Analysis

  • max time kernel
    185s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:25

General

  • Target

    b177a813bf07327b14058f012afbccf757b73f3722ebc2568f8be0134ad38add.exe

  • Size

    77KB

  • MD5

    07c3595f6b45a377b023d8f85f663fc0

  • SHA1

    d990ae4c8f9980c5728876132b4cae6f3d42f8e8

  • SHA256

    b177a813bf07327b14058f012afbccf757b73f3722ebc2568f8be0134ad38add

  • SHA512

    ad1716c036b424e5e2a1f2663de3c869600e72a964f2a144629ebbbb626dcb75376bfc8a464e03e27727c7f9f9c555a8aab65fad40e8529385f2fff89c26879e

  • SSDEEP

    1536:4l3SHuJV9yi7lXMgdiSAuGsQ1OWxXnhipohLxUneR9lVFqkfm4rv:4lkuJVtVMgdiSAuGsQgWxXnhipohLxUw

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b177a813bf07327b14058f012afbccf757b73f3722ebc2568f8be0134ad38add.exe
    "C:\Users\Admin\AppData\Local\Temp\b177a813bf07327b14058f012afbccf757b73f3722ebc2568f8be0134ad38add.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      2⤵
        PID:1380
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\$$a6C6A.bat
        2⤵
        • Deletes itself
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:888
        • C:\Users\Admin\AppData\Local\Temp\b177a813bf07327b14058f012afbccf757b73f3722ebc2568f8be0134ad38add.exe
          "C:\Users\Admin\AppData\Local\Temp\b177a813bf07327b14058f012afbccf757b73f3722ebc2568f8be0134ad38add.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1304
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1752
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1292

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\$$a6C6A.bat

        Filesize

        722B

        MD5

        aaf956311c505bd78aa1be35db5bfa6a

        SHA1

        c5e6e9c54c5a643e84eda7590bf3d80133c2941d

        SHA256

        33878a6f4efdc09fa5f52f8776185a3c7bdfdaab4ffea3ae76d361e55e37c135

        SHA512

        f0617fcbbf76cb1b97c18c448b5f88a2225a64227a8539c66c20eb563e8fdd25b269be77f8ea439783911c9fd93ca3fb17d4a6b3bd264fddbb973b6d75f808ca

      • C:\Users\Admin\AppData\Local\Temp\b177a813bf07327b14058f012afbccf757b73f3722ebc2568f8be0134ad38add.exe

        Filesize

        48KB

        MD5

        166629c324b2e04805d29fffaa1316fa

        SHA1

        930c3852c5c6c5cffe72c59fe6d52252b748ecfd

        SHA256

        a51355fd8473371de3f0f1b58a3f772850ad2986fe7b1332de31a48de39ef39a

        SHA512

        199e9cf3afa4b20805f4be8d9bb8d7ee3c16f88b60c657a995e6ed1d394c258d65ff98f7ebdad6beedbd4563b39024e36198302af16885ae662ac87dd71bc8a4

      • C:\Users\Admin\AppData\Local\Temp\b177a813bf07327b14058f012afbccf757b73f3722ebc2568f8be0134ad38add.exe.exe

        Filesize

        48KB

        MD5

        166629c324b2e04805d29fffaa1316fa

        SHA1

        930c3852c5c6c5cffe72c59fe6d52252b748ecfd

        SHA256

        a51355fd8473371de3f0f1b58a3f772850ad2986fe7b1332de31a48de39ef39a

        SHA512

        199e9cf3afa4b20805f4be8d9bb8d7ee3c16f88b60c657a995e6ed1d394c258d65ff98f7ebdad6beedbd4563b39024e36198302af16885ae662ac87dd71bc8a4

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        75a24afcfb96fb3c48c074ae8e4210b4

        SHA1

        c242874177dd5a91cd92d8b55acd7fb457f32b6c

        SHA256

        61fcd159fb00d6ddcb841b62e2390fa2e6894524fb1d8fb5b12fbbf63d1a8096

        SHA512

        ec9d16b59d3bc15b0df5d8a86afcb070c31eaf42200e53372c74c3daecee5d0b2ca79a943bcfd0a55b98ff875ba88e3fb4f68149feccf78a5064c172572b4328

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        75a24afcfb96fb3c48c074ae8e4210b4

        SHA1

        c242874177dd5a91cd92d8b55acd7fb457f32b6c

        SHA256

        61fcd159fb00d6ddcb841b62e2390fa2e6894524fb1d8fb5b12fbbf63d1a8096

        SHA512

        ec9d16b59d3bc15b0df5d8a86afcb070c31eaf42200e53372c74c3daecee5d0b2ca79a943bcfd0a55b98ff875ba88e3fb4f68149feccf78a5064c172572b4328

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        75a24afcfb96fb3c48c074ae8e4210b4

        SHA1

        c242874177dd5a91cd92d8b55acd7fb457f32b6c

        SHA256

        61fcd159fb00d6ddcb841b62e2390fa2e6894524fb1d8fb5b12fbbf63d1a8096

        SHA512

        ec9d16b59d3bc15b0df5d8a86afcb070c31eaf42200e53372c74c3daecee5d0b2ca79a943bcfd0a55b98ff875ba88e3fb4f68149feccf78a5064c172572b4328

      • \Users\Admin\AppData\Local\Temp\b177a813bf07327b14058f012afbccf757b73f3722ebc2568f8be0134ad38add.exe

        Filesize

        48KB

        MD5

        166629c324b2e04805d29fffaa1316fa

        SHA1

        930c3852c5c6c5cffe72c59fe6d52252b748ecfd

        SHA256

        a51355fd8473371de3f0f1b58a3f772850ad2986fe7b1332de31a48de39ef39a

        SHA512

        199e9cf3afa4b20805f4be8d9bb8d7ee3c16f88b60c657a995e6ed1d394c258d65ff98f7ebdad6beedbd4563b39024e36198302af16885ae662ac87dd71bc8a4

      • \Users\Admin\AppData\Local\Temp\b177a813bf07327b14058f012afbccf757b73f3722ebc2568f8be0134ad38add.exe

        Filesize

        48KB

        MD5

        166629c324b2e04805d29fffaa1316fa

        SHA1

        930c3852c5c6c5cffe72c59fe6d52252b748ecfd

        SHA256

        a51355fd8473371de3f0f1b58a3f772850ad2986fe7b1332de31a48de39ef39a

        SHA512

        199e9cf3afa4b20805f4be8d9bb8d7ee3c16f88b60c657a995e6ed1d394c258d65ff98f7ebdad6beedbd4563b39024e36198302af16885ae662ac87dd71bc8a4

      • memory/888-54-0x0000000000000000-mapping.dmp

      • memory/1292-68-0x0000000000000000-mapping.dmp

      • memory/1296-57-0x0000000000220000-0x0000000000256000-memory.dmp

        Filesize

        216KB

      • memory/1296-56-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1296-70-0x0000000000220000-0x0000000000256000-memory.dmp

        Filesize

        216KB

      • memory/1304-65-0x0000000000000000-mapping.dmp

      • memory/1744-55-0x0000000000000000-mapping.dmp

      • memory/1744-69-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1744-71-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1752-67-0x0000000000000000-mapping.dmp