Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2023 01:15

General

  • Target

    88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe

  • Size

    809KB

  • MD5

    c59ae4b7ceb4027f0723183c4b884d1f

  • SHA1

    4d08ac5c2000032f4037e581b38d56afa409be8d

  • SHA256

    88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d

  • SHA512

    9e1438a141daae9b28a78928993b446638f35a24bc490caf553e0b0e159c8146833342164dbbc1b4c6f296026fd715eaff5b6da3ca7846a29604c0399698221e

  • SSDEEP

    3072:aftffjmNr50PC1gFD8Xnie/zKPMtsZX+H7Zu1uDrnBFEJQ/UG:aVfjmNd3i8X7pt4Oti0BWm

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1352
      • C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe
        "C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a9482.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2780
          • C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe
            "C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2916
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 36
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:2932
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2828
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2892
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2716

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        7eec1334df94acedeb12513ecae38231

        SHA1

        d3b7676b50a5611d1470dea62e2179e3a10cb1fb

        SHA256

        5e4533676d931793e2dde85d9a069d7117edf4761e174219493f5255d405f038

        SHA512

        160dda7a803e3a5a856d7b0ef78eae75b8050f2cd031d70cccdaec51fffdc15f79b8ed1f73e539359dbbaa899b5fdc75780006b9cdc576110f3ef150a5352469

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a9482.bat

        Filesize

        722B

        MD5

        8174b9a7534faa67ad678e58c720f419

        SHA1

        8561454af9a07150832082a1d7292a2814cfbb55

        SHA256

        9e43b3c552b07c1fdac2d966d1d7154225fe2c5a899e42937c8d90a9af4a17e2

        SHA512

        d97485488ab00e0aee75081dd349c7c519bf656f110f5e42210a14c8ecaa355e6cef121f5da939159ca41575402d76b4814c31a704bde90daf7bf9b6c93eaa09

      • C:\Users\Admin\AppData\Local\Temp\$$a9482.bat

        Filesize

        722B

        MD5

        8174b9a7534faa67ad678e58c720f419

        SHA1

        8561454af9a07150832082a1d7292a2814cfbb55

        SHA256

        9e43b3c552b07c1fdac2d966d1d7154225fe2c5a899e42937c8d90a9af4a17e2

        SHA512

        d97485488ab00e0aee75081dd349c7c519bf656f110f5e42210a14c8ecaa355e6cef121f5da939159ca41575402d76b4814c31a704bde90daf7bf9b6c93eaa09

      • C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe

        Filesize

        782KB

        MD5

        a033be21d106286ae2bc02e16ac9abf6

        SHA1

        a784c23826e33aaa80f1129ddde22549a4de04df

        SHA256

        bf7d4777c2282c85e0a71d8e1a53569711a50a1fa2d9dee05c3784cf2558ae50

        SHA512

        f3ba71b8673f74fc47381fe5a846eb145428ae7dd657f7196489b240eccbf42c4777130336f043fa1ea1348d9f008ef461819518250328fbd9a075918dac2583

      • C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe.exe

        Filesize

        782KB

        MD5

        a033be21d106286ae2bc02e16ac9abf6

        SHA1

        a784c23826e33aaa80f1129ddde22549a4de04df

        SHA256

        bf7d4777c2282c85e0a71d8e1a53569711a50a1fa2d9dee05c3784cf2558ae50

        SHA512

        f3ba71b8673f74fc47381fe5a846eb145428ae7dd657f7196489b240eccbf42c4777130336f043fa1ea1348d9f008ef461819518250328fbd9a075918dac2583

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c8d2b0c724ddd6b09cef9ca32d60e4b4

        SHA1

        926f1f2dfd17610c86ace2cad82f8c9177e1ac0d

        SHA256

        b2f4119c8742c3540498c62caa7a2a81579400ecde7b4d95c0021a76c7809d4e

        SHA512

        88eda91c0f53ee75bcdef0b293063e3dba9a2d8a173f4eaf94ad0f63e6ca289e7254c7c60ee903c0db1fc2aaa37ceab943c8150249130299676e40a94a3d0ea3

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c8d2b0c724ddd6b09cef9ca32d60e4b4

        SHA1

        926f1f2dfd17610c86ace2cad82f8c9177e1ac0d

        SHA256

        b2f4119c8742c3540498c62caa7a2a81579400ecde7b4d95c0021a76c7809d4e

        SHA512

        88eda91c0f53ee75bcdef0b293063e3dba9a2d8a173f4eaf94ad0f63e6ca289e7254c7c60ee903c0db1fc2aaa37ceab943c8150249130299676e40a94a3d0ea3

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c8d2b0c724ddd6b09cef9ca32d60e4b4

        SHA1

        926f1f2dfd17610c86ace2cad82f8c9177e1ac0d

        SHA256

        b2f4119c8742c3540498c62caa7a2a81579400ecde7b4d95c0021a76c7809d4e

        SHA512

        88eda91c0f53ee75bcdef0b293063e3dba9a2d8a173f4eaf94ad0f63e6ca289e7254c7c60ee903c0db1fc2aaa37ceab943c8150249130299676e40a94a3d0ea3

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        c8d2b0c724ddd6b09cef9ca32d60e4b4

        SHA1

        926f1f2dfd17610c86ace2cad82f8c9177e1ac0d

        SHA256

        b2f4119c8742c3540498c62caa7a2a81579400ecde7b4d95c0021a76c7809d4e

        SHA512

        88eda91c0f53ee75bcdef0b293063e3dba9a2d8a173f4eaf94ad0f63e6ca289e7254c7c60ee903c0db1fc2aaa37ceab943c8150249130299676e40a94a3d0ea3

      • F:\$RECYCLE.BIN\S-1-5-21-722410544-1258951091-1992882075-1000\_desktop.ini

        Filesize

        9B

        MD5

        ec7139d5bb99bcebaf0b91c58a9ec5aa

        SHA1

        70404362dd74e309722fd282c3492ec95674123c

        SHA256

        eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

        SHA512

        b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

      • \Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe

        Filesize

        782KB

        MD5

        a033be21d106286ae2bc02e16ac9abf6

        SHA1

        a784c23826e33aaa80f1129ddde22549a4de04df

        SHA256

        bf7d4777c2282c85e0a71d8e1a53569711a50a1fa2d9dee05c3784cf2558ae50

        SHA512

        f3ba71b8673f74fc47381fe5a846eb145428ae7dd657f7196489b240eccbf42c4777130336f043fa1ea1348d9f008ef461819518250328fbd9a075918dac2583

      • \Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe

        Filesize

        782KB

        MD5

        a033be21d106286ae2bc02e16ac9abf6

        SHA1

        a784c23826e33aaa80f1129ddde22549a4de04df

        SHA256

        bf7d4777c2282c85e0a71d8e1a53569711a50a1fa2d9dee05c3784cf2558ae50

        SHA512

        f3ba71b8673f74fc47381fe5a846eb145428ae7dd657f7196489b240eccbf42c4777130336f043fa1ea1348d9f008ef461819518250328fbd9a075918dac2583

      • \Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe

        Filesize

        782KB

        MD5

        a033be21d106286ae2bc02e16ac9abf6

        SHA1

        a784c23826e33aaa80f1129ddde22549a4de04df

        SHA256

        bf7d4777c2282c85e0a71d8e1a53569711a50a1fa2d9dee05c3784cf2558ae50

        SHA512

        f3ba71b8673f74fc47381fe5a846eb145428ae7dd657f7196489b240eccbf42c4777130336f043fa1ea1348d9f008ef461819518250328fbd9a075918dac2583

      • \Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe

        Filesize

        782KB

        MD5

        a033be21d106286ae2bc02e16ac9abf6

        SHA1

        a784c23826e33aaa80f1129ddde22549a4de04df

        SHA256

        bf7d4777c2282c85e0a71d8e1a53569711a50a1fa2d9dee05c3784cf2558ae50

        SHA512

        f3ba71b8673f74fc47381fe5a846eb145428ae7dd657f7196489b240eccbf42c4777130336f043fa1ea1348d9f008ef461819518250328fbd9a075918dac2583

      • \Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe

        Filesize

        782KB

        MD5

        a033be21d106286ae2bc02e16ac9abf6

        SHA1

        a784c23826e33aaa80f1129ddde22549a4de04df

        SHA256

        bf7d4777c2282c85e0a71d8e1a53569711a50a1fa2d9dee05c3784cf2558ae50

        SHA512

        f3ba71b8673f74fc47381fe5a846eb145428ae7dd657f7196489b240eccbf42c4777130336f043fa1ea1348d9f008ef461819518250328fbd9a075918dac2583

      • \Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe

        Filesize

        782KB

        MD5

        a033be21d106286ae2bc02e16ac9abf6

        SHA1

        a784c23826e33aaa80f1129ddde22549a4de04df

        SHA256

        bf7d4777c2282c85e0a71d8e1a53569711a50a1fa2d9dee05c3784cf2558ae50

        SHA512

        f3ba71b8673f74fc47381fe5a846eb145428ae7dd657f7196489b240eccbf42c4777130336f043fa1ea1348d9f008ef461819518250328fbd9a075918dac2583

      • memory/1352-37-0x00000000026E0000-0x00000000026E1000-memory.dmp

        Filesize

        4KB

      • memory/1948-20-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/1948-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1948-39-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/1948-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2780-27-0x0000000001FA0000-0x00000000020D3000-memory.dmp

        Filesize

        1.2MB

      • memory/2780-30-0x0000000001FA0000-0x00000000020D3000-memory.dmp

        Filesize

        1.2MB

      • memory/2828-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2828-49-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2828-55-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2828-100-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2828-107-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2828-1859-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2828-40-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2828-3319-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2916-31-0x0000000000400000-0x0000000000533000-memory.dmp

        Filesize

        1.2MB