Analysis

  • max time kernel
    153s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 15:31

General

  • Target

    f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe

  • Size

    27KB

  • MD5

    0ffb93b3a57552c62f2024d2faa82fc0

  • SHA1

    58dc6c6698c1a0d921ab252ff4a545b5eb34b546

  • SHA256

    f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0

  • SHA512

    32fd53a15c59ced54afb14127d98b7d898b453d2e529719ecec401e6f6d983b5425f46727f154203e96d231392acb25d80255f25efcbe1e17ac6b7ff7a2eb82f

  • SSDEEP

    768:I1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoZwtI1:afgLdQAQfcfymNMk

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2520
      • C:\Users\Admin\AppData\Local\Temp\f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe
        "C:\Users\Admin\AppData\Local\Temp\f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4546.bat
          3⤵
            PID:2288
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4112
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1892
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:4324

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\$$a4546.bat

                Filesize

                722B

                MD5

                c2c5abca5156fcbc640c352c01910096

                SHA1

                bf75df433e7754eb42d2214f9f9ce93f8e3b94d9

                SHA256

                d5834635b596f369ecdce0bc4b33ae1ec1e61a519c778b61aa28a232ea5d6c74

                SHA512

                e9ef6cf8286fe4f6994e816ac214141a864a41fefdf3195b9df9a56e0e78496d40658ba3c84973745e2cf0c1189f2294c994d0efca104329ede007484a00ad38

              • C:\Users\Admin\AppData\Local\Temp\f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe.exe

                Filesize

                1KB

                MD5

                64cc786dbcdd8076956a32bc8732ce9b

                SHA1

                ef4f09a44dd0ff9000cf81764e432b99efb17099

                SHA256

                3782526958313d2c43bb736569345be080984defdbfca14459fbede6a35ba696

                SHA512

                9118c378da0f1b67f0a4eeaf0fefdb7ded59f61d20f1c1295b0ba90b4be69c35b5ee777c1a4daea06cc16e87f96d906e28755c4a7fe53b7209bad4e5fe620add

              • C:\Windows\Logo1_.exe

                Filesize

                26KB

                MD5

                3a1b098f07762def9e634c2b18fb671a

                SHA1

                b0472806b14562f436042da551bf5d8e340a09a6

                SHA256

                35d5889b04e508b76219c6195430ce2d2b176f0d60d5c0d43cbf0b6ed4edb16f

                SHA512

                24b76a56437dcda213b8a384dd76e84fc58a273aafd0b3197422dd0efe96e6749426d8a74dab75c9322f91faf065155392a7afd1f5a6ad09c08382fcb8f655fe

              • C:\Windows\Logo1_.exe

                Filesize

                26KB

                MD5

                3a1b098f07762def9e634c2b18fb671a

                SHA1

                b0472806b14562f436042da551bf5d8e340a09a6

                SHA256

                35d5889b04e508b76219c6195430ce2d2b176f0d60d5c0d43cbf0b6ed4edb16f

                SHA512

                24b76a56437dcda213b8a384dd76e84fc58a273aafd0b3197422dd0efe96e6749426d8a74dab75c9322f91faf065155392a7afd1f5a6ad09c08382fcb8f655fe

              • C:\Windows\rundl132.exe

                Filesize

                26KB

                MD5

                3a1b098f07762def9e634c2b18fb671a

                SHA1

                b0472806b14562f436042da551bf5d8e340a09a6

                SHA256

                35d5889b04e508b76219c6195430ce2d2b176f0d60d5c0d43cbf0b6ed4edb16f

                SHA512

                24b76a56437dcda213b8a384dd76e84fc58a273aafd0b3197422dd0efe96e6749426d8a74dab75c9322f91faf065155392a7afd1f5a6ad09c08382fcb8f655fe

              • memory/4112-142-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/4112-144-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/4804-138-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/4804-132-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB