Analysis

  • max time kernel
    151s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 18:45

General

  • Target

    0ee56ceeede81fb81158a8cf9514d9f3a81a6222d674d77cb06bebcf7901513f.exe

  • Size

    31KB

  • MD5

    4bc35ba1543546fc90aacf9aa3e80491

  • SHA1

    1cc8b9910bf016e92a86541c84d8bd7e41d5401d

  • SHA256

    0ee56ceeede81fb81158a8cf9514d9f3a81a6222d674d77cb06bebcf7901513f

  • SHA512

    8f4c40a13ad73afe50e3df5b0a94b0fde713fde24a3bd10137a038fb40649edbc35de3905e510a93e3176823a17108e62ffd985fa8af655f5ce66ef3d71ff022

  • SSDEEP

    768:MP1ODKAaDMG8H92RwZNQSw+IlJIJJREIOARSdxniel:MdfgLdQAQfhJIJ0IOhdIel

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:772
      • C:\Users\Admin\AppData\Local\Temp\0ee56ceeede81fb81158a8cf9514d9f3a81a6222d674d77cb06bebcf7901513f.exe
        "C:\Users\Admin\AppData\Local\Temp\0ee56ceeede81fb81158a8cf9514d9f3a81a6222d674d77cb06bebcf7901513f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:116
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aD42D.bat
          3⤵
            PID:448
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1952
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3808
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:3196

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\$$aD42D.bat

          Filesize

          722B

          MD5

          4f39303d565ae0c27b9907a4df0d87f6

          SHA1

          e292c25d31569f3d340f46f94e6ac973951da353

          SHA256

          7911a6c771a5cc89e7bcf5453bc2722bc51cc3efc971dd8518762fe6a5a7f187

          SHA512

          fc7b5e9469b9252b6702740b99f1905074a214594a191e80f9da246a9a3f705929d8abd49f68d85d77ec8b8e0bf2c2b0995f32acd3c9463ee18685c468c99f18

        • C:\Users\Admin\AppData\Local\Temp\0ee56ceeede81fb81158a8cf9514d9f3a81a6222d674d77cb06bebcf7901513f.exe.exe

          Filesize

          5KB

          MD5

          0af2c0157a7f49ffce8dd3eef4ac381e

          SHA1

          064c692115997658fe5c3f6f96d6c5c167777879

          SHA256

          386422101914cb2f3308a47ca62828ba3902765978bdba2a8de52cda3a9a8378

          SHA512

          ad8637babdd64627ea584206519eecee55bc65e0296b04696e9fdf456317d5724fac08cb692f37d325e2dd122e93982f4e9f00d2f97e4161d462677f944244ed

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          cd1d583a15f6d897bc3ce222b304681a

          SHA1

          2cc66bac208f62c400f59b8adf414d5df0d4c600

          SHA256

          5c18d6adee7bcb2330059ef6431a465629a3c7f4ae9dfe76a484a0917eaf3cbd

          SHA512

          815daa210401f2234800d230343cbd31c9e616c05addcb21f6403cfdf08c483b6db2c58e9ac0ed047ca28c95171114b816c282ea3bca10a86ac0c58511e40fd6

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          cd1d583a15f6d897bc3ce222b304681a

          SHA1

          2cc66bac208f62c400f59b8adf414d5df0d4c600

          SHA256

          5c18d6adee7bcb2330059ef6431a465629a3c7f4ae9dfe76a484a0917eaf3cbd

          SHA512

          815daa210401f2234800d230343cbd31c9e616c05addcb21f6403cfdf08c483b6db2c58e9ac0ed047ca28c95171114b816c282ea3bca10a86ac0c58511e40fd6

        • C:\Windows\rundl132.exe

          Filesize

          26KB

          MD5

          cd1d583a15f6d897bc3ce222b304681a

          SHA1

          2cc66bac208f62c400f59b8adf414d5df0d4c600

          SHA256

          5c18d6adee7bcb2330059ef6431a465629a3c7f4ae9dfe76a484a0917eaf3cbd

          SHA512

          815daa210401f2234800d230343cbd31c9e616c05addcb21f6403cfdf08c483b6db2c58e9ac0ed047ca28c95171114b816c282ea3bca10a86ac0c58511e40fd6

        • memory/116-138-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/116-132-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/448-133-0x0000000000000000-mapping.dmp

        • memory/1952-134-0x0000000000000000-mapping.dmp

        • memory/1952-142-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1952-144-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3196-143-0x0000000000000000-mapping.dmp

        • memory/3808-140-0x0000000000000000-mapping.dmp