Analysis

  • max time kernel
    178s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:26

General

  • Target

    38245d744a9fb4e9267a940567395c474fc857d6fa21fe76fcdd4e71d962b661.exe

  • Size

    992KB

  • MD5

    05508a5aaaf8579863953f8308792540

  • SHA1

    7c903b8f69f83515fc3d6fff086186892f853711

  • SHA256

    38245d744a9fb4e9267a940567395c474fc857d6fa21fe76fcdd4e71d962b661

  • SHA512

    191eb14fef7c63e25ffeff3d48e8b91f8a17c16c28bba549dd0c709f24f27b7be7d0dc61d39a9eeb2b262c8968c7d1562856a807bd2e794800a7728b66a6ed9a

  • SSDEEP

    24576:jSK2Ph8dr3+aP6b3Jv2BChi3pA/VwgbIxCZbqfyCRsO:jSKYSdKjcBSApANohyCRB

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1276
      • C:\Users\Admin\AppData\Local\Temp\38245d744a9fb4e9267a940567395c474fc857d6fa21fe76fcdd4e71d962b661.exe
        "C:\Users\Admin\AppData\Local\Temp\38245d744a9fb4e9267a940567395c474fc857d6fa21fe76fcdd4e71d962b661.exe"
        2⤵
        • Drops file in Drivers directory
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1420
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1996
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:796
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a8E2D.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:588
            • C:\Users\Admin\AppData\Local\Temp\38245d744a9fb4e9267a940567395c474fc857d6fa21fe76fcdd4e71d962b661.exe
              "C:\Users\Admin\AppData\Local\Temp\38245d744a9fb4e9267a940567395c474fc857d6fa21fe76fcdd4e71d962b661.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1156
              • \??\c:\bf021d29c41502d47b8132aadcad14c8\update\update.exe
                c:\bf021d29c41502d47b8132aadcad14c8\update\update.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                PID:692
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Adds Run key to start application
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:936
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:528
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:992
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:956
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:1540

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$$a8E2D.bat

            Filesize

            722B

            MD5

            b895df6401ff4ee78fd4feff6c659add

            SHA1

            19f9ce9d26d28440b657ba8688718805533c6457

            SHA256

            12bd40470949ee6d7970f9abbf0bab39d050207cbf044ddd8765c1ba783dcf7e

            SHA512

            67177386afc7a0db88b912735074096b8824737449e0fc5530021072a48faa023ff02e70b507b166a60cd0b2ad7c898cd2e7c4a0e8036bfa415552193498b70d

          • C:\Users\Admin\AppData\Local\Temp\38245d744a9fb4e9267a940567395c474fc857d6fa21fe76fcdd4e71d962b661.exe

            Filesize

            899KB

            MD5

            56be0c2c91a9c20c9d29aef01db6d321

            SHA1

            dd174373177f5f7ec98dbafbabce9dc35109a65e

            SHA256

            4e36cdb6405ed2260397bc0ed99cf8ebe787696005a26ecc00ab98ebf4f16546

            SHA512

            4259db53d5f1ab6263e7da6ca40323375a8b0dd5da37b442662fbd70e045c2680c4a118a24e78617f1661b9f1bccdb0e4c9c55ed02c3092f566b3fb4be780305

          • C:\Users\Admin\AppData\Local\Temp\38245d744a9fb4e9267a940567395c474fc857d6fa21fe76fcdd4e71d962b661.exe.exe

            Filesize

            899KB

            MD5

            56be0c2c91a9c20c9d29aef01db6d321

            SHA1

            dd174373177f5f7ec98dbafbabce9dc35109a65e

            SHA256

            4e36cdb6405ed2260397bc0ed99cf8ebe787696005a26ecc00ab98ebf4f16546

            SHA512

            4259db53d5f1ab6263e7da6ca40323375a8b0dd5da37b442662fbd70e045c2680c4a118a24e78617f1661b9f1bccdb0e4c9c55ed02c3092f566b3fb4be780305

          • C:\Windows\Logo1_.exe

            Filesize

            93KB

            MD5

            7d7e69ff06b1aa26788f1edd07ffa513

            SHA1

            fab87c1ea72e4262fcf209adff5b4c4b4682cd83

            SHA256

            1a5aefc5f7b35a1bf6d7dea1898f2888cc790f317f44a1507e56139c065aa4bc

            SHA512

            ebf9973e5f475d73f86a14b7186d2ce9de3b204eabeab940e2884b947731184e001448e5cd5fbf5f42b34310620ed0fa9eb086435ecb0b5caf7d4ad14289f835

          • C:\Windows\Logo1_.exe

            Filesize

            93KB

            MD5

            7d7e69ff06b1aa26788f1edd07ffa513

            SHA1

            fab87c1ea72e4262fcf209adff5b4c4b4682cd83

            SHA256

            1a5aefc5f7b35a1bf6d7dea1898f2888cc790f317f44a1507e56139c065aa4bc

            SHA512

            ebf9973e5f475d73f86a14b7186d2ce9de3b204eabeab940e2884b947731184e001448e5cd5fbf5f42b34310620ed0fa9eb086435ecb0b5caf7d4ad14289f835

          • C:\Windows\uninstall\rundl132.exe

            Filesize

            93KB

            MD5

            7d7e69ff06b1aa26788f1edd07ffa513

            SHA1

            fab87c1ea72e4262fcf209adff5b4c4b4682cd83

            SHA256

            1a5aefc5f7b35a1bf6d7dea1898f2888cc790f317f44a1507e56139c065aa4bc

            SHA512

            ebf9973e5f475d73f86a14b7186d2ce9de3b204eabeab940e2884b947731184e001448e5cd5fbf5f42b34310620ed0fa9eb086435ecb0b5caf7d4ad14289f835

          • C:\bf021d29c41502d47b8132aadcad14c8\update\update.exe

            Filesize

            712KB

            MD5

            9570121468658dcc6972f1dfa624a223

            SHA1

            61716952df7a03fc01ac919f44f07e9588840b8c

            SHA256

            bc2cde5db3027a726c81df78bdef10b5ec9a7b4a5ba297911c7b999638f76b33

            SHA512

            7c2168a6db5bf7dd7c09682983e9059524621834d0d9ae250382c74d714b0e99b625f5ee9a648e18de9fa25b580bac5ab770ad63c406a9f88c87ade1a372429c

          • \Users\Admin\AppData\Local\Temp\38245d744a9fb4e9267a940567395c474fc857d6fa21fe76fcdd4e71d962b661.exe

            Filesize

            899KB

            MD5

            56be0c2c91a9c20c9d29aef01db6d321

            SHA1

            dd174373177f5f7ec98dbafbabce9dc35109a65e

            SHA256

            4e36cdb6405ed2260397bc0ed99cf8ebe787696005a26ecc00ab98ebf4f16546

            SHA512

            4259db53d5f1ab6263e7da6ca40323375a8b0dd5da37b442662fbd70e045c2680c4a118a24e78617f1661b9f1bccdb0e4c9c55ed02c3092f566b3fb4be780305

          • \Users\Admin\AppData\Local\Temp\38245d744a9fb4e9267a940567395c474fc857d6fa21fe76fcdd4e71d962b661.exe

            Filesize

            899KB

            MD5

            56be0c2c91a9c20c9d29aef01db6d321

            SHA1

            dd174373177f5f7ec98dbafbabce9dc35109a65e

            SHA256

            4e36cdb6405ed2260397bc0ed99cf8ebe787696005a26ecc00ab98ebf4f16546

            SHA512

            4259db53d5f1ab6263e7da6ca40323375a8b0dd5da37b442662fbd70e045c2680c4a118a24e78617f1661b9f1bccdb0e4c9c55ed02c3092f566b3fb4be780305

          • \Users\Admin\AppData\Local\Temp\38245d744a9fb4e9267a940567395c474fc857d6fa21fe76fcdd4e71d962b661.exe

            Filesize

            899KB

            MD5

            56be0c2c91a9c20c9d29aef01db6d321

            SHA1

            dd174373177f5f7ec98dbafbabce9dc35109a65e

            SHA256

            4e36cdb6405ed2260397bc0ed99cf8ebe787696005a26ecc00ab98ebf4f16546

            SHA512

            4259db53d5f1ab6263e7da6ca40323375a8b0dd5da37b442662fbd70e045c2680c4a118a24e78617f1661b9f1bccdb0e4c9c55ed02c3092f566b3fb4be780305

          • \Users\Admin\AppData\Local\Temp\38245d744a9fb4e9267a940567395c474fc857d6fa21fe76fcdd4e71d962b661.exe

            Filesize

            899KB

            MD5

            56be0c2c91a9c20c9d29aef01db6d321

            SHA1

            dd174373177f5f7ec98dbafbabce9dc35109a65e

            SHA256

            4e36cdb6405ed2260397bc0ed99cf8ebe787696005a26ecc00ab98ebf4f16546

            SHA512

            4259db53d5f1ab6263e7da6ca40323375a8b0dd5da37b442662fbd70e045c2680c4a118a24e78617f1661b9f1bccdb0e4c9c55ed02c3092f566b3fb4be780305

          • \bf021d29c41502d47b8132aadcad14c8\_sfx_.dll

            Filesize

            25KB

            MD5

            ee207e35aea4d5df41d90221e1b66efa

            SHA1

            757469cf9ad2f21f267bbe730560114fdf8a89a5

            SHA256

            cf64c95e9a2d02967efc22b00efb3736156b913a95231eb63c1df45d43475e64

            SHA512

            43e9f75725daa4f3428b2d9cee2c2cc8b2f2e991b8e58d72d2f429fbdfb614c86d172f03d3f9da98756bd4e245643d9a57c6efa422d6c60ad364a2322245542d

          • \bf021d29c41502d47b8132aadcad14c8\update\update.exe

            Filesize

            712KB

            MD5

            9570121468658dcc6972f1dfa624a223

            SHA1

            61716952df7a03fc01ac919f44f07e9588840b8c

            SHA256

            bc2cde5db3027a726c81df78bdef10b5ec9a7b4a5ba297911c7b999638f76b33

            SHA512

            7c2168a6db5bf7dd7c09682983e9059524621834d0d9ae250382c74d714b0e99b625f5ee9a648e18de9fa25b580bac5ab770ad63c406a9f88c87ade1a372429c

          • \bf021d29c41502d47b8132aadcad14c8\update\update.exe

            Filesize

            712KB

            MD5

            9570121468658dcc6972f1dfa624a223

            SHA1

            61716952df7a03fc01ac919f44f07e9588840b8c

            SHA256

            bc2cde5db3027a726c81df78bdef10b5ec9a7b4a5ba297911c7b999638f76b33

            SHA512

            7c2168a6db5bf7dd7c09682983e9059524621834d0d9ae250382c74d714b0e99b625f5ee9a648e18de9fa25b580bac5ab770ad63c406a9f88c87ade1a372429c

          • \bf021d29c41502d47b8132aadcad14c8\update\update.exe

            Filesize

            712KB

            MD5

            9570121468658dcc6972f1dfa624a223

            SHA1

            61716952df7a03fc01ac919f44f07e9588840b8c

            SHA256

            bc2cde5db3027a726c81df78bdef10b5ec9a7b4a5ba297911c7b999638f76b33

            SHA512

            7c2168a6db5bf7dd7c09682983e9059524621834d0d9ae250382c74d714b0e99b625f5ee9a648e18de9fa25b580bac5ab770ad63c406a9f88c87ade1a372429c

          • \bf021d29c41502d47b8132aadcad14c8\update\update.exe

            Filesize

            712KB

            MD5

            9570121468658dcc6972f1dfa624a223

            SHA1

            61716952df7a03fc01ac919f44f07e9588840b8c

            SHA256

            bc2cde5db3027a726c81df78bdef10b5ec9a7b4a5ba297911c7b999638f76b33

            SHA512

            7c2168a6db5bf7dd7c09682983e9059524621834d0d9ae250382c74d714b0e99b625f5ee9a648e18de9fa25b580bac5ab770ad63c406a9f88c87ade1a372429c

          • \bf021d29c41502d47b8132aadcad14c8\update\updspapi.dll

            Filesize

            331KB

            MD5

            eb5c64286d987337f702813e73fcf615

            SHA1

            77c393b4cf5b61c29afa408ec1ebd93b22271e3f

            SHA256

            44062d8525a1de307491a46376d1831e23c27c18edb3de8f142d83eb7a21fc52

            SHA512

            0c71779a7b5a3507b5d0ccc0f9ff785032e1d8c32e76a0c0acadfd531d9ca87b61fd9742d69c610823a4315e181ad41f561811badbc262052d0f3ba86b9237a6

          • memory/528-60-0x0000000000000000-mapping.dmp

          • memory/588-56-0x0000000000000000-mapping.dmp

          • memory/692-80-0x0000000000170000-0x00000000001C4000-memory.dmp

            Filesize

            336KB

          • memory/692-76-0x0000000000000000-mapping.dmp

          • memory/796-55-0x0000000000000000-mapping.dmp

          • memory/936-57-0x0000000000000000-mapping.dmp

          • memory/956-73-0x0000000000000000-mapping.dmp

          • memory/992-62-0x0000000000000000-mapping.dmp

          • memory/1156-67-0x00000000767B1000-0x00000000767B3000-memory.dmp

            Filesize

            8KB

          • memory/1156-65-0x0000000000000000-mapping.dmp

          • memory/1540-74-0x0000000000000000-mapping.dmp

          • memory/1996-54-0x0000000000000000-mapping.dmp