Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2023, 00:17

General

  • Target

    4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe

  • Size

    65KB

  • MD5

    a441a8c24d3848bd143b8ec2904b47b6

  • SHA1

    cfbeb02a0db0ac08e9a508643b7f00d36874a297

  • SHA256

    4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb

  • SHA512

    2ea23f173d4c256f5659391cc4ba95199e68ea39b89a9898997231c496ee5604e82513003e80917c44f533c00dd1af3820dd008695935c6d4179985fe82a1d3d

  • SSDEEP

    1536:T/Wu3SHuJV9QaxvQoNhuHB1gTXL7jueis:T/tkuJVFvQ4huHB1ufxx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3168
      • C:\Users\Admin\AppData\Local\Temp\4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe
        "C:\Users\Admin\AppData\Local\Temp\4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3212
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aAAC7.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4256
          • C:\Users\Admin\AppData\Local\Temp\4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe
            "C:\Users\Admin\AppData\Local\Temp\4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe"
            4⤵
            • Executes dropped EXE
            PID:4380
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1716
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3704
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4000

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        f68dd712fd4e86890036ca669c686945

        SHA1

        20bb9c1f512f9cde68a3fb9a213b514a4ab61114

        SHA256

        5eca8b9bf40b30a334b4476c909b0daa2f49da37e254435a794b0a61e1a87c44

        SHA512

        9335071ef6c6b7c2018d898db89759052f1c1fa634b81ea7e5214b272a557ddd72fcc151dc2978da29cde3b24ac7126b39381831a60163942646ce934efa93c7

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        487KB

        MD5

        1f1ed863f4554d31f7949816d33b44c9

        SHA1

        b997d4d3a1936e11b4b54a95d5cedd08c2666a9e

        SHA256

        da244286e9d1b1eb120802054365a1b9051b1976ca3eccd1bf3153129c49b1a2

        SHA512

        2eed40022d3d3e366ea1d1f05dfdd80a75fd1acb2d40a4f3853d796e80a8ba8dc63f22e0647d9fa8ad6f3bc8e2b029fd7c507bcf5fe66b357e6ea7ccdf2e6f99

      • C:\Users\Admin\AppData\Local\Temp\$$aAAC7.bat

        Filesize

        722B

        MD5

        42f5ddf0f5d361c655f9c149ab4d69aa

        SHA1

        ad1e973ace88d4f7b1f862f52aeee3817b0e6e87

        SHA256

        8b2ae7f5737640f9c854d156cfc2b99449738a91f86d09ee83781e154537d9ad

        SHA512

        b12b3253208ca23a189761f881a3cad86deaffe48d1d13092969ee1267901338a83cb0e41f91e46cb4a57d4cec18cf199ac5744b3e901eec897ac4b34e828985

      • C:\Users\Admin\AppData\Local\Temp\4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe

        Filesize

        35KB

        MD5

        cc5cbe8044521b544feadcc7062d217f

        SHA1

        5edaf0457ed0a8c417b70922f915493d35cb09ab

        SHA256

        09463cf6d559b5774c6c6b665e69294a07eb111ccffb7b27f81378b5a58dc802

        SHA512

        fb347f2baa9586f83c5f5b7cf79a3925f68091483d5b2bad434dc070682ce0aef8bad744874593898bdd546f6fd20ce9e0d3448f676c9d230339865aed01cf45

      • C:\Users\Admin\AppData\Local\Temp\4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe.exe

        Filesize

        35KB

        MD5

        cc5cbe8044521b544feadcc7062d217f

        SHA1

        5edaf0457ed0a8c417b70922f915493d35cb09ab

        SHA256

        09463cf6d559b5774c6c6b665e69294a07eb111ccffb7b27f81378b5a58dc802

        SHA512

        fb347f2baa9586f83c5f5b7cf79a3925f68091483d5b2bad434dc070682ce0aef8bad744874593898bdd546f6fd20ce9e0d3448f676c9d230339865aed01cf45

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        aa63a6c869b0d64b1dbae98ba2bd00b9

        SHA1

        1b45f9e7390a3aa7a27a824696e7e6fcc50bf11a

        SHA256

        0ac780ea7c76c362cd52165342ad2598c608d292d83e4d7fc27643ba98fac875

        SHA512

        343127beeec7713eb3ce9b2936c858c2570374571b229e204d44bab573c2683b5983f2ceb0c7d38b3c233acd37528e84077991309154b38655ec62c11a979ca3

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        aa63a6c869b0d64b1dbae98ba2bd00b9

        SHA1

        1b45f9e7390a3aa7a27a824696e7e6fcc50bf11a

        SHA256

        0ac780ea7c76c362cd52165342ad2598c608d292d83e4d7fc27643ba98fac875

        SHA512

        343127beeec7713eb3ce9b2936c858c2570374571b229e204d44bab573c2683b5983f2ceb0c7d38b3c233acd37528e84077991309154b38655ec62c11a979ca3

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        aa63a6c869b0d64b1dbae98ba2bd00b9

        SHA1

        1b45f9e7390a3aa7a27a824696e7e6fcc50bf11a

        SHA256

        0ac780ea7c76c362cd52165342ad2598c608d292d83e4d7fc27643ba98fac875

        SHA512

        343127beeec7713eb3ce9b2936c858c2570374571b229e204d44bab573c2683b5983f2ceb0c7d38b3c233acd37528e84077991309154b38655ec62c11a979ca3

      • F:\$RECYCLE.BIN\S-1-5-21-4176143399-3250363947-192774652-1000\_desktop.ini

        Filesize

        9B

        MD5

        4a4922bdf377baedb0460540a7e52405

        SHA1

        82789c7c3ee038da34ac62e38ddde0fe667d52ac

        SHA256

        589848447b17adf03dfa9db6e17b5ec00d1fabf203fa496bae29ed64764a052f

        SHA512

        fe635f97709f5f3df9290c6c53a374351481f13aa45105f48fe3709c15532313eb4d032eed20f2a278b9837c84bba9ba7a7fa2d83cd2a1e3adc0bc930d40c2a1

      • memory/1716-170-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1716-152-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1716-159-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1716-165-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1716-174-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1716-142-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1716-401-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1716-1411-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1716-2650-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1716-4953-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3212-133-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3212-141-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB