Analysis

  • max time kernel
    153s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:25

General

  • Target

    6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe

  • Size

    751KB

  • MD5

    293bfccd25b23eeef29920ef1f6b7276

  • SHA1

    264833a8cf7930c7a4488caa95b16496e79c77f0

  • SHA256

    6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f

  • SHA512

    c8310ca9023b90409843285d1651d6a10acecda57de16f8a95049c6c707449ad1e06c3b60fdc7d446b2e20c2b398e8d0e8516a5fed3578633661ed667e251e77

  • SSDEEP

    12288:iPOmVOkVx4x2aSqcvxoK/VlvUVbrbh1fBuFTrTU4+N+JHpgRUyazgO3/mPFYUkD:iRVx4x2aSqc5EVkTrwAJJ4Uya0TYUkD

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe
        "C:\Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a66FE.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1968
          • C:\Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe
            "C:\Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:1136
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1352
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:828
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:932

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\$$a66FE.bat

        Filesize

        722B

        MD5

        7368dc961955a10cd0fe67afb20665e0

        SHA1

        e6e39c9606a0d0aeec4b695da8eb9122db3a110a

        SHA256

        23a8969a895f01df898445148d59824ac2208a6a9a3eff4f48095f0a88c85c7d

        SHA512

        ef225b2c7cf06b13f944b43f19a479edaa5a24629a1ec3ddedaa0f9cb64e6de95e06afa2d617c39393cc99c3ca9ad548a2ce0a444bcdc6aff85ab8858a78dbbd

      • C:\Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe

        Filesize

        721KB

        MD5

        1c1c6abbc3408a373c731ec3f41eae16

        SHA1

        55eb7aa906668aaac125327a34ee12e51991ce8f

        SHA256

        bda7a5a5f6eca4c51a8666d7c1f9de9d4590ea38f6fd85baeb251824b9674562

        SHA512

        f15c4c7ec3f99de0a45655f182d0db162d724537c4d9faac760d6c371a0a06e1476ad9021c981f2511d21952ec33c84b17adcc93956b9e3812df8a3eeab93dbd

      • C:\Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe.exe

        Filesize

        721KB

        MD5

        1c1c6abbc3408a373c731ec3f41eae16

        SHA1

        55eb7aa906668aaac125327a34ee12e51991ce8f

        SHA256

        bda7a5a5f6eca4c51a8666d7c1f9de9d4590ea38f6fd85baeb251824b9674562

        SHA512

        f15c4c7ec3f99de0a45655f182d0db162d724537c4d9faac760d6c371a0a06e1476ad9021c981f2511d21952ec33c84b17adcc93956b9e3812df8a3eeab93dbd

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        df3057b4c462bfec37b55490816a017f

        SHA1

        4a6c3b5417790f8461b6f570d5ba2acff85a99d9

        SHA256

        88dd8dc62fb4a16383e6c2bcafa63b7581d5725bc8ef56adc4809364534856e9

        SHA512

        0bc927ee3b61b90c659a51f7ad5481c6b2d4f432ab76c648e394015f27a529d119b8ebc66667d31103d36653440cdb7d7da7541e65f7eca1fea3f90377c08ed0

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        df3057b4c462bfec37b55490816a017f

        SHA1

        4a6c3b5417790f8461b6f570d5ba2acff85a99d9

        SHA256

        88dd8dc62fb4a16383e6c2bcafa63b7581d5725bc8ef56adc4809364534856e9

        SHA512

        0bc927ee3b61b90c659a51f7ad5481c6b2d4f432ab76c648e394015f27a529d119b8ebc66667d31103d36653440cdb7d7da7541e65f7eca1fea3f90377c08ed0

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        df3057b4c462bfec37b55490816a017f

        SHA1

        4a6c3b5417790f8461b6f570d5ba2acff85a99d9

        SHA256

        88dd8dc62fb4a16383e6c2bcafa63b7581d5725bc8ef56adc4809364534856e9

        SHA512

        0bc927ee3b61b90c659a51f7ad5481c6b2d4f432ab76c648e394015f27a529d119b8ebc66667d31103d36653440cdb7d7da7541e65f7eca1fea3f90377c08ed0

      • \Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe

        Filesize

        721KB

        MD5

        1c1c6abbc3408a373c731ec3f41eae16

        SHA1

        55eb7aa906668aaac125327a34ee12e51991ce8f

        SHA256

        bda7a5a5f6eca4c51a8666d7c1f9de9d4590ea38f6fd85baeb251824b9674562

        SHA512

        f15c4c7ec3f99de0a45655f182d0db162d724537c4d9faac760d6c371a0a06e1476ad9021c981f2511d21952ec33c84b17adcc93956b9e3812df8a3eeab93dbd

      • \Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe

        Filesize

        721KB

        MD5

        1c1c6abbc3408a373c731ec3f41eae16

        SHA1

        55eb7aa906668aaac125327a34ee12e51991ce8f

        SHA256

        bda7a5a5f6eca4c51a8666d7c1f9de9d4590ea38f6fd85baeb251824b9674562

        SHA512

        f15c4c7ec3f99de0a45655f182d0db162d724537c4d9faac760d6c371a0a06e1476ad9021c981f2511d21952ec33c84b17adcc93956b9e3812df8a3eeab93dbd

      • memory/828-68-0x0000000000000000-mapping.dmp

      • memory/932-70-0x0000000000000000-mapping.dmp

      • memory/1136-66-0x0000000000000000-mapping.dmp

      • memory/1136-69-0x00000000754E1000-0x00000000754E3000-memory.dmp

        Filesize

        8KB

      • memory/1352-56-0x0000000000000000-mapping.dmp

      • memory/1352-61-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1352-73-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1968-55-0x0000000000000000-mapping.dmp

      • memory/1976-58-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1976-54-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB