Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:25

General

  • Target

    d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe

  • Size

    274KB

  • MD5

    1e6d7bd19bf1ad8f5497369e7dcf6d30

  • SHA1

    a72d042bc0682f0757e1f6ebc5d11b862262d563

  • SHA256

    d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10

  • SHA512

    4ed982c9eff9e8aeea3e39ea1254995509ddbe527f1818ff520205fe723dc354fe583ed33faa9c33957f7bf527c02769dbb941888a17543a58556afedc62ee0a

  • SSDEEP

    6144:nuJ2NUrOiPlKkwMkti2k67yCB9Lfdz3pT4QtEuKW:Sok5kLLfdz3pTNtE

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2864
      • C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
        "C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1436
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB858.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4204
          • C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
            "C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe"
            4⤵
            • Executes dropped EXE
            PID:4136
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4208
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5048
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4612

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\$$aB858.bat

        Filesize

        722B

        MD5

        3281dcc6909d0bdbc20e6c4fbffac904

        SHA1

        56e640a0a7ae10c88a27f407d63172c249ffff7a

        SHA256

        8bc48cb7400ee9cf24950035c08bb0eb4b3993c831a093a6171f119d49b5db52

        SHA512

        a55c1ae736b7ba5282c98b2ed9896aeb0a34a44ebf3b77b76cc797b6c1952e161bd0a3c2039aee70696e9d059d3833339593483ebe5835d7c9ecbb0c86206460

      • C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe

        Filesize

        245KB

        MD5

        0509f528b74e3dab7f6391704c72b225

        SHA1

        aced5e9bb5e9cf3bdbff1e416e553a17b998eab4

        SHA256

        2b8d62db7e8d56111532683b4fafccad7f5ce1ef1deac13f1116a552d7cf2ece

        SHA512

        81803ca64d7d72db03ec6fcefdede8db46244df60a6d3c5f1d5cb9d5b7836238042fda7116cd4e6a5b003b45f7c77e1febcc2b5c134f2f2b0fd28ba5952e0e6a

      • C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe.exe

        Filesize

        245KB

        MD5

        0509f528b74e3dab7f6391704c72b225

        SHA1

        aced5e9bb5e9cf3bdbff1e416e553a17b998eab4

        SHA256

        2b8d62db7e8d56111532683b4fafccad7f5ce1ef1deac13f1116a552d7cf2ece

        SHA512

        81803ca64d7d72db03ec6fcefdede8db46244df60a6d3c5f1d5cb9d5b7836238042fda7116cd4e6a5b003b45f7c77e1febcc2b5c134f2f2b0fd28ba5952e0e6a

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        2872f62ba008526accca6e87b9112e83

        SHA1

        8a5ae449ead9f5b7ed4621644297054d9e2b6dcc

        SHA256

        42ebc4014f8f8ab4505ba8184222160deb146eb8c934965231e1b2d2c6c46195

        SHA512

        c94f2900cf9d5761ac33b6fb3122a7ce655cc33deaeda98cbe1d8a2a5ddce3271ed752ba100de013d6fc7ac2d6c096a67d73d7deb3bd9e072ece6db2c4df5abb

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        2872f62ba008526accca6e87b9112e83

        SHA1

        8a5ae449ead9f5b7ed4621644297054d9e2b6dcc

        SHA256

        42ebc4014f8f8ab4505ba8184222160deb146eb8c934965231e1b2d2c6c46195

        SHA512

        c94f2900cf9d5761ac33b6fb3122a7ce655cc33deaeda98cbe1d8a2a5ddce3271ed752ba100de013d6fc7ac2d6c096a67d73d7deb3bd9e072ece6db2c4df5abb

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        2872f62ba008526accca6e87b9112e83

        SHA1

        8a5ae449ead9f5b7ed4621644297054d9e2b6dcc

        SHA256

        42ebc4014f8f8ab4505ba8184222160deb146eb8c934965231e1b2d2c6c46195

        SHA512

        c94f2900cf9d5761ac33b6fb3122a7ce655cc33deaeda98cbe1d8a2a5ddce3271ed752ba100de013d6fc7ac2d6c096a67d73d7deb3bd9e072ece6db2c4df5abb

      • memory/1436-140-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1436-132-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1436-133-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4136-145-0x0000000000000000-mapping.dmp

      • memory/4204-134-0x0000000000000000-mapping.dmp

      • memory/4208-139-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4208-135-0x0000000000000000-mapping.dmp

      • memory/4208-147-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4612-144-0x0000000000000000-mapping.dmp

      • memory/5048-141-0x0000000000000000-mapping.dmp