Analysis

  • max time kernel
    303s
  • max time network
    367s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:25

General

  • Target

    ea653aa36cbcd0f1df0330d8b68c43af56fa92f730d4b17a6da9d5366255bc65.exe

  • Size

    224KB

  • MD5

    3d4f22097fcad60cfb4fd20e7b59eca0

  • SHA1

    30d49c4d4f016ad0b107cc03a10347d44b5e72fa

  • SHA256

    ea653aa36cbcd0f1df0330d8b68c43af56fa92f730d4b17a6da9d5366255bc65

  • SHA512

    36016b33dde97401d2ef4239907942802ccc6c86e268d77f0005a64dc6e22996061c8db4ba9c92ec9df407dd6f1f9d2cfba4ca268b2df6da5229f27239fd8688

  • SSDEEP

    3072:6CSjGoLpWM65lmjx73xOU4aukLQup8LXGCTobItEP4ghZglTsyL7RD:cXymtoPg5cjuP4ghZS7hD

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:676
      • C:\Users\Admin\AppData\Local\Temp\ea653aa36cbcd0f1df0330d8b68c43af56fa92f730d4b17a6da9d5366255bc65.exe
        "C:\Users\Admin\AppData\Local\Temp\ea653aa36cbcd0f1df0330d8b68c43af56fa92f730d4b17a6da9d5366255bc65.exe"
        2⤵
        • Drops file in Drivers directory
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4352
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1476
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:4820
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7188.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4028
            • C:\Users\Admin\AppData\Local\Temp\ea653aa36cbcd0f1df0330d8b68c43af56fa92f730d4b17a6da9d5366255bc65.exe
              "C:\Users\Admin\AppData\Local\Temp\ea653aa36cbcd0f1df0330d8b68c43af56fa92f730d4b17a6da9d5366255bc65.exe"
              4⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              PID:1788
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Adds Run key to start application
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2240
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4648
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:368
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:536
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:4636

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          Modify Registry

          1
          T1112

          Discovery

          Query Registry

          2
          T1012

          Peripheral Device Discovery

          2
          T1120

          System Information Discovery

          2
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$$a7188.bat
            Filesize

            722B

            MD5

            c84b4b2e74cf8a594a925907133ab3e7

            SHA1

            fe14e6bb37233a80c7671b438fa44b815ad101de

            SHA256

            316a2538677b7b8d80e64682f110384c9338d3328c1404209b77fe987293108b

            SHA512

            c6daa695a65b588f2cf5f7f5c8d395af495df2cf544470cdab70df1f64255ec94ec37102cb8ea270a262007eef873b86f6fe12c4f3660234b04d2de957b3931e

          • C:\Users\Admin\AppData\Local\Temp\ea653aa36cbcd0f1df0330d8b68c43af56fa92f730d4b17a6da9d5366255bc65.exe
            Filesize

            134KB

            MD5

            913c3c7a71d2a1b6f570c8ac837c7e85

            SHA1

            69190d09c6006c217fc074f65394089d4e999c09

            SHA256

            3c0a527220f3168ef6f8951234789dc0a3fadfd8217aa80c73af5b03fdf1cb84

            SHA512

            0db3b5156cbcb5d7cef11f39287487b6de3233fcac99f3c353b93d7be619e7cdb85b444cb97e7b1d052d371bd3c9ae942ee84934f41a78bc831b8f689ff6e5da

          • C:\Users\Admin\AppData\Local\Temp\ea653aa36cbcd0f1df0330d8b68c43af56fa92f730d4b17a6da9d5366255bc65.exe.exe
            Filesize

            134KB

            MD5

            913c3c7a71d2a1b6f570c8ac837c7e85

            SHA1

            69190d09c6006c217fc074f65394089d4e999c09

            SHA256

            3c0a527220f3168ef6f8951234789dc0a3fadfd8217aa80c73af5b03fdf1cb84

            SHA512

            0db3b5156cbcb5d7cef11f39287487b6de3233fcac99f3c353b93d7be619e7cdb85b444cb97e7b1d052d371bd3c9ae942ee84934f41a78bc831b8f689ff6e5da

          • C:\Windows\Logo1_.exe
            Filesize

            89KB

            MD5

            c49ae0fabe17bf0dde64923fc52c7577

            SHA1

            8460831d96811db3c31170c4015eb6302a2d8e9d

            SHA256

            f35ff873ab6e316d48c1cfc962c9676a09beaa673ded506f3022431559ec792c

            SHA512

            25dbe16deec17f821923056c8625344e445f356d20716fc176856b247d55e41d558b1f97245d07786125cbc3b3fb0d27c587139413b111a51e5ff6189c884cd0

          • C:\Windows\Logo1_.exe
            Filesize

            89KB

            MD5

            c49ae0fabe17bf0dde64923fc52c7577

            SHA1

            8460831d96811db3c31170c4015eb6302a2d8e9d

            SHA256

            f35ff873ab6e316d48c1cfc962c9676a09beaa673ded506f3022431559ec792c

            SHA512

            25dbe16deec17f821923056c8625344e445f356d20716fc176856b247d55e41d558b1f97245d07786125cbc3b3fb0d27c587139413b111a51e5ff6189c884cd0

          • C:\Windows\uninstall\rundl132.exe
            Filesize

            89KB

            MD5

            c49ae0fabe17bf0dde64923fc52c7577

            SHA1

            8460831d96811db3c31170c4015eb6302a2d8e9d

            SHA256

            f35ff873ab6e316d48c1cfc962c9676a09beaa673ded506f3022431559ec792c

            SHA512

            25dbe16deec17f821923056c8625344e445f356d20716fc176856b247d55e41d558b1f97245d07786125cbc3b3fb0d27c587139413b111a51e5ff6189c884cd0

          • memory/368-145-0x0000000000000000-mapping.dmp
          • memory/536-144-0x0000000000000000-mapping.dmp
          • memory/1476-132-0x0000000000000000-mapping.dmp
          • memory/1788-141-0x0000000000000000-mapping.dmp
          • memory/2240-134-0x0000000000000000-mapping.dmp
          • memory/4028-133-0x0000000000000000-mapping.dmp
          • memory/4636-146-0x0000000000000000-mapping.dmp
          • memory/4648-138-0x0000000000000000-mapping.dmp
          • memory/4820-139-0x0000000000000000-mapping.dmp