Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-08-2023 08:57

General

  • Target

    b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe

  • Size

    384KB

  • MD5

    05742fbc0a4036981dff8f7cf5a3b0e6

  • SHA1

    809a4562d77120cdd87fedea22b664f033f2acd7

  • SHA256

    b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62

  • SHA512

    8e282467ad8ba9e8d9363b01d40628f38352ea403e15652386719ee05c1792650bebc069eb57febab7f94813ab72eebd3bc04dddc793ce2f224d676b888d6b96

  • SSDEEP

    6144:JuJtBjQ2xL9L5e6j9MfpMQkjkPNWEXzVGBJh:I7L9L5GfpM7Y1VUJh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe
        "C:\Users\Admin\AppData\Local\Temp\b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3892
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a803C.bat
          3⤵
            PID:3652
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2268
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4720
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:1232

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          254KB

          MD5

          0b0dac311401ff1b6c3a092116a26c2b

          SHA1

          2a19d8ac6941b308707d87242033d4b628691daa

          SHA256

          3ad8d5c2568c0022db72b64c9ca050cb18165605f0ad597f53021955f36eae47

          SHA512

          a82a4a766b2a2d7badbc4d2de184031423ebe03fa73101b847085866d774386af5b69623c850150f5d36f45b3adfd53fccbdbe17a7041d01734ca8b0c24177d2

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          487KB

          MD5

          e393111b953db690bc71c65621e6b0f2

          SHA1

          41384b260c8990b1171807ad832f52f655a6c2ea

          SHA256

          2fd108149c3fb1168bf6490b50e216da5d9d910fafb40489ae666d023f506456

          SHA512

          8e491a859257fe5a3fa873e8f7fc61ef6238dd1dbc70080dafaf7fd3c97e01d410131edac41a29188c1bcc139b3893eabd50215bbffc32b0878bb0ab7f870bf5

        • C:\Users\Admin\AppData\Local\Temp\$$a803C.bat

          Filesize

          722B

          MD5

          5ca845355cbcb3d92bd2d5228d9120e0

          SHA1

          6059ffcfe6551929908838910510078544a30b2f

          SHA256

          59f1d1fea1b5d294774fdf84c325ab1c4b7064fcfa33276e090304ce945f53ce

          SHA512

          617bdf8ed1ccee5c3a74fc0f85be7964b98f1630e29a6f3a5995f5df587f59ea29059c5c22bb5c8c680cc2803fd2a7e8e920f6f6b7d474f678bf6f32f6576aff

        • C:\Users\Admin\AppData\Local\Temp\b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe.exe

          Filesize

          354KB

          MD5

          cea1ec5c3f5df72ffc043707ddc8f812

          SHA1

          9368633df5d61dc43ba034cc30e316e26f54b44f

          SHA256

          6ecda38015ea84688cf3a60baee335d0df6ca8806afc4e695c192f224c124da4

          SHA512

          fa239c447fc97fb9b037de254aa2f2d5e320b5b2da5bbdefeeaa13b37d361cc5718c9c93fe83fec15ec7a5a04284f8ef1a0ddc2c1fa49338e59cb0b5176adc2f

        • C:\Windows\Logo1_.exe

          Filesize

          29KB

          MD5

          d0a661a02bca60ec3c2b4435aaba7432

          SHA1

          8a6f7729f2323bcd99c9b5c5c960b3627c8bfd0e

          SHA256

          27bbde16b6b816535421e10e5b4ddcd11d679e740f2cc66707ddc5c7234829d0

          SHA512

          289a5b28c9ed0e83e2b1ed4230a24d1daae743e0e816e2f3de30eb3ecf6b4b65c6b44ecbc9e07d70f0057b4efec3138b8e398beb928afab11647443ac55887bb

        • C:\Windows\Logo1_.exe

          Filesize

          29KB

          MD5

          d0a661a02bca60ec3c2b4435aaba7432

          SHA1

          8a6f7729f2323bcd99c9b5c5c960b3627c8bfd0e

          SHA256

          27bbde16b6b816535421e10e5b4ddcd11d679e740f2cc66707ddc5c7234829d0

          SHA512

          289a5b28c9ed0e83e2b1ed4230a24d1daae743e0e816e2f3de30eb3ecf6b4b65c6b44ecbc9e07d70f0057b4efec3138b8e398beb928afab11647443ac55887bb

        • C:\Windows\rundl132.exe

          Filesize

          29KB

          MD5

          d0a661a02bca60ec3c2b4435aaba7432

          SHA1

          8a6f7729f2323bcd99c9b5c5c960b3627c8bfd0e

          SHA256

          27bbde16b6b816535421e10e5b4ddcd11d679e740f2cc66707ddc5c7234829d0

          SHA512

          289a5b28c9ed0e83e2b1ed4230a24d1daae743e0e816e2f3de30eb3ecf6b4b65c6b44ecbc9e07d70f0057b4efec3138b8e398beb928afab11647443ac55887bb

        • F:\$RECYCLE.BIN\S-1-5-21-3195054982-4292022746-1467505928-1000\_desktop.ini

          Filesize

          9B

          MD5

          c0232c2f01c543d260713210da47a57b

          SHA1

          63f2c13c2c5c83091133c2802e69993d52e3ec65

          SHA256

          278e1b8fd3f40d95faaecf548098b8d9ee4b32e98a8878559c8c8dfcd5cd1197

          SHA512

          2ccfd67393a63f03f588296bb798d7a7d4ec2ea5d6ac486cb7bdf8a5a66b1df944d8b548f317e58bfe17dea2ae54e536ffe77bc11a43c931f3d10e299ab3fca0

        • memory/2268-36-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2268-18-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2268-19-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2268-26-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2268-31-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2268-40-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2268-263-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2268-1277-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2268-4028-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2268-8-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2268-4819-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3892-0-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3892-9-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB