Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2023, 23:44

General

  • Target

    5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe

  • Size

    2.9MB

  • MD5

    52bc91a3e3cdca45c9a53865933eb9f0

  • SHA1

    9fffaa8d0db6e3716eccd27a7c03ffc36f777c28

  • SHA256

    5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e

  • SHA512

    f69b11c7b7dd65ab12e4905b98cc5e32964be159ec422ca04348dbd5b9a54dd6d036060d17547ef561f4bb089247912f64be71b1f825ff60480b798d04ff658c

  • SSDEEP

    49152:/77X1F9Xcx6mVu6K5aMPY4u9GxpAAKMzqTJxmpieu5kL/VBQ4g4/KodCx1rb+66+:XljaJVu8MPY4XxpA7hzmgkVJdCx1Ohh6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3176
      • C:\Users\Admin\AppData\Local\Temp\5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe
        "C:\Users\Admin\AppData\Local\Temp\5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6987.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2960
          • C:\Users\Admin\AppData\Local\Temp\5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe
            "C:\Users\Admin\AppData\Local\Temp\5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4860
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4920
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5072
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1332

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              cbab5a0529694ab9e25c40f025e996ac

              SHA1

              3561d6ab26622a85ec76b86a471169eb5cf3c2dc

              SHA256

              5cf5186b719867ed6312f471e8961478cc167a31c9ac5aae16ea0d624602043f

              SHA512

              098fae04e9e299cba09cbb657c7ea06a84ad9b57feb36af435e51e936b41823a9f68ee7adae399419db9b32da32b230babad80f254042c2915d85c170cafa958

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              484KB

              MD5

              343e5057d4c48bfae311691776fa5080

              SHA1

              2d5ccbdc2449bc0b03bc87bf92ffbc39bf9acb99

              SHA256

              d145886ab6b4a8edfca6fc5ebef9a929e690a25767b88fea29b41f7461170625

              SHA512

              f0aee378754f95fbecab359829daaba5c0c09f336e9ef9dc087aff45ac3484d772fe129d68486ebfe7467f3ea672f1970c33916eec0d9f7671a8623d85e7ab07

            • C:\Users\Admin\AppData\Local\Temp\$$a6987.bat

              Filesize

              722B

              MD5

              1dd069343cd47074b49780f0dc7a752f

              SHA1

              153ca81e7731713059e56b3d3859ed60d3d359aa

              SHA256

              955245cd673ba73c7df3e01f3af9800cd8d386aa8b6b504a182a8aa2665c376e

              SHA512

              b9bd090ea30915f0ce24f7bdc1ed10cb0e15dcbe6d983e50491d959582d41bf7164bdba8c43551566a9f8529c3d1ed3a5ce3567f0552310207aa45215dc7a096

            • C:\Users\Admin\AppData\Local\Temp\5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe

              Filesize

              2.9MB

              MD5

              42c5eb41b0e812b0bd546e8afae1b1e6

              SHA1

              b8ed9f64595d5195950b980583abf5ab94b0c9b7

              SHA256

              ac8b9abba373955771cf7b4f8de260b4e01cb2a91a03ae1f67edf64381e9b218

              SHA512

              f1dfa865ab0bfd65cac4fe7cd67600baaf6a32e27c73afab5094432f6cbe7d70b958224dc631daaf77bf4646462c37c785ef883cbd5368f3236adfc164ef7d51

            • C:\Users\Admin\AppData\Local\Temp\5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe.exe

              Filesize

              2.9MB

              MD5

              42c5eb41b0e812b0bd546e8afae1b1e6

              SHA1

              b8ed9f64595d5195950b980583abf5ab94b0c9b7

              SHA256

              ac8b9abba373955771cf7b4f8de260b4e01cb2a91a03ae1f67edf64381e9b218

              SHA512

              f1dfa865ab0bfd65cac4fe7cd67600baaf6a32e27c73afab5094432f6cbe7d70b958224dc631daaf77bf4646462c37c785ef883cbd5368f3236adfc164ef7d51

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              4fbbf499b230779c948970bce5086eac

              SHA1

              c7ac6348e552fb31a652b253140932ee02c57afd

              SHA256

              025af9d35ec75cb5b09fbf4ecadeb34567b8b51a3acc2662c2c6ecec37d561ef

              SHA512

              53b4f5b22b2e2f22a89f114858229c3c20d314f193623ae34496c0e2d90019616cd05358d817be7ecdbf2bc954ab17034fbae622fd76f659518f3df5764b6fd5

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              4fbbf499b230779c948970bce5086eac

              SHA1

              c7ac6348e552fb31a652b253140932ee02c57afd

              SHA256

              025af9d35ec75cb5b09fbf4ecadeb34567b8b51a3acc2662c2c6ecec37d561ef

              SHA512

              53b4f5b22b2e2f22a89f114858229c3c20d314f193623ae34496c0e2d90019616cd05358d817be7ecdbf2bc954ab17034fbae622fd76f659518f3df5764b6fd5

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              4fbbf499b230779c948970bce5086eac

              SHA1

              c7ac6348e552fb31a652b253140932ee02c57afd

              SHA256

              025af9d35ec75cb5b09fbf4ecadeb34567b8b51a3acc2662c2c6ecec37d561ef

              SHA512

              53b4f5b22b2e2f22a89f114858229c3c20d314f193623ae34496c0e2d90019616cd05358d817be7ecdbf2bc954ab17034fbae622fd76f659518f3df5764b6fd5

            • F:\$RECYCLE.BIN\S-1-5-21-1043950675-1972537973-2972532878-1000\_desktop.ini

              Filesize

              9B

              MD5

              f69e51f788b9591cc1a5c32b5d8555e0

              SHA1

              8690c2639d514f6a56d096f7729496ef0e7dbccf

              SHA256

              9c946a7ed190442c6c3cab3b0c1324cee605d4e233e75fc2192f4cff06c92c28

              SHA512

              2db2a58e8a4bb5db019f8a378abf6e12526810029bd9540474ff68cca7e9dc6705f4de550106bfd7f4ba33308da7722c641bb3d5d1b13a2d972609fbb3fb8c34

            • memory/2584-9-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2584-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4920-23-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4920-30-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4920-36-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4920-41-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4920-45-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4920-1282-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4920-8-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4920-4785-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB