Analysis

  • max time kernel
    151s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:26

General

  • Target

    e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe

  • Size

    269KB

  • MD5

    006a802df60dc9b22b77c4c798f9a703

  • SHA1

    6d410bf03883f133d1d094285c4615ca999e658b

  • SHA256

    e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c

  • SHA512

    1e35e4425f60c27d8aea2e8c34fc3333437a65f17f6663ceb6ee0d17643f1ddefc8961e72d69cdda9667ff327fc843d55d4facbcf66f43af67a67f7ac8f5b663

  • SSDEEP

    6144:cc46tGdyN83nLbxKVJ3nCMkQe5HZAsHFZlxo:cc3NNgsHyMqLHFZlxo

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:744
      • C:\Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe
        "C:\Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3912
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1424
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA9A2.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2556
            • C:\Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe
              "C:\Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe"
              4⤵
              • Executes dropped EXE
              PID:2232
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1220
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3196
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:4360
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:4240
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:3564

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$$aA9A2.bat

            Filesize

            722B

            MD5

            6f1428fa17399446300e76863394d9bf

            SHA1

            0a5395bbf863c07858ce4a435fd8e253b89ef69a

            SHA256

            d56d7363fd698d664c0c9453d1cc7cdcdab534402bf05345d01cb07e92dd252d

            SHA512

            1f7edacc2a3ed3bed33a1dcd0eff5ae2b17f70681bdf5b25ffce353f8746bc62ae68b8ff37bfacf6156b22688a9cf9af834d9b1983369269fd9a9843d818154d

          • C:\Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe

            Filesize

            236KB

            MD5

            d095376682210d6ddcaeb636500eb0cb

            SHA1

            f3ba099deee863c83f78e1814eb345b56560b11a

            SHA256

            06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

            SHA512

            546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

          • C:\Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe.exe

            Filesize

            236KB

            MD5

            d095376682210d6ddcaeb636500eb0cb

            SHA1

            f3ba099deee863c83f78e1814eb345b56560b11a

            SHA256

            06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

            SHA512

            546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            b8738498596b67cee4b863b2926ff65a

            SHA1

            34b936a96fc79e56a988247770d03324b10ce3cb

            SHA256

            d69bf681ee6babb017e664e9b8ba5a03b7d2ff60abe2259174667019d00e8ff0

            SHA512

            ce88ba3d2bdaebc4e9f2468213b69d497f33b4c85a4bf68af5bce8a282d3905f22aa8a89341d093bfaa4f01fbbec7462138d2ca725b4c0cf31d69b87889871a3

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            b8738498596b67cee4b863b2926ff65a

            SHA1

            34b936a96fc79e56a988247770d03324b10ce3cb

            SHA256

            d69bf681ee6babb017e664e9b8ba5a03b7d2ff60abe2259174667019d00e8ff0

            SHA512

            ce88ba3d2bdaebc4e9f2468213b69d497f33b4c85a4bf68af5bce8a282d3905f22aa8a89341d093bfaa4f01fbbec7462138d2ca725b4c0cf31d69b87889871a3

          • C:\Windows\rundl132.exe

            Filesize

            33KB

            MD5

            b8738498596b67cee4b863b2926ff65a

            SHA1

            34b936a96fc79e56a988247770d03324b10ce3cb

            SHA256

            d69bf681ee6babb017e664e9b8ba5a03b7d2ff60abe2259174667019d00e8ff0

            SHA512

            ce88ba3d2bdaebc4e9f2468213b69d497f33b4c85a4bf68af5bce8a282d3905f22aa8a89341d093bfaa4f01fbbec7462138d2ca725b4c0cf31d69b87889871a3

          • memory/1220-150-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1220-136-0x0000000000000000-mapping.dmp

          • memory/1220-146-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1424-133-0x0000000000000000-mapping.dmp

          • memory/2232-144-0x0000000000000000-mapping.dmp

          • memory/2556-135-0x0000000000000000-mapping.dmp

          • memory/2576-132-0x0000000000000000-mapping.dmp

          • memory/3196-140-0x0000000000000000-mapping.dmp

          • memory/3564-149-0x0000000000000000-mapping.dmp

          • memory/3912-139-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3912-134-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4240-148-0x0000000000000000-mapping.dmp

          • memory/4360-141-0x0000000000000000-mapping.dmp