Analysis

  • max time kernel
    253s
  • max time network
    333s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:25

General

  • Target

    94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe

  • Size

    53KB

  • MD5

    15b4d598b8bdeb47f73743eb269204d6

  • SHA1

    b0aaa32741d2e47db653a0331de1d76e4714691e

  • SHA256

    94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1

  • SHA512

    1680d666f59c87362de8f02bf9a3fa49f15577f5bb67113e2bd841991ec3f83184f2a8478bec88d238bdb16b88a19886b925ffe4dcadd12a60b5950b1be98682

  • SSDEEP

    768:pYrqhex16GVRu1yK9fMnJG2V9dHS8IdGd9sD+v:pQ403SHuJV9Nuk7v

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe
    "C:\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\$$a2740.bat
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe
        "C:\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:752
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:556
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1356
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:1800
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1232

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\$$a2740.bat

        Filesize

        722B

        MD5

        9678c57a0494ffcf0ade471d309df6dc

        SHA1

        8e44b97077ae968d24b567f5967d6d8619916cc8

        SHA256

        7da2e094ff59f04e2bc4dbbc4ca0af908be1de97a78c0cabfa197ab1282b08bc

        SHA512

        b0b25b66fdc7b2f2425e3164ee940afb8412ed942f08a0be8cad0947fb349ad0808b85f88cb810b46f5bc6cf1e4898188f9fac2ba6fce79d9cfd85fd4d6c7fb7

      • C:\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe

        Filesize

        24KB

        MD5

        83b6cdfe5da9e62c7d57221710d95fca

        SHA1

        68f40021b18d20a6b70706d97d22d96b04916b75

        SHA256

        8ebb7afe356ba1f1d82803f59c841461340954f4fbb15ee3f17e783ea10656c6

        SHA512

        024d04b61325be5412eabca2bbcfc6c58bf07cf91df2dbd5450c7b9b3acff8634050976399c2120e6a7edd9160573fee2560b28caf08d618b8b6d634068b9d90

      • C:\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe.exe

        Filesize

        24KB

        MD5

        83b6cdfe5da9e62c7d57221710d95fca

        SHA1

        68f40021b18d20a6b70706d97d22d96b04916b75

        SHA256

        8ebb7afe356ba1f1d82803f59c841461340954f4fbb15ee3f17e783ea10656c6

        SHA512

        024d04b61325be5412eabca2bbcfc6c58bf07cf91df2dbd5450c7b9b3acff8634050976399c2120e6a7edd9160573fee2560b28caf08d618b8b6d634068b9d90

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        299ec53ce5b2365abe319f35679ddec0

        SHA1

        c20f3a0e8103d8eae82a03ca33ecb67d85f3e565

        SHA256

        2caef49efff30ab8eccfadb3f1e5ee1e5c04d857502bd2c7f7948e2944dee00a

        SHA512

        1dcd58a5022c844b5ac15af8d6c555b9b13d1d263196525acaee1c4c82077671ce1eefb434b3318b65b6dc57a36a7385afee4b3cad21935d00b402cd5ef5b695

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        299ec53ce5b2365abe319f35679ddec0

        SHA1

        c20f3a0e8103d8eae82a03ca33ecb67d85f3e565

        SHA256

        2caef49efff30ab8eccfadb3f1e5ee1e5c04d857502bd2c7f7948e2944dee00a

        SHA512

        1dcd58a5022c844b5ac15af8d6c555b9b13d1d263196525acaee1c4c82077671ce1eefb434b3318b65b6dc57a36a7385afee4b3cad21935d00b402cd5ef5b695

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        299ec53ce5b2365abe319f35679ddec0

        SHA1

        c20f3a0e8103d8eae82a03ca33ecb67d85f3e565

        SHA256

        2caef49efff30ab8eccfadb3f1e5ee1e5c04d857502bd2c7f7948e2944dee00a

        SHA512

        1dcd58a5022c844b5ac15af8d6c555b9b13d1d263196525acaee1c4c82077671ce1eefb434b3318b65b6dc57a36a7385afee4b3cad21935d00b402cd5ef5b695

      • \Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe

        Filesize

        24KB

        MD5

        83b6cdfe5da9e62c7d57221710d95fca

        SHA1

        68f40021b18d20a6b70706d97d22d96b04916b75

        SHA256

        8ebb7afe356ba1f1d82803f59c841461340954f4fbb15ee3f17e783ea10656c6

        SHA512

        024d04b61325be5412eabca2bbcfc6c58bf07cf91df2dbd5450c7b9b3acff8634050976399c2120e6a7edd9160573fee2560b28caf08d618b8b6d634068b9d90

      • \Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe

        Filesize

        24KB

        MD5

        83b6cdfe5da9e62c7d57221710d95fca

        SHA1

        68f40021b18d20a6b70706d97d22d96b04916b75

        SHA256

        8ebb7afe356ba1f1d82803f59c841461340954f4fbb15ee3f17e783ea10656c6

        SHA512

        024d04b61325be5412eabca2bbcfc6c58bf07cf91df2dbd5450c7b9b3acff8634050976399c2120e6a7edd9160573fee2560b28caf08d618b8b6d634068b9d90

      • memory/520-54-0x0000000000000000-mapping.dmp

      • memory/556-58-0x0000000000000000-mapping.dmp

      • memory/556-61-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/556-70-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/752-66-0x0000000000000000-mapping.dmp

      • memory/1112-57-0x0000000000220000-0x0000000000256000-memory.dmp

        Filesize

        216KB

      • memory/1112-56-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1356-68-0x0000000000000000-mapping.dmp

      • memory/1800-69-0x0000000000000000-mapping.dmp