Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/08/2023, 17:06

General

  • Target

    9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe

  • Size

    271KB

  • MD5

    46e9e8be2076e9e00ccebef922ac66a8

  • SHA1

    de9f37c87d6fec9afba149cc25bc8f954104fabd

  • SHA256

    9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2

  • SHA512

    6df42bb3bf84b5456195351a51220dfd98c3522b78e68f7097a76d3e31d448c41a8f2720611b78f5a9ccec7d3929428b0fb47da942373300098ca1fd53da3988

  • SSDEEP

    6144:4VfjmNv6iC5/7Z7mEGiin0u9HJAxdrt10xdUy95WkLmzdWsQELvLf884rxJp1Vsu:i7+2lGp0Bk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3248
      • C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe
        "C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1228
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a79D3.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:408
          • C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe
            "C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe"
            4⤵
            • Executes dropped EXE
            PID:920
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4772
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2732
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3276

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              d6fa4af4febadf5acdb9e2307966c048

              SHA1

              d1d5f9269989f1975821acac49d89859faad0cf1

              SHA256

              c84003660b418a35570e293a333750259586e1b3ddec78893a7ccbd26d5c4589

              SHA512

              3397ca12c77bdc2ffc92ae0baeee21ba829123a6c0d033084ac021ff68abef4111a9f6c7fa2cf6664ebed7f03c9f6bff02f22cd923a6fa34120432e6bfec8b1a

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              484KB

              MD5

              f883faabece44d8bcb93cd2c92931171

              SHA1

              0905b65200740fb17de1de8ad7615e91ddf35cc9

              SHA256

              3cf10af220b5216f30f49c5e7a59bfde7bacd8b8dc0385b6d058db498d3919ca

              SHA512

              132a4cb505d795105dd1efa7d9002cbb7542756edbec2c631ec431543a85142d5fdec99380bf0fc354300f2f912524bf1aab3bb660492c69d0316b976509173e

            • C:\Users\Admin\AppData\Local\Temp\$$a79D3.bat

              Filesize

              722B

              MD5

              a571f303249069c6e7a6fae78c20ce60

              SHA1

              ab8518f4c6195d2c263b97941a6b29a9212477f6

              SHA256

              1185d2db5c542ef6e8ebb79f0fdb85b37ce374c9dae63f4a1de64a502c3e8257

              SHA512

              99579638e92069845c4af92d25495599c59f1c8985214a3e6cdd1bf9eaf14f06f4c14a2853dba21651278134ecda55cf34985d54dfae35868e09533697be9608

            • C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe

              Filesize

              245KB

              MD5

              f1e27bbd3a183c3c4021a792e651bb53

              SHA1

              9d7e96b9089584308a23773d4db2404b897c39fa

              SHA256

              65fb354d75fe5d709a58c2f4e2e7e88f01ef8fc5aff80191479def0630783336

              SHA512

              e7bc26c54b0dd190513b787e3d05ac4102e60997468f37c3db3e14e9fe338556635363ec5123a95aeb2513e184330a581b6ab4255d340b745c41e153b0e87203

            • C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe.exe

              Filesize

              245KB

              MD5

              f1e27bbd3a183c3c4021a792e651bb53

              SHA1

              9d7e96b9089584308a23773d4db2404b897c39fa

              SHA256

              65fb354d75fe5d709a58c2f4e2e7e88f01ef8fc5aff80191479def0630783336

              SHA512

              e7bc26c54b0dd190513b787e3d05ac4102e60997468f37c3db3e14e9fe338556635363ec5123a95aeb2513e184330a581b6ab4255d340b745c41e153b0e87203

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              1c43d4ba8e4a702f49c25855c29bba2d

              SHA1

              2571c4428b580e6afbbd2d7fb92bc0c180107d2a

              SHA256

              47f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140

              SHA512

              ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              1c43d4ba8e4a702f49c25855c29bba2d

              SHA1

              2571c4428b580e6afbbd2d7fb92bc0c180107d2a

              SHA256

              47f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140

              SHA512

              ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              1c43d4ba8e4a702f49c25855c29bba2d

              SHA1

              2571c4428b580e6afbbd2d7fb92bc0c180107d2a

              SHA256

              47f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140

              SHA512

              ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869

            • F:\$RECYCLE.BIN\S-1-5-21-618519468-4027732583-1827558364-1000\_desktop.ini

              Filesize

              9B

              MD5

              c0232c2f01c543d260713210da47a57b

              SHA1

              63f2c13c2c5c83091133c2802e69993d52e3ec65

              SHA256

              278e1b8fd3f40d95faaecf548098b8d9ee4b32e98a8878559c8c8dfcd5cd1197

              SHA512

              2ccfd67393a63f03f588296bb798d7a7d4ec2ea5d6ac486cb7bdf8a5a66b1df944d8b548f317e58bfe17dea2ae54e536ffe77bc11a43c931f3d10e299ab3fca0

            • memory/1228-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1228-12-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4772-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4772-26-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4772-32-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4772-37-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4772-41-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4772-350-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4772-1278-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4772-4201-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4772-9-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4772-4810-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB