bc2396427dd444a396456e38046a8962e92a52e7ee62b9f6c97f41bc1fb4a1b3905a302d6f7055e26b84e60709ba3b416ad172

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            78ee7df29672191e33a2aa8b2bfc1663

            SHA1

            fd3adf8fdbb58e9e9e86629c808d2e9ad20216f4

            SHA256

            8486dea142e968e1ee17cbb4687f8af32c36f6e7491bfa2874dae79483c7cd87

            SHA512

            d27ed3511312b1ed1e4578401448b7d1fb42db894ea22717faa01d5a8ade33c617f4f19e1bc885692fa2b579c786ec6fe51be04c6b4369364949219f5560e42e

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            78ee7df29672191e33a2aa8b2bfc1663

            SHA1

            fd3adf8fdbb58e9e9e86629c808d2e9ad20216f4

            SHA256

            8486dea142e968e1ee17cbb4687f8af32c36f6e7491bfa2874dae79483c7cd87

            SHA512

            d27ed3511312b1ed1e4578401448b7d1fb42db894ea22717faa01d5a8ade33c617f4f19e1bc885692fa2b579c786ec6fe51be04c6b4369364949219f5560e42e

          • C:\Windows\rundl132.exe

            Filesize

            33KB

            MD5

            78ee7df29672191e33a2aa8b2bfc1663

            SHA1

            fd3adf8fdbb58e9e9e86629c808d2e9ad20216f4

            SHA256

            8486dea142e968e1ee17cbb4687f8af32c36f6e7491bfa2874dae79483c7cd87

            SHA512

            d27ed3511312b1ed1e4578401448b7d1fb42db894ea22717faa01d5a8ade33c617f4f19e1bc885692fa2b579c786ec6fe51be04c6b4369364949219f5560e42e

          • memory/480-141-0x0000000000000000-mapping.dmp

          • memory/2000-145-0x0000000000000000-mapping.dmp

          • memory/2824-132-0x0000000000000000-mapping.dmp

          • memory/4064-149-0x0000000000000000-mapping.dmp

          • memory/4568-135-0x0000000000000000-mapping.dmp

          • memory/4668-150-0x0000000000000000-mapping.dmp

          • memory/4832-138-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4832-134-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/5016-144-0x0000000000000000-mapping.dmp

          • memory/5060-136-0x0000000000000000-mapping.dmp

          • memory/5060-140-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/5060-151-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/5076-133-0x0000000000000000-mapping.dmp