Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2023, 23:02

General

  • Target

    8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe

  • Size

    46KB

  • MD5

    869ba6ac819fe933a52089277ebd09ec

  • SHA1

    ea07630fa1ae65bef5d1183648f09c10721f2774

  • SHA256

    8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383

  • SHA512

    bf16235827c7e8a7bdc3d5bac1deec3d3040cdbf3e2fcc42a112ad19567c61495c7681156ed8bdbdb0e1a61684f0492b8eac0f725f8e9c1020f866724f7c9afa

  • SSDEEP

    768:pG1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLzXqv82FVvh:6fgLdQAQfcfymNv6v1h

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3256
      • C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
        "C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3392
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6997.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3412
          • C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
            "C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2572
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:212
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3668
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3496

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        4f1348ee8e879b893e03458ec71e1536

        SHA1

        c333bbc16ce1a93206ffd251465f44211cb54b13

        SHA256

        4d4dd3e9434b8b3155e6cb43e0651f207486f0cf23753c2ef6b644fe01e27a5c

        SHA512

        562f732f9d9bcb991ad00dea0d032a81dd54dfd93aaeff6a4493e08b064f23ea992752dde18d132421c7b36b6699dea8dabdfa454808fb393368975c0c64f078

      • C:\Program Files\TraceReceive.exe

        Filesize

        1.5MB

        MD5

        db739fdb9daaa8c5676fdff80ba857e6

        SHA1

        3ad8346ed29b6d440bca4eeecfc7f4532583a807

        SHA256

        dd817cd4cd133e748e5e2783416a67bd9624c447d6debdbbd23aef3c913c9221

        SHA512

        e2362589f738809c78867d323c8f5257cae0405ac1be98551c97a7a70fd157737c98880b0b1585ce210a57e6d6eefef8ea5dabdd3ede48f9e8392729ba328f6f

      • C:\Users\Admin\AppData\Local\Temp\$$a6997.bat

        Filesize

        722B

        MD5

        f1db3ec95094dc19e9a61834dc3f8315

        SHA1

        d7c2106ee5d8f40af3ddc24cd8caca25a60fab62

        SHA256

        e913294e5de71f73387af4e9476890e35f60411b56bcbbf85578f8780171d939

        SHA512

        923f997d2af5dcb8c86f662e6cfde689951beab6bb4c0db34cd9c88c809f3fe4a1c96881a0b52425e5f18b2f6e269af461c23fa5d5db32472834ee581a956708

      • C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe

        Filesize

        20KB

        MD5

        46eff666c94e3f7cf93ce87feb23af51

        SHA1

        fdb4d2878166c547b4fb61996f673ae345c2415c

        SHA256

        5115438f3279d97dfef6f319688c0b154ed0e62a55dd8e8dc6cc370a4e1aa742

        SHA512

        6f7db660cde8a89c11f7202f720d9805d1cddeb34013bf96cc400378a31e8c0af45ed681a45ed7a1c261c9c6d93504167519f2e91cc90f6afbde636cb881486b

      • C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe.exe

        Filesize

        20KB

        MD5

        46eff666c94e3f7cf93ce87feb23af51

        SHA1

        fdb4d2878166c547b4fb61996f673ae345c2415c

        SHA256

        5115438f3279d97dfef6f319688c0b154ed0e62a55dd8e8dc6cc370a4e1aa742

        SHA512

        6f7db660cde8a89c11f7202f720d9805d1cddeb34013bf96cc400378a31e8c0af45ed681a45ed7a1c261c9c6d93504167519f2e91cc90f6afbde636cb881486b

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c8f519a43c76c60e8cbab32da4b85a13

        SHA1

        9d4378b66e2be1fad86098a540670de671229d29

        SHA256

        480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1

        SHA512

        959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c8f519a43c76c60e8cbab32da4b85a13

        SHA1

        9d4378b66e2be1fad86098a540670de671229d29

        SHA256

        480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1

        SHA512

        959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        c8f519a43c76c60e8cbab32da4b85a13

        SHA1

        9d4378b66e2be1fad86098a540670de671229d29

        SHA256

        480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1

        SHA512

        959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a

      • F:\$RECYCLE.BIN\S-1-5-21-1043950675-1972537973-2972532878-1000\_desktop.ini

        Filesize

        9B

        MD5

        e2742b3f8546170da6c8260d83888060

        SHA1

        ec4a745e18cde4c927f9730e3fcd45ef70af6fb9

        SHA256

        f3d078bebcd8afbc9b72b18b103ded277477821ac1e41595bcef62e69536b50d

        SHA512

        3dcd2e307dda0423ada567825cca9eed0d271c9f2ce4220b2009cd63a0f569f6c9761083aa631ade7fef7e7b9f22aa2c158d804275220d991a3ca11cff1dfbac

      • memory/212-170-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/212-152-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/212-159-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/212-165-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/212-174-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/212-450-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/212-1412-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/212-142-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/212-4921-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/212-4954-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3392-133-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3392-143-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB