Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27/08/2023, 08:46

General

  • Target

    8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.exe

  • Size

    1.3MB

  • MD5

    0dc6ccbce2a064132dd5674157e5b7c7

  • SHA1

    7e082f0f8d08b94fac8e5f89da7998c7552c8507

  • SHA256

    8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e

  • SHA512

    a8184d0e8d1c5d0c94570f6523554cee617d5cec9d955ea38d06d347c8b167792bc83e9c8716c4cc55ad43409efc55f5e186fa4a720ffe8ad4fdb6d697e6151b

  • SSDEEP

    24576:e7f2UHT+4Zi8Qopici4gpSqnbz5xfyASahVXqV6aOdCsWh88YaXag:e7f2++4w8TptyHnbz5fS6XqV6a4CsWYA

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.exe
        "C:\Users\Admin\AppData\Local\Temp\8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2444
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a7E25.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:580
          • C:\Users\Admin\AppData\Local\Temp\8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.exe
            "C:\Users\Admin\AppData\Local\Temp\8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2844
            • C:\Users\Admin\AppData\Local\Temp\is-3S41R.tmp\8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-3S41R.tmp\8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.tmp" /SL5="$80120,1084492,53248,C:\Users\Admin\AppData\Local\Temp\8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: GetForegroundWindowSpam
              PID:2916
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2164
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2924
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2904

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        cd747b331519ffcc6805e37da9d18557

        SHA1

        2f325060de25fd11643e65c5c2d4c270ea698213

        SHA256

        8ffc8a2d08b441ca06abd0ff43de7173627fd14851a4692abc05337f0705b138

        SHA512

        5914f3ae245c35bb2db544e1ebfc3ad13d0b8166115eb331cf673071e4f7f4a5048f9138545c9e795bf32ef22dcf3af002594b24d572e9fa8eff11e412b11873

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        99ea9b604a7a734d3087fa6159684c42

        SHA1

        709fa1068ad4d560fe03e05b68056f1b0bedbfc8

        SHA256

        3f733f9e6fec7c4165ca8ba41eb23f604a248babe794c4ad2c6c3ce8032aab1c

        SHA512

        7af8008c7e187f925c62efc97e1891a7a38d089302dba39fbde137fb895e0592847ed0982c824c2075be8e6b95b6ce165ecb848ab85adf53779ebef613410fbb

      • C:\Users\Admin\AppData\Local\Temp\$$a7E25.bat

        Filesize

        722B

        MD5

        643ac1210d9f068d0277b12e79c538b1

        SHA1

        1e1b13e5235de9dc5bf95b93c6f05923d679353b

        SHA256

        f50f8a5e0b263fc4740535b22ab7da0d6c750ce3f8e4afceb66a21cfc8a8f037

        SHA512

        f3cbf13fe5f01ca4f8025f5a700bc0e825e6d2faa4fdb9bdf48b7ae50c42cef6dbbc1bb573fd1cd2f05382a976907bcfbf95a5955448f283c0a11118b77957ea

      • C:\Users\Admin\AppData\Local\Temp\$$a7E25.bat

        Filesize

        722B

        MD5

        643ac1210d9f068d0277b12e79c538b1

        SHA1

        1e1b13e5235de9dc5bf95b93c6f05923d679353b

        SHA256

        f50f8a5e0b263fc4740535b22ab7da0d6c750ce3f8e4afceb66a21cfc8a8f037

        SHA512

        f3cbf13fe5f01ca4f8025f5a700bc0e825e6d2faa4fdb9bdf48b7ae50c42cef6dbbc1bb573fd1cd2f05382a976907bcfbf95a5955448f283c0a11118b77957ea

      • C:\Users\Admin\AppData\Local\Temp\8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.exe

        Filesize

        1.3MB

        MD5

        1b9e019f5999b56e2231d1d2542f75f9

        SHA1

        9e38f15d1c458293d514c4797d36de379549211c

        SHA256

        ddf4cbb96b00b6ec558de523ce3fc5f7bf2c7c18384517d5f1d050f1e35d6bdf

        SHA512

        16c5ef5c9eeffe8117f3617f2738aa6524592f0797e6a1d539bbbb5a6a5b9f1f0ea1dd5e9c41ede5bfcb8817731cc4d080be4abe0b726d60b132897e08a635b2

      • C:\Users\Admin\AppData\Local\Temp\8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.exe.exe

        Filesize

        1.3MB

        MD5

        1b9e019f5999b56e2231d1d2542f75f9

        SHA1

        9e38f15d1c458293d514c4797d36de379549211c

        SHA256

        ddf4cbb96b00b6ec558de523ce3fc5f7bf2c7c18384517d5f1d050f1e35d6bdf

        SHA512

        16c5ef5c9eeffe8117f3617f2738aa6524592f0797e6a1d539bbbb5a6a5b9f1f0ea1dd5e9c41ede5bfcb8817731cc4d080be4abe0b726d60b132897e08a635b2

      • C:\Users\Admin\AppData\Local\Temp\is-3S41R.tmp\8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.tmp

        Filesize

        669KB

        MD5

        52950ac9e2b481453082f096120e355a

        SHA1

        159c09db1abcee9114b4f792ffba255c78a6e6c3

        SHA256

        25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

        SHA512

        5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

      • C:\Users\Admin\AppData\Local\Temp\is-3S41R.tmp\8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.tmp

        Filesize

        669KB

        MD5

        52950ac9e2b481453082f096120e355a

        SHA1

        159c09db1abcee9114b4f792ffba255c78a6e6c3

        SHA256

        25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

        SHA512

        5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8f05c081e198827d9c8abe69c3d35c62

        SHA1

        314dab16c5d26bd815f2c0eafd52ce2718ad24e6

        SHA256

        a25a78c65d46af9ef2e7bd5334f7f964e00640041131293b705531474b14ca02

        SHA512

        15364d28aaf53b3a92392ab318ad24f00399b08ba744c5fb625aad45f011dbd893b6542dee5285ccbc872f5e6356f77026086c0bfd7325988581cedddeae1aa4

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8f05c081e198827d9c8abe69c3d35c62

        SHA1

        314dab16c5d26bd815f2c0eafd52ce2718ad24e6

        SHA256

        a25a78c65d46af9ef2e7bd5334f7f964e00640041131293b705531474b14ca02

        SHA512

        15364d28aaf53b3a92392ab318ad24f00399b08ba744c5fb625aad45f011dbd893b6542dee5285ccbc872f5e6356f77026086c0bfd7325988581cedddeae1aa4

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8f05c081e198827d9c8abe69c3d35c62

        SHA1

        314dab16c5d26bd815f2c0eafd52ce2718ad24e6

        SHA256

        a25a78c65d46af9ef2e7bd5334f7f964e00640041131293b705531474b14ca02

        SHA512

        15364d28aaf53b3a92392ab318ad24f00399b08ba744c5fb625aad45f011dbd893b6542dee5285ccbc872f5e6356f77026086c0bfd7325988581cedddeae1aa4

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        8f05c081e198827d9c8abe69c3d35c62

        SHA1

        314dab16c5d26bd815f2c0eafd52ce2718ad24e6

        SHA256

        a25a78c65d46af9ef2e7bd5334f7f964e00640041131293b705531474b14ca02

        SHA512

        15364d28aaf53b3a92392ab318ad24f00399b08ba744c5fb625aad45f011dbd893b6542dee5285ccbc872f5e6356f77026086c0bfd7325988581cedddeae1aa4

      • F:\$RECYCLE.BIN\S-1-5-21-3408354897-1169622894-3874090110-1000\_desktop.ini

        Filesize

        9B

        MD5

        c0232c2f01c543d260713210da47a57b

        SHA1

        63f2c13c2c5c83091133c2802e69993d52e3ec65

        SHA256

        278e1b8fd3f40d95faaecf548098b8d9ee4b32e98a8878559c8c8dfcd5cd1197

        SHA512

        2ccfd67393a63f03f588296bb798d7a7d4ec2ea5d6ac486cb7bdf8a5a66b1df944d8b548f317e58bfe17dea2ae54e536ffe77bc11a43c931f3d10e299ab3fca0

      • \Users\Admin\AppData\Local\Temp\8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.exe

        Filesize

        1.3MB

        MD5

        1b9e019f5999b56e2231d1d2542f75f9

        SHA1

        9e38f15d1c458293d514c4797d36de379549211c

        SHA256

        ddf4cbb96b00b6ec558de523ce3fc5f7bf2c7c18384517d5f1d050f1e35d6bdf

        SHA512

        16c5ef5c9eeffe8117f3617f2738aa6524592f0797e6a1d539bbbb5a6a5b9f1f0ea1dd5e9c41ede5bfcb8817731cc4d080be4abe0b726d60b132897e08a635b2

      • \Users\Admin\AppData\Local\Temp\is-3S41R.tmp\8b583044a4762ebcbe44d07ed6f0c5f3c804b38fa62df3c3bde147636cb8ba3e.tmp

        Filesize

        669KB

        MD5

        52950ac9e2b481453082f096120e355a

        SHA1

        159c09db1abcee9114b4f792ffba255c78a6e6c3

        SHA256

        25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

        SHA512

        5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

      • \Users\Admin\AppData\Local\Temp\is-D7OK7.tmp\_isetup\_shfoldr.dll

        Filesize

        22KB

        MD5

        92dc6ef532fbb4a5c3201469a5b5eb63

        SHA1

        3e89ff837147c16b4e41c30d6c796374e0b8e62c

        SHA256

        9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

        SHA512

        9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

      • \Users\Admin\AppData\Local\Temp\is-D7OK7.tmp\_isetup\_shfoldr.dll

        Filesize

        22KB

        MD5

        92dc6ef532fbb4a5c3201469a5b5eb63

        SHA1

        3e89ff837147c16b4e41c30d6c796374e0b8e62c

        SHA256

        9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

        SHA512

        9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

      • memory/1260-47-0x0000000002B10000-0x0000000002B11000-memory.dmp

        Filesize

        4KB

      • memory/2164-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2164-135-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2164-3356-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2164-1892-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2164-244-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2164-50-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2164-122-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2164-72-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2164-62-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2444-16-0x00000000001B0000-0x00000000001E4000-memory.dmp

        Filesize

        208KB

      • memory/2444-49-0x00000000001B0000-0x00000000001E4000-memory.dmp

        Filesize

        208KB

      • memory/2444-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2444-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2444-21-0x00000000001B0000-0x00000000001E4000-memory.dmp

        Filesize

        208KB

      • memory/2844-52-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/2844-30-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/2916-55-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2916-54-0x0000000000400000-0x00000000004B6000-memory.dmp

        Filesize

        728KB

      • memory/2916-38-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB