Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26/08/2023, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe
Resource
win10v2004-20230703-en
General
-
Target
a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe
-
Size
26KB
-
MD5
16268cd19624363352751e751da00c35
-
SHA1
f2695c026182ce8c5d77a5d26273a4dc6b66cc2f
-
SHA256
a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443
-
SHA512
b64c3c2c8992f6c56a2b924538fd09dcb2759c25cb3ae3f16a8aa51b23a8d053f5a43f450f2f0a94cb814dd6b36128e7929db33d05a2ad479ec6f58a9d384e34
-
SSDEEP
768:7rf1ODKAaDMG8H92RwZNQSw+IlJIJJREIOAEeF1:7rNfgLdQAQfhJIJ0IO61
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\Y: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\U: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\H: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\W: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\Q: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\J: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\R: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\P: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\N: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\M: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\L: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\V: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\T: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\S: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\K: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\G: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\E: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\X: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\O: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened (read-only) \??\I: a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files\Google\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\es-ES\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.fr\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\InfoPathOMFormServicesV12\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\Microsoft Games\More Games\fr-FR\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\3082\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Google\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Basic\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\Google\Chrome\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1604 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 28 PID 2152 wrote to memory of 1604 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 28 PID 2152 wrote to memory of 1604 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 28 PID 2152 wrote to memory of 1604 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 28 PID 1604 wrote to memory of 1832 1604 net.exe 30 PID 1604 wrote to memory of 1832 1604 net.exe 30 PID 1604 wrote to memory of 1832 1604 net.exe 30 PID 1604 wrote to memory of 1832 1604 net.exe 30 PID 2152 wrote to memory of 1176 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 21 PID 2152 wrote to memory of 1176 2152 a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe"C:\Users\Admin\AppData\Local\Temp\a609f173646b6977f20f8679509ff8a05832f04fdbcc5d07ff59917f7a15e443.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD543238539fea1b4184f28e1637b979477
SHA126292fcba4371991def6d8d424fc1da9dc1c0a57
SHA2562ffe6b4f66ba04a9e6f0e46169ee3f578960c7e2192dc2934bdb2838a1eb3a60
SHA51266c5ce6cb573a782417465a1ff93f59281e16b91e59ade3acf23b895b9e51e26d26b5336883540736819099d096189d77acb52357f10edf333005fc4bd7e2c24
-
Filesize
874KB
MD59ee25f35200a8370c5441e19aa763fd5
SHA1a651689f7c545b6e6d84fd267d789796930b4d90
SHA256f2a463957b7f1bdbb202650961f5785b6a131058a9878307b6d52e8e6c2a46e6
SHA5127c6bbdc1a23fc612139163fc9dbf043bbdd8920da1695d8f9880009b8c5594aa56c03f1ee50f2d9b8040cdeb9eaf0429ac3800552e2fc6c735f8fd0fd10eb720
-
Filesize
471KB
MD5f9fc019eacb573ec828d2d9ff6a48318
SHA1b91958dc8d178b6eeb35e829bab84d0fb12c2280
SHA256bf9ba3df2bad76d15f4efe42c0c59f37b9454907958892df8ab996552658934e
SHA512998ba7bc7cdd5df3e1acfda6f4f92ec9d27732e1e182177dff310f3c918f3be99626a3526bebdff5bb7eb980640434baf56e0f08bfd125168c0a9e37e7239305
-
Filesize
9B
MD5f69e51f788b9591cc1a5c32b5d8555e0
SHA18690c2639d514f6a56d096f7729496ef0e7dbccf
SHA2569c946a7ed190442c6c3cab3b0c1324cee605d4e233e75fc2192f4cff06c92c28
SHA5122db2a58e8a4bb5db019f8a378abf6e12526810029bd9540474ff68cca7e9dc6705f4de550106bfd7f4ba33308da7722c641bb3d5d1b13a2d972609fbb3fb8c34