Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2023, 23:11

General

  • Target

    badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe

  • Size

    61KB

  • MD5

    2f8ab388bb2c9c5dd9833b755241b8d2

  • SHA1

    a9bca13e1bfff683ee6a1cf65412e884ffbe95bd

  • SHA256

    badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0

  • SHA512

    3393464f51e653fcb15742ded933635ce2ae52243fab2b2460777e0571cda04e1fb3fed661078629a9a8be766855461eca37aa2fc1f06864d84c44ea2f2a89bd

  • SSDEEP

    1536:T43SHuJV9QaxSzc1kVQctbHB1gTXL7heiEE:T4kuJVFSqctbHB1ufQJE

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1348
      • C:\Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe
        "C:\Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2212
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aEC42.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2404
          • C:\Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe
            "C:\Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe"
            4⤵
            • Executes dropped EXE
            PID:2164
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1992
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1640
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2428

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        5427c8355686e9236966d4dcd2119f7d

        SHA1

        441677316f5b657a05982f73fce0c439e7155a44

        SHA256

        678007290f0ed12852fcdeb88dd9cdb7b40913508d8cc9772cfcb40a7e217936

        SHA512

        67cdc1309d3e076088b3d16875b92f2bd0f060576441319e325560eca7d7c5f0afd15165cc76f49887fff67c869c5c835925d81288ad2add23d0d89a5647f97b

      • C:\Users\Admin\AppData\Local\Temp\$$aEC42.bat

        Filesize

        722B

        MD5

        39f3441cd1eef35bab4eb356d2cabe2c

        SHA1

        8ce3de8e23c10a011342869caadd5d468fe21e26

        SHA256

        a7eb87290344a3800cea02bb98c5328d002449999263404fce5e602085c5020c

        SHA512

        5941ac4eaacf7873deb2ecd408467fc9ac7bf8ff2a6aaf38981026b585ac1bb107cedc0390b2f54fc636ca4af5c1d180b8660a313f623a18642a41be8cccf59c

      • C:\Users\Admin\AppData\Local\Temp\$$aEC42.bat

        Filesize

        722B

        MD5

        39f3441cd1eef35bab4eb356d2cabe2c

        SHA1

        8ce3de8e23c10a011342869caadd5d468fe21e26

        SHA256

        a7eb87290344a3800cea02bb98c5328d002449999263404fce5e602085c5020c

        SHA512

        5941ac4eaacf7873deb2ecd408467fc9ac7bf8ff2a6aaf38981026b585ac1bb107cedc0390b2f54fc636ca4af5c1d180b8660a313f623a18642a41be8cccf59c

      • C:\Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe

        Filesize

        32KB

        MD5

        3de16cea01950aac6a7a5eeb8cb102b0

        SHA1

        c89dd3ce02600d1ef68a83e85947d7e8c4e62cc8

        SHA256

        cd60e89b2ff2743bad3c298ab6f44e005e4986413d1cf97bede0185ac3f12280

        SHA512

        7120b8226aac32933bc1561b432093422a4d708b3c75bd4eea506f7f6586b0014ce2debf7da71874947274632db6f7ffd67b5ec0c88dd9d8f2ecff0b34e12df2

      • C:\Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe.exe

        Filesize

        32KB

        MD5

        3de16cea01950aac6a7a5eeb8cb102b0

        SHA1

        c89dd3ce02600d1ef68a83e85947d7e8c4e62cc8

        SHA256

        cd60e89b2ff2743bad3c298ab6f44e005e4986413d1cf97bede0185ac3f12280

        SHA512

        7120b8226aac32933bc1561b432093422a4d708b3c75bd4eea506f7f6586b0014ce2debf7da71874947274632db6f7ffd67b5ec0c88dd9d8f2ecff0b34e12df2

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        243b2978a3e87c6a237767247bbbf6ef

        SHA1

        b592a11def8ab37d926ab4bc5601aaf1fc852c2a

        SHA256

        ea5e030c047d36a2bd930bd50153e3bf228e7644a3e30ce24bc9cb0f92f48a9c

        SHA512

        f8a617e6c1b790984b8df091938966b68916033b596b0fad51e2c19e0f33ccead7fe35032d0b8db2747fa20f065b87b36226c15e7e46eef73686699f142d71f6

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        243b2978a3e87c6a237767247bbbf6ef

        SHA1

        b592a11def8ab37d926ab4bc5601aaf1fc852c2a

        SHA256

        ea5e030c047d36a2bd930bd50153e3bf228e7644a3e30ce24bc9cb0f92f48a9c

        SHA512

        f8a617e6c1b790984b8df091938966b68916033b596b0fad51e2c19e0f33ccead7fe35032d0b8db2747fa20f065b87b36226c15e7e46eef73686699f142d71f6

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        243b2978a3e87c6a237767247bbbf6ef

        SHA1

        b592a11def8ab37d926ab4bc5601aaf1fc852c2a

        SHA256

        ea5e030c047d36a2bd930bd50153e3bf228e7644a3e30ce24bc9cb0f92f48a9c

        SHA512

        f8a617e6c1b790984b8df091938966b68916033b596b0fad51e2c19e0f33ccead7fe35032d0b8db2747fa20f065b87b36226c15e7e46eef73686699f142d71f6

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        243b2978a3e87c6a237767247bbbf6ef

        SHA1

        b592a11def8ab37d926ab4bc5601aaf1fc852c2a

        SHA256

        ea5e030c047d36a2bd930bd50153e3bf228e7644a3e30ce24bc9cb0f92f48a9c

        SHA512

        f8a617e6c1b790984b8df091938966b68916033b596b0fad51e2c19e0f33ccead7fe35032d0b8db2747fa20f065b87b36226c15e7e46eef73686699f142d71f6

      • F:\$RECYCLE.BIN\S-1-5-21-1014134971-2480516131-292343513-1000\_desktop.ini

        Filesize

        9B

        MD5

        e2742b3f8546170da6c8260d83888060

        SHA1

        ec4a745e18cde4c927f9730e3fcd45ef70af6fb9

        SHA256

        f3d078bebcd8afbc9b72b18b103ded277477821ac1e41595bcef62e69536b50d

        SHA512

        3dcd2e307dda0423ada567825cca9eed0d271c9f2ce4220b2009cd63a0f569f6c9761083aa631ade7fef7e7b9f22aa2c158d804275220d991a3ca11cff1dfbac

      • \Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe

        Filesize

        32KB

        MD5

        3de16cea01950aac6a7a5eeb8cb102b0

        SHA1

        c89dd3ce02600d1ef68a83e85947d7e8c4e62cc8

        SHA256

        cd60e89b2ff2743bad3c298ab6f44e005e4986413d1cf97bede0185ac3f12280

        SHA512

        7120b8226aac32933bc1561b432093422a4d708b3c75bd4eea506f7f6586b0014ce2debf7da71874947274632db6f7ffd67b5ec0c88dd9d8f2ecff0b34e12df2

      • memory/1348-82-0x0000000002A70000-0x0000000002A71000-memory.dmp

        Filesize

        4KB

      • memory/1992-144-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1992-74-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1992-84-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1992-92-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1992-98-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1992-150-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1992-1902-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1992-2756-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1992-3363-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2212-70-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2212-53-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2212-65-0x00000000003C0000-0x00000000003F6000-memory.dmp

        Filesize

        216KB