Analysis

  • max time kernel
    186s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:25

General

  • Target

    8296ba41c549570ee2e06e27e7b9b976fac292ab56063430bbb6407ef866acb1.exe

  • Size

    176KB

  • MD5

    42fd0d4290c7f7e662645845df5a6fa0

  • SHA1

    0c378139d3a2ed03dfe87039f6eb608a2fc91783

  • SHA256

    8296ba41c549570ee2e06e27e7b9b976fac292ab56063430bbb6407ef866acb1

  • SHA512

    6aebff25032b4864d7968c196c6682044f8bd49da2db05c067b64f9522b9166bc92db9f837dc68992625167d6823bb02c6bce294f0b48ff801eb8cfb250237e2

  • SSDEEP

    3072:pjkuJVLEQIURTXJaOuxR8E6GmEWvWVBZbPwP8EYzcnhDSyXAKP:quJes8bR8EJAvWHxo0JkuY

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2080
      • C:\Users\Admin\AppData\Local\Temp\8296ba41c549570ee2e06e27e7b9b976fac292ab56063430bbb6407ef866acb1.exe
        "C:\Users\Admin\AppData\Local\Temp\8296ba41c549570ee2e06e27e7b9b976fac292ab56063430bbb6407ef866acb1.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:452
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a58E.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3572
          • C:\Users\Admin\AppData\Local\Temp\8296ba41c549570ee2e06e27e7b9b976fac292ab56063430bbb6407ef866acb1.exe
            "C:\Users\Admin\AppData\Local\Temp\8296ba41c549570ee2e06e27e7b9b976fac292ab56063430bbb6407ef866acb1.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2600
            • C:\Users\Admin\AppData\Local\Temp\downloadtool.exe
              "C:\Users\Admin\AppData\Local\Temp\downloadtool.exe" -base64="pvVhTdQR/SCBM075+PQinh5Yo22gAT0qGiGozVyd/xV6A7GNHSDUrw37tPYtv1xaV3w3hf0xfkjD4n4LjuGemLQ4YIQIDIC7Yp+C615K+KwIEXJ2/qUbMHgnkQVZav+2LJJNCD6D/5/pAJ0csy7NC3cP3SaHhcssowba2QfSBtn/qmFtEa/DF7oeLwF9WxcuTdQZntCTZNIdPS6JZdAK7b2TwFLxry2EZixJy7QeGXXrej4nZqwiHTvotFjqcem2FKIvIRFhtyTaGQgJ484c0g+LeX3w3ZqGHfsDhrCCNY445PV2Q3DKKCPrFs0ygrxLYWPz1eNTJnGIGsk5Ls+hASDldgSix5mWKmLpNR/AfipvIg=="
              5⤵
              • Executes dropped EXE
              PID:4228
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4012
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2580
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:5076

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\$$a58E.bat

        Filesize

        721B

        MD5

        3dfb1686b740bc82f3b6d5076a785674

        SHA1

        f88679d231a3b3cb7f9eee194c0765298df0b417

        SHA256

        36345a8ed8b41f7c0a9750b015b5ba65b202d0a900fb1bc2b8367f1d197b59fd

        SHA512

        ad45e8eeab8d70b14089e6e212f72b6a64ce28cad4e30b78213db3e40520a0ae8a261db623aa6e39ad0fed6978e565e254b421bae4ae4c1d10cd3da8b87ab76c

      • C:\Users\Admin\AppData\Local\Temp\8296ba41c549570ee2e06e27e7b9b976fac292ab56063430bbb6407ef866acb1.exe

        Filesize

        147KB

        MD5

        5f11c33466fc6f27425304309ee2275e

        SHA1

        18f77ebfd8e24a085f3179772c1c0b72f8af86d1

        SHA256

        b6b71fcab1aaf44994b110f5a357c13cd60adafce39abfbbf43e26ec641a687d

        SHA512

        4580f3c4ef0f0a3e36636eabccc387bfdbece5410815d9cd42f68b66664c79a8c554ddb9b83a945526d381ff8965a3b2411018b44703cd1d1913deeeab0c83e3

      • C:\Users\Admin\AppData\Local\Temp\8296ba41c549570ee2e06e27e7b9b976fac292ab56063430bbb6407ef866acb1.exe.exe

        Filesize

        147KB

        MD5

        5f11c33466fc6f27425304309ee2275e

        SHA1

        18f77ebfd8e24a085f3179772c1c0b72f8af86d1

        SHA256

        b6b71fcab1aaf44994b110f5a357c13cd60adafce39abfbbf43e26ec641a687d

        SHA512

        4580f3c4ef0f0a3e36636eabccc387bfdbece5410815d9cd42f68b66664c79a8c554ddb9b83a945526d381ff8965a3b2411018b44703cd1d1913deeeab0c83e3

      • C:\Users\Admin\AppData\Local\Temp\downloadtool.exe

        Filesize

        173KB

        MD5

        0d2dff1c62944e10a4ec6fbad168669c

        SHA1

        86da2e70b2765c4dafc505c413b85b97ceadd527

        SHA256

        9efb0d906ebafc6bcff30c593447c00745e4d12491e3d244867b63ddf0e16b5f

        SHA512

        8a590687ea01ed34bf92115b2f69325cd86fd23fc5919fed2bcdb59d432a739a996cf8e50fe376bc96aec61febd5523b780f9718ec5e8d68810e5aa85c33d37b

      • C:\Users\Admin\AppData\Local\Temp\downloadtool.exe

        Filesize

        173KB

        MD5

        0d2dff1c62944e10a4ec6fbad168669c

        SHA1

        86da2e70b2765c4dafc505c413b85b97ceadd527

        SHA256

        9efb0d906ebafc6bcff30c593447c00745e4d12491e3d244867b63ddf0e16b5f

        SHA512

        8a590687ea01ed34bf92115b2f69325cd86fd23fc5919fed2bcdb59d432a739a996cf8e50fe376bc96aec61febd5523b780f9718ec5e8d68810e5aa85c33d37b

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        a1b322adec9e24c57893d69cda3e902b

        SHA1

        49a27c87c427d8a12b1147c6456a6261a77b7752

        SHA256

        904ac84ac8d2eb8433616b3c556f8e903864cd40c3e2421021a3282d517364e2

        SHA512

        cf08417569f84e2806fdb82fa2d370a84ebe98fc41a741f8927f61425bf7aac5ee4eb31131c7a9bd33c7a38fd7580f8f9f868648c8e73e0e4b4fb76cfa0018b8

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        a1b322adec9e24c57893d69cda3e902b

        SHA1

        49a27c87c427d8a12b1147c6456a6261a77b7752

        SHA256

        904ac84ac8d2eb8433616b3c556f8e903864cd40c3e2421021a3282d517364e2

        SHA512

        cf08417569f84e2806fdb82fa2d370a84ebe98fc41a741f8927f61425bf7aac5ee4eb31131c7a9bd33c7a38fd7580f8f9f868648c8e73e0e4b4fb76cfa0018b8

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        a1b322adec9e24c57893d69cda3e902b

        SHA1

        49a27c87c427d8a12b1147c6456a6261a77b7752

        SHA256

        904ac84ac8d2eb8433616b3c556f8e903864cd40c3e2421021a3282d517364e2

        SHA512

        cf08417569f84e2806fdb82fa2d370a84ebe98fc41a741f8927f61425bf7aac5ee4eb31131c7a9bd33c7a38fd7580f8f9f868648c8e73e0e4b4fb76cfa0018b8

      • memory/452-136-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/452-132-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2580-139-0x0000000000000000-mapping.dmp

      • memory/2600-143-0x0000000000000000-mapping.dmp

      • memory/3572-133-0x0000000000000000-mapping.dmp

      • memory/4012-134-0x0000000000000000-mapping.dmp

      • memory/4012-148-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4012-149-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4228-145-0x0000000000000000-mapping.dmp

      • memory/5076-141-0x0000000000000000-mapping.dmp