Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2023, 23:02

General

  • Target

    8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe

  • Size

    46KB

  • MD5

    869ba6ac819fe933a52089277ebd09ec

  • SHA1

    ea07630fa1ae65bef5d1183648f09c10721f2774

  • SHA256

    8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383

  • SHA512

    bf16235827c7e8a7bdc3d5bac1deec3d3040cdbf3e2fcc42a112ad19567c61495c7681156ed8bdbdb0e1a61684f0492b8eac0f725f8e9c1020f866724f7c9afa

  • SSDEEP

    768:pG1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLzXqv82FVvh:6fgLdQAQfcfymNv6v1h

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1276
      • C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
        "C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a89D8.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2444
          • C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
            "C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3044
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2100
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2388
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2992

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        4f1348ee8e879b893e03458ec71e1536

        SHA1

        c333bbc16ce1a93206ffd251465f44211cb54b13

        SHA256

        4d4dd3e9434b8b3155e6cb43e0651f207486f0cf23753c2ef6b644fe01e27a5c

        SHA512

        562f732f9d9bcb991ad00dea0d032a81dd54dfd93aaeff6a4493e08b064f23ea992752dde18d132421c7b36b6699dea8dabdfa454808fb393368975c0c64f078

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a89D8.bat

        Filesize

        722B

        MD5

        99e13d9ee68728849e1649c5a1fd77e1

        SHA1

        acd5cd331db0c6ce96c77527a2680e50a5958e90

        SHA256

        73d3036ccd8219ca8da6d1978b67533499f6804c96be1285cd9d335907910973

        SHA512

        09910545bd0276312a209aca9796deac88e7b6a541a3fc4b07de46f1d8baa55de60ee270907f180d72019346e2da1a7009542f55344889b8162f1b9373b79688

      • C:\Users\Admin\AppData\Local\Temp\$$a89D8.bat

        Filesize

        722B

        MD5

        99e13d9ee68728849e1649c5a1fd77e1

        SHA1

        acd5cd331db0c6ce96c77527a2680e50a5958e90

        SHA256

        73d3036ccd8219ca8da6d1978b67533499f6804c96be1285cd9d335907910973

        SHA512

        09910545bd0276312a209aca9796deac88e7b6a541a3fc4b07de46f1d8baa55de60ee270907f180d72019346e2da1a7009542f55344889b8162f1b9373b79688

      • C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe

        Filesize

        20KB

        MD5

        46eff666c94e3f7cf93ce87feb23af51

        SHA1

        fdb4d2878166c547b4fb61996f673ae345c2415c

        SHA256

        5115438f3279d97dfef6f319688c0b154ed0e62a55dd8e8dc6cc370a4e1aa742

        SHA512

        6f7db660cde8a89c11f7202f720d9805d1cddeb34013bf96cc400378a31e8c0af45ed681a45ed7a1c261c9c6d93504167519f2e91cc90f6afbde636cb881486b

      • C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe.exe

        Filesize

        20KB

        MD5

        46eff666c94e3f7cf93ce87feb23af51

        SHA1

        fdb4d2878166c547b4fb61996f673ae345c2415c

        SHA256

        5115438f3279d97dfef6f319688c0b154ed0e62a55dd8e8dc6cc370a4e1aa742

        SHA512

        6f7db660cde8a89c11f7202f720d9805d1cddeb34013bf96cc400378a31e8c0af45ed681a45ed7a1c261c9c6d93504167519f2e91cc90f6afbde636cb881486b

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c8f519a43c76c60e8cbab32da4b85a13

        SHA1

        9d4378b66e2be1fad86098a540670de671229d29

        SHA256

        480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1

        SHA512

        959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c8f519a43c76c60e8cbab32da4b85a13

        SHA1

        9d4378b66e2be1fad86098a540670de671229d29

        SHA256

        480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1

        SHA512

        959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c8f519a43c76c60e8cbab32da4b85a13

        SHA1

        9d4378b66e2be1fad86098a540670de671229d29

        SHA256

        480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1

        SHA512

        959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        c8f519a43c76c60e8cbab32da4b85a13

        SHA1

        9d4378b66e2be1fad86098a540670de671229d29

        SHA256

        480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1

        SHA512

        959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a

      • F:\$RECYCLE.BIN\S-1-5-21-3408354897-1169622894-3874090110-1000\_desktop.ini

        Filesize

        9B

        MD5

        e2742b3f8546170da6c8260d83888060

        SHA1

        ec4a745e18cde4c927f9730e3fcd45ef70af6fb9

        SHA256

        f3d078bebcd8afbc9b72b18b103ded277477821ac1e41595bcef62e69536b50d

        SHA512

        3dcd2e307dda0423ada567825cca9eed0d271c9f2ce4220b2009cd63a0f569f6c9761083aa631ade7fef7e7b9f22aa2c158d804275220d991a3ca11cff1dfbac

      • \Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe

        Filesize

        20KB

        MD5

        46eff666c94e3f7cf93ce87feb23af51

        SHA1

        fdb4d2878166c547b4fb61996f673ae345c2415c

        SHA256

        5115438f3279d97dfef6f319688c0b154ed0e62a55dd8e8dc6cc370a4e1aa742

        SHA512

        6f7db660cde8a89c11f7202f720d9805d1cddeb34013bf96cc400378a31e8c0af45ed681a45ed7a1c261c9c6d93504167519f2e91cc90f6afbde636cb881486b

      • \Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe

        Filesize

        20KB

        MD5

        46eff666c94e3f7cf93ce87feb23af51

        SHA1

        fdb4d2878166c547b4fb61996f673ae345c2415c

        SHA256

        5115438f3279d97dfef6f319688c0b154ed0e62a55dd8e8dc6cc370a4e1aa742

        SHA512

        6f7db660cde8a89c11f7202f720d9805d1cddeb34013bf96cc400378a31e8c0af45ed681a45ed7a1c261c9c6d93504167519f2e91cc90f6afbde636cb881486b

      • memory/1276-84-0x0000000002980000-0x0000000002981000-memory.dmp

        Filesize

        4KB

      • memory/2100-101-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2100-87-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2100-95-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2100-75-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2100-148-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2100-154-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2100-269-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2100-1907-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2100-3367-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2612-86-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2612-70-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2612-69-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2612-54-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB