Analysis

  • max time kernel
    269s
  • max time network
    330s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:25

General

  • Target

    6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe

  • Size

    751KB

  • MD5

    293bfccd25b23eeef29920ef1f6b7276

  • SHA1

    264833a8cf7930c7a4488caa95b16496e79c77f0

  • SHA256

    6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f

  • SHA512

    c8310ca9023b90409843285d1651d6a10acecda57de16f8a95049c6c707449ad1e06c3b60fdc7d446b2e20c2b398e8d0e8516a5fed3578633661ed667e251e77

  • SSDEEP

    12288:iPOmVOkVx4x2aSqcvxoK/VlvUVbrbh1fBuFTrTU4+N+JHpgRUyazgO3/mPFYUkD:iRVx4x2aSqc5EVkTrwAJJ4Uya0TYUkD

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 63 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1132
      • C:\Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe
        "C:\Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6B91.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4944
          • C:\Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe
            "C:\Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:1884
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1184
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3144
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2992

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\$$a6B91.bat
        Filesize

        722B

        MD5

        61b35d46ce04256cdc6d5658a06ab5ce

        SHA1

        b66437c490561b88b35b296d06a9a4d6b8137991

        SHA256

        361b27e0a25dee6c0e05fd899c044b4ba716f31b51f7feebef2c3c0e77bf9a83

        SHA512

        3f933109e0b9d691101c57946ebe581193b8933cff9f86c06dab124259616fe30ada53c565717adbf601fca099e76c1c2df1bb1725e8567f1104f332aa9a91eb

      • C:\Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe
        Filesize

        721KB

        MD5

        1c1c6abbc3408a373c731ec3f41eae16

        SHA1

        55eb7aa906668aaac125327a34ee12e51991ce8f

        SHA256

        bda7a5a5f6eca4c51a8666d7c1f9de9d4590ea38f6fd85baeb251824b9674562

        SHA512

        f15c4c7ec3f99de0a45655f182d0db162d724537c4d9faac760d6c371a0a06e1476ad9021c981f2511d21952ec33c84b17adcc93956b9e3812df8a3eeab93dbd

      • C:\Users\Admin\AppData\Local\Temp\6eaeb1b4d55e825c59eb5b21c5e73ce942caf108efea2f1935fd031fc52c566f.exe.exe
        Filesize

        721KB

        MD5

        1c1c6abbc3408a373c731ec3f41eae16

        SHA1

        55eb7aa906668aaac125327a34ee12e51991ce8f

        SHA256

        bda7a5a5f6eca4c51a8666d7c1f9de9d4590ea38f6fd85baeb251824b9674562

        SHA512

        f15c4c7ec3f99de0a45655f182d0db162d724537c4d9faac760d6c371a0a06e1476ad9021c981f2511d21952ec33c84b17adcc93956b9e3812df8a3eeab93dbd

      • C:\Windows\Logo1_.exe
        Filesize

        29KB

        MD5

        df3057b4c462bfec37b55490816a017f

        SHA1

        4a6c3b5417790f8461b6f570d5ba2acff85a99d9

        SHA256

        88dd8dc62fb4a16383e6c2bcafa63b7581d5725bc8ef56adc4809364534856e9

        SHA512

        0bc927ee3b61b90c659a51f7ad5481c6b2d4f432ab76c648e394015f27a529d119b8ebc66667d31103d36653440cdb7d7da7541e65f7eca1fea3f90377c08ed0

      • C:\Windows\Logo1_.exe
        Filesize

        29KB

        MD5

        df3057b4c462bfec37b55490816a017f

        SHA1

        4a6c3b5417790f8461b6f570d5ba2acff85a99d9

        SHA256

        88dd8dc62fb4a16383e6c2bcafa63b7581d5725bc8ef56adc4809364534856e9

        SHA512

        0bc927ee3b61b90c659a51f7ad5481c6b2d4f432ab76c648e394015f27a529d119b8ebc66667d31103d36653440cdb7d7da7541e65f7eca1fea3f90377c08ed0

      • C:\Windows\rundl132.exe
        Filesize

        29KB

        MD5

        df3057b4c462bfec37b55490816a017f

        SHA1

        4a6c3b5417790f8461b6f570d5ba2acff85a99d9

        SHA256

        88dd8dc62fb4a16383e6c2bcafa63b7581d5725bc8ef56adc4809364534856e9

        SHA512

        0bc927ee3b61b90c659a51f7ad5481c6b2d4f432ab76c648e394015f27a529d119b8ebc66667d31103d36653440cdb7d7da7541e65f7eca1fea3f90377c08ed0

      • memory/1184-135-0x0000000000000000-mapping.dmp
      • memory/1184-137-0x0000000000400000-0x0000000000436000-memory.dmp
        Filesize

        216KB

      • memory/1884-143-0x0000000000000000-mapping.dmp
      • memory/2652-138-0x0000000000400000-0x0000000000436000-memory.dmp
        Filesize

        216KB

      • memory/2652-132-0x0000000000400000-0x0000000000436000-memory.dmp
        Filesize

        216KB

      • memory/2992-145-0x0000000000000000-mapping.dmp
      • memory/3144-142-0x0000000000000000-mapping.dmp
      • memory/4944-133-0x0000000000000000-mapping.dmp