Analysis

  • max time kernel
    188s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:27

General

  • Target

    3458283903b5cb83c884766faf2cfa2243f0ebe4cf482aa82ed60c4bea733ee0.exe

  • Size

    47KB

  • MD5

    065de212eea42e33e13a3c10d5fb71f6

  • SHA1

    44ac1bfc199b03750a50f399c70dffda301c7f66

  • SHA256

    3458283903b5cb83c884766faf2cfa2243f0ebe4cf482aa82ed60c4bea733ee0

  • SHA512

    85ebd7fbab94e28506074c6aa01eabafe41dcec4ec02e621b0b66614255653a74c21709c95e7e3da2a08441b39b4435db5c8927c748aa485e7cd6d0510b5b1c6

  • SSDEEP

    768:PxElOIEvzMXqtwp/lttaL7HP4wIncLRdR5kP78a0RJW/aMDYMUrOOKvL3eIbqm:PxaYzMXqtGNttyUn01Q78a4R6LTTHqm

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3458283903b5cb83c884766faf2cfa2243f0ebe4cf482aa82ed60c4bea733ee0.exe
    "C:\Users\Admin\AppData\Local\Temp\3458283903b5cb83c884766faf2cfa2243f0ebe4cf482aa82ed60c4bea733ee0.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:832
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
        3⤵
          PID:1464
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\$$aA777.bat
        2⤵
        • Deletes itself
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:328
        • C:\Users\Admin\AppData\Local\Temp\3458283903b5cb83c884766faf2cfa2243f0ebe4cf482aa82ed60c4bea733ee0.exe
          "C:\Users\Admin\AppData\Local\Temp\3458283903b5cb83c884766faf2cfa2243f0ebe4cf482aa82ed60c4bea733ee0.exe"
          3⤵
          • Executes dropped EXE
          PID:1804
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:268
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1460
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1760
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:748
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              4⤵
                PID:1528
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          1⤵
            PID:1244

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$$aA777.bat

            Filesize

            722B

            MD5

            f8c87407cd1309fdc6ef13b5f7124382

            SHA1

            b8d8a2779ec19aa433420f7296a74b83365bdeab

            SHA256

            56db2a3652e82ff08c327fa0e2c9f140295b2e32ad8c9fc87237b056cf97f73e

            SHA512

            05fda979bd0062191007a207e1e85498665ea21da4418e98e57275f4ad2c76e978476797608f70a5abc5f60fd4e5ece8abde6309fd290e9c9e9979f00a2a612d

          • C:\Users\Admin\AppData\Local\Temp\3458283903b5cb83c884766faf2cfa2243f0ebe4cf482aa82ed60c4bea733ee0.exe

            Filesize

            14KB

            MD5

            b7a2fbbeb343cc841bb2a0e846455769

            SHA1

            591e1dc5e6f73212072db6873ce764a76056e2a7

            SHA256

            cd5b74669487ecaaf84d55a506aeb007d9be8b69fc392bf4cc752fc257ea6319

            SHA512

            69478ff8818bfd5df7b62094d49b23110c04bc6e4581c22f04b1fe4177b40cd8b61e9b67350080c6a4642afe7681155f4426546af27b7a66f94abc92e8c8d225

          • C:\Users\Admin\AppData\Local\Temp\3458283903b5cb83c884766faf2cfa2243f0ebe4cf482aa82ed60c4bea733ee0.exe.exe

            Filesize

            14KB

            MD5

            b7a2fbbeb343cc841bb2a0e846455769

            SHA1

            591e1dc5e6f73212072db6873ce764a76056e2a7

            SHA256

            cd5b74669487ecaaf84d55a506aeb007d9be8b69fc392bf4cc752fc257ea6319

            SHA512

            69478ff8818bfd5df7b62094d49b23110c04bc6e4581c22f04b1fe4177b40cd8b61e9b67350080c6a4642afe7681155f4426546af27b7a66f94abc92e8c8d225

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            4af5ed4fa49ba9de6e65b33ed1b98b23

            SHA1

            78f747ec6e817ecb94e0cd8be4489eeaaa0b318f

            SHA256

            6bcea3e0ee25792f63ab8d37693db7c828413dedd7feeaf1268beb95439969b6

            SHA512

            8efc0dccf0c8b74158dd5511a81159c199634ffa77621dbcba02ffd6428cab6b31b3d21bc39cb37dadb0c4ffaad6d8c411df35a9b92bfab9b9056f97efd04bbf

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            4af5ed4fa49ba9de6e65b33ed1b98b23

            SHA1

            78f747ec6e817ecb94e0cd8be4489eeaaa0b318f

            SHA256

            6bcea3e0ee25792f63ab8d37693db7c828413dedd7feeaf1268beb95439969b6

            SHA512

            8efc0dccf0c8b74158dd5511a81159c199634ffa77621dbcba02ffd6428cab6b31b3d21bc39cb37dadb0c4ffaad6d8c411df35a9b92bfab9b9056f97efd04bbf

          • C:\Windows\rundl132.exe

            Filesize

            33KB

            MD5

            4af5ed4fa49ba9de6e65b33ed1b98b23

            SHA1

            78f747ec6e817ecb94e0cd8be4489eeaaa0b318f

            SHA256

            6bcea3e0ee25792f63ab8d37693db7c828413dedd7feeaf1268beb95439969b6

            SHA512

            8efc0dccf0c8b74158dd5511a81159c199634ffa77621dbcba02ffd6428cab6b31b3d21bc39cb37dadb0c4ffaad6d8c411df35a9b92bfab9b9056f97efd04bbf

          • \Users\Admin\AppData\Local\Temp\3458283903b5cb83c884766faf2cfa2243f0ebe4cf482aa82ed60c4bea733ee0.exe

            Filesize

            14KB

            MD5

            b7a2fbbeb343cc841bb2a0e846455769

            SHA1

            591e1dc5e6f73212072db6873ce764a76056e2a7

            SHA256

            cd5b74669487ecaaf84d55a506aeb007d9be8b69fc392bf4cc752fc257ea6319

            SHA512

            69478ff8818bfd5df7b62094d49b23110c04bc6e4581c22f04b1fe4177b40cd8b61e9b67350080c6a4642afe7681155f4426546af27b7a66f94abc92e8c8d225

          • \Users\Admin\AppData\Local\Temp\3458283903b5cb83c884766faf2cfa2243f0ebe4cf482aa82ed60c4bea733ee0.exe

            Filesize

            14KB

            MD5

            b7a2fbbeb343cc841bb2a0e846455769

            SHA1

            591e1dc5e6f73212072db6873ce764a76056e2a7

            SHA256

            cd5b74669487ecaaf84d55a506aeb007d9be8b69fc392bf4cc752fc257ea6319

            SHA512

            69478ff8818bfd5df7b62094d49b23110c04bc6e4581c22f04b1fe4177b40cd8b61e9b67350080c6a4642afe7681155f4426546af27b7a66f94abc92e8c8d225

          • memory/268-64-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/268-58-0x0000000000000000-mapping.dmp

          • memory/268-74-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/328-57-0x0000000000000000-mapping.dmp

          • memory/748-72-0x0000000000000000-mapping.dmp

          • memory/832-54-0x0000000000000000-mapping.dmp

          • memory/1460-62-0x0000000000000000-mapping.dmp

          • memory/1464-55-0x0000000000000000-mapping.dmp

          • memory/1528-73-0x0000000000000000-mapping.dmp

          • memory/1552-60-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1552-56-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1760-63-0x0000000000000000-mapping.dmp

          • memory/1804-69-0x0000000000000000-mapping.dmp