Analysis

  • max time kernel
    151s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:25

General

  • Target

    d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe

  • Size

    274KB

  • MD5

    1e6d7bd19bf1ad8f5497369e7dcf6d30

  • SHA1

    a72d042bc0682f0757e1f6ebc5d11b862262d563

  • SHA256

    d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10

  • SHA512

    4ed982c9eff9e8aeea3e39ea1254995509ddbe527f1818ff520205fe723dc354fe583ed33faa9c33957f7bf527c02769dbb941888a17543a58556afedc62ee0a

  • SSDEEP

    6144:nuJ2NUrOiPlKkwMkti2k67yCB9Lfdz3pT4QtEuKW:Sok5kLLfdz3pTNtE

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1272
      • C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
        "C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1112
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aF49C.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1472
          • C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
            "C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe"
            4⤵
            • Executes dropped EXE
            PID:1120
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:308
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:964
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1704

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\$$aF49C.bat

        Filesize

        722B

        MD5

        290c93edf9c2dc8b2e63870ad996b9be

        SHA1

        34dcef54bdae4b60db96506da80860d05f3a855c

        SHA256

        3d1e63e39db89b43e9fc629e75adaf0762c598530895af0a8e034571b93a3765

        SHA512

        8715e95667a78a6e35553b7e7909674c5a3e8ead8bced0a5fab66799ba8eba034289e4cc1995ee44569ae1afc7ea58d2bdf70812b33acd431fa4d2975e6a0855

      • C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe

        Filesize

        245KB

        MD5

        0509f528b74e3dab7f6391704c72b225

        SHA1

        aced5e9bb5e9cf3bdbff1e416e553a17b998eab4

        SHA256

        2b8d62db7e8d56111532683b4fafccad7f5ce1ef1deac13f1116a552d7cf2ece

        SHA512

        81803ca64d7d72db03ec6fcefdede8db46244df60a6d3c5f1d5cb9d5b7836238042fda7116cd4e6a5b003b45f7c77e1febcc2b5c134f2f2b0fd28ba5952e0e6a

      • C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe.exe

        Filesize

        245KB

        MD5

        0509f528b74e3dab7f6391704c72b225

        SHA1

        aced5e9bb5e9cf3bdbff1e416e553a17b998eab4

        SHA256

        2b8d62db7e8d56111532683b4fafccad7f5ce1ef1deac13f1116a552d7cf2ece

        SHA512

        81803ca64d7d72db03ec6fcefdede8db46244df60a6d3c5f1d5cb9d5b7836238042fda7116cd4e6a5b003b45f7c77e1febcc2b5c134f2f2b0fd28ba5952e0e6a

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        2872f62ba008526accca6e87b9112e83

        SHA1

        8a5ae449ead9f5b7ed4621644297054d9e2b6dcc

        SHA256

        42ebc4014f8f8ab4505ba8184222160deb146eb8c934965231e1b2d2c6c46195

        SHA512

        c94f2900cf9d5761ac33b6fb3122a7ce655cc33deaeda98cbe1d8a2a5ddce3271ed752ba100de013d6fc7ac2d6c096a67d73d7deb3bd9e072ece6db2c4df5abb

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        2872f62ba008526accca6e87b9112e83

        SHA1

        8a5ae449ead9f5b7ed4621644297054d9e2b6dcc

        SHA256

        42ebc4014f8f8ab4505ba8184222160deb146eb8c934965231e1b2d2c6c46195

        SHA512

        c94f2900cf9d5761ac33b6fb3122a7ce655cc33deaeda98cbe1d8a2a5ddce3271ed752ba100de013d6fc7ac2d6c096a67d73d7deb3bd9e072ece6db2c4df5abb

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        2872f62ba008526accca6e87b9112e83

        SHA1

        8a5ae449ead9f5b7ed4621644297054d9e2b6dcc

        SHA256

        42ebc4014f8f8ab4505ba8184222160deb146eb8c934965231e1b2d2c6c46195

        SHA512

        c94f2900cf9d5761ac33b6fb3122a7ce655cc33deaeda98cbe1d8a2a5ddce3271ed752ba100de013d6fc7ac2d6c096a67d73d7deb3bd9e072ece6db2c4df5abb

      • \Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe

        Filesize

        245KB

        MD5

        0509f528b74e3dab7f6391704c72b225

        SHA1

        aced5e9bb5e9cf3bdbff1e416e553a17b998eab4

        SHA256

        2b8d62db7e8d56111532683b4fafccad7f5ce1ef1deac13f1116a552d7cf2ece

        SHA512

        81803ca64d7d72db03ec6fcefdede8db46244df60a6d3c5f1d5cb9d5b7836238042fda7116cd4e6a5b003b45f7c77e1febcc2b5c134f2f2b0fd28ba5952e0e6a

      • \Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe

        Filesize

        245KB

        MD5

        0509f528b74e3dab7f6391704c72b225

        SHA1

        aced5e9bb5e9cf3bdbff1e416e553a17b998eab4

        SHA256

        2b8d62db7e8d56111532683b4fafccad7f5ce1ef1deac13f1116a552d7cf2ece

        SHA512

        81803ca64d7d72db03ec6fcefdede8db46244df60a6d3c5f1d5cb9d5b7836238042fda7116cd4e6a5b003b45f7c77e1febcc2b5c134f2f2b0fd28ba5952e0e6a

      • memory/308-60-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/308-55-0x0000000000000000-mapping.dmp

      • memory/308-69-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/964-67-0x0000000000000000-mapping.dmp

      • memory/1112-57-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1120-65-0x0000000000000000-mapping.dmp

      • memory/1472-54-0x0000000000000000-mapping.dmp

      • memory/1704-68-0x0000000000000000-mapping.dmp