Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27/08/2023, 10:50

General

  • Target

    12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe

  • Size

    324KB

  • MD5

    1f35593dde298a212efcba3306c9b68a

  • SHA1

    fafba4f5c116f38ea20402f74460c92261af1fe1

  • SHA256

    12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5

  • SHA512

    58e5ef5eb1f8c7c955a3cd652eaa7c8f42953d4b9f5dd4f2215ffee3f194b1e0aa8f543f50563f8d8d96b9f6b209d4144d564b87f37323a678b8fa4af50d44f8

  • SSDEEP

    6144:YVfjmNiuxCSgxJtz5lAUbLUfiakbNTBBbTRxcbEMMcDN7Y7tcqGn6R43/:C7+SxlXUfrkJTLbTRxW1Mcp7YJhGnb3/

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1276
      • C:\Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe
        "C:\Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a824A.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:800
          • C:\Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe
            "C:\Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe"
            4⤵
            • Executes dropped EXE
            PID:2736
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1528
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3004

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              b00440d6bd7b7056c3aed427243db648

              SHA1

              7f050fe9842b51432dc9dd8c6c6fd0bdc7e01d22

              SHA256

              4482a95202b4fdf65ff0eb2393263c0a279beb3b2daadfe5e5587d68d0d13531

              SHA512

              0faad1642e0074df2d6d19b36fdbd248bea2b34e770eaccc580ae69cdc39c1c6eb910966d0560225825ecc9d0fe482becb2266772c71d3f95c40967713031c07

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              4cfdb20b04aa239d6f9e83084d5d0a77

              SHA1

              f22863e04cc1fd4435f785993ede165bd8245ac6

              SHA256

              30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

              SHA512

              35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

            • C:\Users\Admin\AppData\Local\Temp\$$a824A.bat

              Filesize

              722B

              MD5

              0fe93e0f4105d5a94fc817fe889fa879

              SHA1

              7578f1b998245788022a06489ca5cd4f86109e48

              SHA256

              67454b09c7435aeb179271347cafe9b2149485432007416e29bb5b8e13007d93

              SHA512

              9342e428c2142164085174a3e9b095a74465b0544652af262b48d4798f28911277493bade4839cc8e38db0c78ba05ffccbd6ac6b0a72a00c3c92f8676cf127a6

            • C:\Users\Admin\AppData\Local\Temp\$$a824A.bat

              Filesize

              722B

              MD5

              0fe93e0f4105d5a94fc817fe889fa879

              SHA1

              7578f1b998245788022a06489ca5cd4f86109e48

              SHA256

              67454b09c7435aeb179271347cafe9b2149485432007416e29bb5b8e13007d93

              SHA512

              9342e428c2142164085174a3e9b095a74465b0544652af262b48d4798f28911277493bade4839cc8e38db0c78ba05ffccbd6ac6b0a72a00c3c92f8676cf127a6

            • C:\Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe

              Filesize

              298KB

              MD5

              4ff9b36894a7222a67cd8872ecce1596

              SHA1

              10c2688097d85d75116bbba019c141ed0c5bd540

              SHA256

              0baca8c2a891b818d3474ed09e2b6f474577e4fdcdb966c259c608840f04b39f

              SHA512

              475cec734952c44c9765978ed4727cc8a4fe3150494fd1bc60fb27e999d93829f6fb4f40ff1fcb2b2fd877e15092ec4e3cbfc1b37fc974beaea17ae7cc2cd07f

            • C:\Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe.exe

              Filesize

              298KB

              MD5

              4ff9b36894a7222a67cd8872ecce1596

              SHA1

              10c2688097d85d75116bbba019c141ed0c5bd540

              SHA256

              0baca8c2a891b818d3474ed09e2b6f474577e4fdcdb966c259c608840f04b39f

              SHA512

              475cec734952c44c9765978ed4727cc8a4fe3150494fd1bc60fb27e999d93829f6fb4f40ff1fcb2b2fd877e15092ec4e3cbfc1b37fc974beaea17ae7cc2cd07f

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              46e5336e3ad9242352c0c3d72b6efb6d

              SHA1

              d825c1883bafe2ac98918da291276dadd1a2f41f

              SHA256

              1acd6390b27823123eb5e7e86dbf654aed0cb37362c1e72dc768fa404aa628d3

              SHA512

              df93feae99900e6876df0b6e8cccf798ecbcb88267f76b3d4a9626c7ce400bcfc86b7d2838747087b7860f2eb254464f177be2e7386f4176cdf0f9e40e01c0a4

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              46e5336e3ad9242352c0c3d72b6efb6d

              SHA1

              d825c1883bafe2ac98918da291276dadd1a2f41f

              SHA256

              1acd6390b27823123eb5e7e86dbf654aed0cb37362c1e72dc768fa404aa628d3

              SHA512

              df93feae99900e6876df0b6e8cccf798ecbcb88267f76b3d4a9626c7ce400bcfc86b7d2838747087b7860f2eb254464f177be2e7386f4176cdf0f9e40e01c0a4

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              46e5336e3ad9242352c0c3d72b6efb6d

              SHA1

              d825c1883bafe2ac98918da291276dadd1a2f41f

              SHA256

              1acd6390b27823123eb5e7e86dbf654aed0cb37362c1e72dc768fa404aa628d3

              SHA512

              df93feae99900e6876df0b6e8cccf798ecbcb88267f76b3d4a9626c7ce400bcfc86b7d2838747087b7860f2eb254464f177be2e7386f4176cdf0f9e40e01c0a4

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              46e5336e3ad9242352c0c3d72b6efb6d

              SHA1

              d825c1883bafe2ac98918da291276dadd1a2f41f

              SHA256

              1acd6390b27823123eb5e7e86dbf654aed0cb37362c1e72dc768fa404aa628d3

              SHA512

              df93feae99900e6876df0b6e8cccf798ecbcb88267f76b3d4a9626c7ce400bcfc86b7d2838747087b7860f2eb254464f177be2e7386f4176cdf0f9e40e01c0a4

            • F:\$RECYCLE.BIN\S-1-5-21-3408354897-1169622894-3874090110-1000\_desktop.ini

              Filesize

              9B

              MD5

              c0232c2f01c543d260713210da47a57b

              SHA1

              63f2c13c2c5c83091133c2802e69993d52e3ec65

              SHA256

              278e1b8fd3f40d95faaecf548098b8d9ee4b32e98a8878559c8c8dfcd5cd1197

              SHA512

              2ccfd67393a63f03f588296bb798d7a7d4ec2ea5d6ac486cb7bdf8a5a66b1df944d8b548f317e58bfe17dea2ae54e536ffe77bc11a43c931f3d10e299ab3fca0

            • \Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe

              Filesize

              298KB

              MD5

              4ff9b36894a7222a67cd8872ecce1596

              SHA1

              10c2688097d85d75116bbba019c141ed0c5bd540

              SHA256

              0baca8c2a891b818d3474ed09e2b6f474577e4fdcdb966c259c608840f04b39f

              SHA512

              475cec734952c44c9765978ed4727cc8a4fe3150494fd1bc60fb27e999d93829f6fb4f40ff1fcb2b2fd877e15092ec4e3cbfc1b37fc974beaea17ae7cc2cd07f

            • memory/1276-30-0x00000000025B0000-0x00000000025B1000-memory.dmp

              Filesize

              4KB

            • memory/1448-21-0x00000000003B0000-0x00000000003E4000-memory.dmp

              Filesize

              208KB

            • memory/1448-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1448-15-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1448-20-0x00000000003B0000-0x00000000003E4000-memory.dmp

              Filesize

              208KB

            • memory/2848-22-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2848-32-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2848-40-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2848-46-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2848-93-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2848-99-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2848-174-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2848-1851-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2848-3311-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB