Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27/08/2023, 17:06

General

  • Target

    9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe

  • Size

    271KB

  • MD5

    46e9e8be2076e9e00ccebef922ac66a8

  • SHA1

    de9f37c87d6fec9afba149cc25bc8f954104fabd

  • SHA256

    9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2

  • SHA512

    6df42bb3bf84b5456195351a51220dfd98c3522b78e68f7097a76d3e31d448c41a8f2720611b78f5a9ccec7d3929428b0fb47da942373300098ca1fd53da3988

  • SSDEEP

    6144:4VfjmNv6iC5/7Z7mEGiin0u9HJAxdrt10xdUy95WkLmzdWsQELvLf884rxJp1Vsu:i7+2lGp0Bk

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe
        "C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a7F6D.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2092
          • C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe
            "C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe"
            4⤵
            • Executes dropped EXE
            PID:2904
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2860
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2900

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              d6fa4af4febadf5acdb9e2307966c048

              SHA1

              d1d5f9269989f1975821acac49d89859faad0cf1

              SHA256

              c84003660b418a35570e293a333750259586e1b3ddec78893a7ccbd26d5c4589

              SHA512

              3397ca12c77bdc2ffc92ae0baeee21ba829123a6c0d033084ac021ff68abef4111a9f6c7fa2cf6664ebed7f03c9f6bff02f22cd923a6fa34120432e6bfec8b1a

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              c6c8fde27f649c91ddaab8cb9ca344a6

              SHA1

              5e4865aec432a18107182f47edda176e8c566152

              SHA256

              32c3fed53bfc1d890e9bd1d771fdc7e2c81480e03f1425bce07b4045a192d100

              SHA512

              a8df7d1e852d871d7f16bae10c4ff049359583da88cc85a039f0298525839040d5363ce5ef4cbdb92a12a25785f73df83cf0df07752b78e6e6444f32160a2155

            • C:\Users\Admin\AppData\Local\Temp\$$a7F6D.bat

              Filesize

              722B

              MD5

              e175665202ef13d3b1838de375bf4b92

              SHA1

              078bd6b92d3a61da41af41c679b594b95dd0c369

              SHA256

              c7d5408853f7ccc5bd34316c1a106b52d26c42ce9cc21909024bb9673958a04c

              SHA512

              4865b1d0d82f1c7dcc53da8bdb35e9e850d7c2180111ae1148626824420b8e61296172a2b0ff0e82b5ca4981bc7921c8c8948b2d20763c736d21ce47b1f0064f

            • C:\Users\Admin\AppData\Local\Temp\$$a7F6D.bat

              Filesize

              722B

              MD5

              e175665202ef13d3b1838de375bf4b92

              SHA1

              078bd6b92d3a61da41af41c679b594b95dd0c369

              SHA256

              c7d5408853f7ccc5bd34316c1a106b52d26c42ce9cc21909024bb9673958a04c

              SHA512

              4865b1d0d82f1c7dcc53da8bdb35e9e850d7c2180111ae1148626824420b8e61296172a2b0ff0e82b5ca4981bc7921c8c8948b2d20763c736d21ce47b1f0064f

            • C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe

              Filesize

              245KB

              MD5

              f1e27bbd3a183c3c4021a792e651bb53

              SHA1

              9d7e96b9089584308a23773d4db2404b897c39fa

              SHA256

              65fb354d75fe5d709a58c2f4e2e7e88f01ef8fc5aff80191479def0630783336

              SHA512

              e7bc26c54b0dd190513b787e3d05ac4102e60997468f37c3db3e14e9fe338556635363ec5123a95aeb2513e184330a581b6ab4255d340b745c41e153b0e87203

            • C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe.exe

              Filesize

              245KB

              MD5

              f1e27bbd3a183c3c4021a792e651bb53

              SHA1

              9d7e96b9089584308a23773d4db2404b897c39fa

              SHA256

              65fb354d75fe5d709a58c2f4e2e7e88f01ef8fc5aff80191479def0630783336

              SHA512

              e7bc26c54b0dd190513b787e3d05ac4102e60997468f37c3db3e14e9fe338556635363ec5123a95aeb2513e184330a581b6ab4255d340b745c41e153b0e87203

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              1c43d4ba8e4a702f49c25855c29bba2d

              SHA1

              2571c4428b580e6afbbd2d7fb92bc0c180107d2a

              SHA256

              47f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140

              SHA512

              ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              1c43d4ba8e4a702f49c25855c29bba2d

              SHA1

              2571c4428b580e6afbbd2d7fb92bc0c180107d2a

              SHA256

              47f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140

              SHA512

              ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              1c43d4ba8e4a702f49c25855c29bba2d

              SHA1

              2571c4428b580e6afbbd2d7fb92bc0c180107d2a

              SHA256

              47f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140

              SHA512

              ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              1c43d4ba8e4a702f49c25855c29bba2d

              SHA1

              2571c4428b580e6afbbd2d7fb92bc0c180107d2a

              SHA256

              47f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140

              SHA512

              ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869

            • F:\$RECYCLE.BIN\S-1-5-21-4159544280-4273523227-683900707-1000\_desktop.ini

              Filesize

              9B

              MD5

              c0232c2f01c543d260713210da47a57b

              SHA1

              63f2c13c2c5c83091133c2802e69993d52e3ec65

              SHA256

              278e1b8fd3f40d95faaecf548098b8d9ee4b32e98a8878559c8c8dfcd5cd1197

              SHA512

              2ccfd67393a63f03f588296bb798d7a7d4ec2ea5d6ac486cb7bdf8a5a66b1df944d8b548f317e58bfe17dea2ae54e536ffe77bc11a43c931f3d10e299ab3fca0

            • \Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe

              Filesize

              245KB

              MD5

              f1e27bbd3a183c3c4021a792e651bb53

              SHA1

              9d7e96b9089584308a23773d4db2404b897c39fa

              SHA256

              65fb354d75fe5d709a58c2f4e2e7e88f01ef8fc5aff80191479def0630783336

              SHA512

              e7bc26c54b0dd190513b787e3d05ac4102e60997468f37c3db3e14e9fe338556635363ec5123a95aeb2513e184330a581b6ab4255d340b745c41e153b0e87203

            • memory/1200-29-0x0000000002DD0000-0x0000000002DD1000-memory.dmp

              Filesize

              4KB

            • memory/2272-12-0x0000000000280000-0x00000000002B4000-memory.dmp

              Filesize

              208KB

            • memory/2272-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2272-16-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2356-40-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2356-46-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2356-92-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2356-99-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2356-157-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2356-1852-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2356-32-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2356-3312-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2356-21-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB