Analysis

  • max time kernel
    150s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:25

General

  • Target

    44918f5646804d33c109cae33cbe3c03e12652153b44ef2ac99be984023329a2.exe

  • Size

    220KB

  • MD5

    450da2c2e5b909da93aa0ecda8301180

  • SHA1

    67c8c34d148c0426a5022c625498f231141b9908

  • SHA256

    44918f5646804d33c109cae33cbe3c03e12652153b44ef2ac99be984023329a2

  • SHA512

    9937b578f6bc3ec3bc6ee6cfa41ca712cb5fd6aa5f58fc4f00bbbc7e60ecb0547514391ad7696b1fffa6f4d739c66d71116ac3e5f5591f902b933b0f3301b233

  • SSDEEP

    3072:pKsSkuJVL1Jw8KYg5zA5GsMYSxSJiN/vGss9kTBf9pAXAtPOYQwT:luJP035iMhL/vGsbTBl2wOsT

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\44918f5646804d33c109cae33cbe3c03e12652153b44ef2ac99be984023329a2.exe
        "C:\Users\Admin\AppData\Local\Temp\44918f5646804d33c109cae33cbe3c03e12652153b44ef2ac99be984023329a2.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a9E1.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1572
          • C:\Users\Admin\AppData\Local\Temp\44918f5646804d33c109cae33cbe3c03e12652153b44ef2ac99be984023329a2.exe
            "C:\Users\Admin\AppData\Local\Temp\44918f5646804d33c109cae33cbe3c03e12652153b44ef2ac99be984023329a2.exe"
            4⤵
            • Executes dropped EXE
            PID:268
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1280
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2020
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:316

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\$$a9E1.bat
        Filesize

        721B

        MD5

        964ea11014759a938c949e9157a74097

        SHA1

        080f5c9c7d7c7b8fabdb2b8a5cd10250cc680a6d

        SHA256

        f61081222a036a2f7249304644c12ee7688b1a4287b311992aad3d3368f34084

        SHA512

        b0976f30cd9e5b21def04751916e16c555803b6090868d1d93aef7191e16bf0d78c5f9038fc3a6e93374a6cdca624d4f2b3ed6a4a3a43db1209c9420dfcbbcb8

      • C:\Users\Admin\AppData\Local\Temp\44918f5646804d33c109cae33cbe3c03e12652153b44ef2ac99be984023329a2.exe
        Filesize

        191KB

        MD5

        8aa98031128ef0c81d34207e3c60d003

        SHA1

        182164292e382455f00349625dd5fd1e41dcc0c8

        SHA256

        52def964142be6891054d2f95256a3b05d66887964fcd66b34abfe32477e8965

        SHA512

        8ba615af6d4cad84c57c20e318d6277e4bc114c07c14b72088c526a01d414fe719a43551582ecbc38bd352979720d182efc1f639c2c3e91c78b180449bcf2c12

      • C:\Users\Admin\AppData\Local\Temp\44918f5646804d33c109cae33cbe3c03e12652153b44ef2ac99be984023329a2.exe.exe
        Filesize

        191KB

        MD5

        8aa98031128ef0c81d34207e3c60d003

        SHA1

        182164292e382455f00349625dd5fd1e41dcc0c8

        SHA256

        52def964142be6891054d2f95256a3b05d66887964fcd66b34abfe32477e8965

        SHA512

        8ba615af6d4cad84c57c20e318d6277e4bc114c07c14b72088c526a01d414fe719a43551582ecbc38bd352979720d182efc1f639c2c3e91c78b180449bcf2c12

      • C:\Windows\Logo1_.exe
        Filesize

        29KB

        MD5

        beb286dcd8ba1bb38c7d451a2b14bbe0

        SHA1

        1378c0a34e75457c8f0eb6c242e35ec3ffb0da5d

        SHA256

        2ec4b5421a1dbe08e9cb7652ebc05052ae63aa4d74aaf482c4d549479877e99a

        SHA512

        2850ab16aa8c5bf6d6a130e188e53561b9d222fb72bf40065b4469bf8385844c92bcfd3386d28529bdb1674b5038b492b802a34c3264dbbfbf3f4c33ac03a5e7

      • C:\Windows\Logo1_.exe
        Filesize

        29KB

        MD5

        beb286dcd8ba1bb38c7d451a2b14bbe0

        SHA1

        1378c0a34e75457c8f0eb6c242e35ec3ffb0da5d

        SHA256

        2ec4b5421a1dbe08e9cb7652ebc05052ae63aa4d74aaf482c4d549479877e99a

        SHA512

        2850ab16aa8c5bf6d6a130e188e53561b9d222fb72bf40065b4469bf8385844c92bcfd3386d28529bdb1674b5038b492b802a34c3264dbbfbf3f4c33ac03a5e7

      • C:\Windows\rundl132.exe
        Filesize

        29KB

        MD5

        beb286dcd8ba1bb38c7d451a2b14bbe0

        SHA1

        1378c0a34e75457c8f0eb6c242e35ec3ffb0da5d

        SHA256

        2ec4b5421a1dbe08e9cb7652ebc05052ae63aa4d74aaf482c4d549479877e99a

        SHA512

        2850ab16aa8c5bf6d6a130e188e53561b9d222fb72bf40065b4469bf8385844c92bcfd3386d28529bdb1674b5038b492b802a34c3264dbbfbf3f4c33ac03a5e7

      • \Users\Admin\AppData\Local\Temp\44918f5646804d33c109cae33cbe3c03e12652153b44ef2ac99be984023329a2.exe
        Filesize

        191KB

        MD5

        8aa98031128ef0c81d34207e3c60d003

        SHA1

        182164292e382455f00349625dd5fd1e41dcc0c8

        SHA256

        52def964142be6891054d2f95256a3b05d66887964fcd66b34abfe32477e8965

        SHA512

        8ba615af6d4cad84c57c20e318d6277e4bc114c07c14b72088c526a01d414fe719a43551582ecbc38bd352979720d182efc1f639c2c3e91c78b180449bcf2c12

      • memory/268-66-0x0000000074C41000-0x0000000074C43000-memory.dmp
        Filesize

        8KB

      • memory/268-64-0x0000000000000000-mapping.dmp
      • memory/316-67-0x0000000000000000-mapping.dmp
      • memory/1280-55-0x0000000000000000-mapping.dmp
      • memory/1280-68-0x0000000000400000-0x0000000000436000-memory.dmp
        Filesize

        216KB

      • memory/1280-69-0x0000000000400000-0x0000000000436000-memory.dmp
        Filesize

        216KB

      • memory/1508-57-0x0000000000400000-0x0000000000436000-memory.dmp
        Filesize

        216KB

      • memory/1572-54-0x0000000000000000-mapping.dmp
      • memory/2020-61-0x0000000000000000-mapping.dmp