Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2023, 10:40

General

  • Target

    a9dde9853f389699621c43d26f58d1b370b83172df7b4fda5b749b5efc6c240e.exe

  • Size

    26KB

  • MD5

    09fcc49fe747037561eec5160012d609

  • SHA1

    bced7772a3afdcbfdc9815d720ae75c04163184f

  • SHA256

    a9dde9853f389699621c43d26f58d1b370b83172df7b4fda5b749b5efc6c240e

  • SHA512

    99cc3e764c044fa1fe201c50ed49992cc7d3819b2718023babfb31f1ebe11b9b6b9612f41e571fb893d7bfd696cb4f2c818973f742e640c4e5d44364d7cd62a4

  • SSDEEP

    768:CAppp1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:Xpp/fgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3244
      • C:\Users\Admin\AppData\Local\Temp\a9dde9853f389699621c43d26f58d1b370b83172df7b4fda5b749b5efc6c240e.exe
        "C:\Users\Admin\AppData\Local\Temp\a9dde9853f389699621c43d26f58d1b370b83172df7b4fda5b749b5efc6c240e.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4500
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2220
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1924

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        0483070bbbc609d71ec14c0fb0a70be1

        SHA1

        90a8ae41bc68220f97f056a9cc9c91d3c8063249

        SHA256

        840c851344c9acb25241502d597d130feb6f059fe50947e696e192291cbafe65

        SHA512

        3e20d4be7cbeb347eab3002e184dc4ecfef5c61a88c62fad0154134d77a38b3b468adac10160fe7fb19e68d87f8bfc317613f9a8ed0fc6b8d778341630516b52

      • C:\Program Files\Google\Chrome\Application\chrome.exe

        Filesize

        2.8MB

        MD5

        9283436406789462c5d890176f003e16

        SHA1

        f4018dce0739baa2b5036182e90fc9fa220c847f

        SHA256

        b27df63e61e4fc740f4d46f470bf224cc5fb8f5a8b425de58bbaa102d2477b72

        SHA512

        b124b850ff8ca0727c5174b711f5e1d0bdd6510ee82e73d23d3cc32afa7e4b48ca6712475a3eb6f92bef544b6a18c42f183e476d3e83aece11688dc200632704

      • F:\$RECYCLE.BIN\S-1-5-21-618519468-4027732583-1827558364-1000\_desktop.ini

        Filesize

        9B

        MD5

        f69e51f788b9591cc1a5c32b5d8555e0

        SHA1

        8690c2639d514f6a56d096f7729496ef0e7dbccf

        SHA256

        9c946a7ed190442c6c3cab3b0c1324cee605d4e233e75fc2192f4cff06c92c28

        SHA512

        2db2a58e8a4bb5db019f8a378abf6e12526810029bd9540474ff68cca7e9dc6705f4de550106bfd7f4ba33308da7722c641bb3d5d1b13a2d972609fbb3fb8c34

      • memory/4500-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4500-5-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4500-13-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4500-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4500-24-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4500-28-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4500-1264-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4500-2879-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4500-4796-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB