Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230824-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 23:21

General

  • Target

    030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe

  • Size

    138KB

  • MD5

    9b6a830d72a32c3b6d364120ff4d91b4

  • SHA1

    0267bafe4c16a02c92b6ec21146309ddffa805dc

  • SHA256

    030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455

  • SHA512

    11dd4a946ab2b41425ffb7f4af3bc473e65f892514ea64011ceb9577d6c4ae797b01b2c8ffc3e7ae72e73528267fe8c53046a2aa9a057c2cdd3202c16a93bf82

  • SSDEEP

    3072:IftffjmNcmZWXyaiedMbrN6pnoXPBsr5ZrR:YVfjmNcSNaPM4loo5Zd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3148
      • C:\Users\Admin\AppData\Local\Temp\030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe
        "C:\Users\Admin\AppData\Local\Temp\030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4564
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a460.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1620
          • C:\Users\Admin\AppData\Local\Temp\030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe
            "C:\Users\Admin\AppData\Local\Temp\030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe"
            4⤵
            • Executes dropped EXE
            PID:3492
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2352
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2960
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1408

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              95fe7d22989d731e00a79d55c4d76db6

              SHA1

              4501a8c7a996c576a4f03c6fe6aa3b8a2a28893b

              SHA256

              b44b445347f0c0c4c754a4c9f9cc2b1002e624142959bad3f0393ab2cdbdfed8

              SHA512

              dfe339302c55a71fe42f03d4c381442af52aec8d55bd93d9005a50939d743a731901ff613c47edb3a193da90b3fff30e70d1aa6136e3a8d3c81d45bed006908e

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              484KB

              MD5

              e4a3eb85cd8330582277b55607c0190c

              SHA1

              d233f39a9bbb953877ab51d1331bd0b7cf916c0f

              SHA256

              fae5bbff79207f3fa2cb34ca09b5ea399c64b4912f492f30e42faa763d9ec859

              SHA512

              cd7f355e2e4b9fc58f918d12265ed335686e324b9adf6a40c90b1ae1526abfc6b64b45aa1380a3cd38cf7a0a7492cdd1265c5df8f03d82072d17180a3d6f7326

            • C:\Users\Admin\AppData\Local\Temp\$$a460.bat

              Filesize

              721B

              MD5

              9aa4dce2c65e59e0716d4dae924b85e0

              SHA1

              72c20687e811d14f3f19076294bea97992b8daa4

              SHA256

              42b324ecdc15f5906d540c4a3660b07991039f63aff7b7c734d8ef3626c95b8a

              SHA512

              803f7114e33495cdd548928960e718fcd65cb48d3db9f3077951c2f96b184c094c79dc4640c1a126d26dbca32731f95d7c59cd64b838c3d34a4deaecd2f5c170

            • C:\Users\Admin\AppData\Local\Temp\030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe

              Filesize

              112KB

              MD5

              e9cc8c20b0e682c77b97e6787de16e5d

              SHA1

              8be674dec4fcf14ae853a5c20a9288bff3e0520a

              SHA256

              ef854d21cbf297ee267f22049b773ffeb4c1ff1a3e55227cc2a260754699d644

              SHA512

              1a3b9b2d16a4404b29675ab1132ad542840058fd356e0f145afe5d0c1d9e1653de28314cd24406b85f09a9ec874c4339967d9e7acb327065448096c5734502c7

            • C:\Users\Admin\AppData\Local\Temp\030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe.exe

              Filesize

              112KB

              MD5

              e9cc8c20b0e682c77b97e6787de16e5d

              SHA1

              8be674dec4fcf14ae853a5c20a9288bff3e0520a

              SHA256

              ef854d21cbf297ee267f22049b773ffeb4c1ff1a3e55227cc2a260754699d644

              SHA512

              1a3b9b2d16a4404b29675ab1132ad542840058fd356e0f145afe5d0c1d9e1653de28314cd24406b85f09a9ec874c4339967d9e7acb327065448096c5734502c7

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              4c87b635843dc2ee1f35839d6e93e070

              SHA1

              5711bc3684f6c4e6771841d16bc11c6ccdcc17b9

              SHA256

              40574ace535eb8f57606fef5bc59f24af911b86a3c59c01b150979ddb78d881a

              SHA512

              d13d127dcd103a5343c470aa44bb99136ee317e80ac0e3a394416db7503e894b1e8b0e9cee15e2b38a3e29ad036856a30f2e2b373152b56e3071844b581f2587

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              4c87b635843dc2ee1f35839d6e93e070

              SHA1

              5711bc3684f6c4e6771841d16bc11c6ccdcc17b9

              SHA256

              40574ace535eb8f57606fef5bc59f24af911b86a3c59c01b150979ddb78d881a

              SHA512

              d13d127dcd103a5343c470aa44bb99136ee317e80ac0e3a394416db7503e894b1e8b0e9cee15e2b38a3e29ad036856a30f2e2b373152b56e3071844b581f2587

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              4c87b635843dc2ee1f35839d6e93e070

              SHA1

              5711bc3684f6c4e6771841d16bc11c6ccdcc17b9

              SHA256

              40574ace535eb8f57606fef5bc59f24af911b86a3c59c01b150979ddb78d881a

              SHA512

              d13d127dcd103a5343c470aa44bb99136ee317e80ac0e3a394416db7503e894b1e8b0e9cee15e2b38a3e29ad036856a30f2e2b373152b56e3071844b581f2587

            • F:\$RECYCLE.BIN\S-1-5-21-642304425-1816607141-2958861556-1000\_desktop.ini

              Filesize

              9B

              MD5

              ec7139d5bb99bcebaf0b91c58a9ec5aa

              SHA1

              70404362dd74e309722fd282c3492ec95674123c

              SHA256

              eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

              SHA512

              b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

            • memory/2352-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2352-26-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2352-32-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2352-37-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2352-41-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2352-122-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2352-1278-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2352-2239-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2352-8-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2352-4810-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4564-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4564-10-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB