Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-08-2023 01:15

General

  • Target

    88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe

  • Size

    809KB

  • MD5

    c59ae4b7ceb4027f0723183c4b884d1f

  • SHA1

    4d08ac5c2000032f4037e581b38d56afa409be8d

  • SHA256

    88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d

  • SHA512

    9e1438a141daae9b28a78928993b446638f35a24bc490caf553e0b0e159c8146833342164dbbc1b4c6f296026fd715eaff5b6da3ca7846a29604c0399698221e

  • SSDEEP

    3072:aftffjmNr50PC1gFD8Xnie/zKPMtsZX+H7Zu1uDrnBFEJQ/UG:aVfjmNd3i8X7pt4Oti0BWm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3208
      • C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe
        "C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:852
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a86D3.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3492
          • C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe
            "C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe"
            4⤵
            • Executes dropped EXE
            PID:3504
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 188
              5⤵
              • Program crash
              PID:4196
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4416
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2932
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1180
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3504 -ip 3504
        1⤵
          PID:4252

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          251KB

          MD5

          7eec1334df94acedeb12513ecae38231

          SHA1

          d3b7676b50a5611d1470dea62e2179e3a10cb1fb

          SHA256

          5e4533676d931793e2dde85d9a069d7117edf4761e174219493f5255d405f038

          SHA512

          160dda7a803e3a5a856d7b0ef78eae75b8050f2cd031d70cccdaec51fffdc15f79b8ed1f73e539359dbbaa899b5fdc75780006b9cdc576110f3ef150a5352469

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          484KB

          MD5

          a687a1d30bd2ec9c24536a5eefb146ad

          SHA1

          cf4e28c4a8469d10d0216ac02de7b970950be1ae

          SHA256

          b543de2bb907a73ad36fd6c94ccb6c8b1d0ba43c0ad6a40b0c72a7e710e3cdb7

          SHA512

          34675b4733ee3b5e76b6cb1724087e46dced61e04623ddd244e4b852ecc78c3c149c127d4450abb8d2f3dd6743d66348f44b05cc054db67ad2c944a3de4686c3

        • C:\Users\Admin\AppData\Local\Temp\$$a86D3.bat

          Filesize

          722B

          MD5

          29df8abed9dd7f028aa3a76e738e9d5b

          SHA1

          77f9c4c5c2eaa23ee0ddc667d6fd1d8b3f14b6a1

          SHA256

          c27942401d3979acc2e4a2be9b7e04628dde804d516583437104afcd217be877

          SHA512

          c9c3bad8a7a0cc51d645b0a6778f50e28fd750ce2b61011ecddc20a2677c99b127712871b792f4e58d1e4065fc3b93282ab77c4f3c2a3db8ed116f94d4c49a43

        • C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe

          Filesize

          782KB

          MD5

          a033be21d106286ae2bc02e16ac9abf6

          SHA1

          a784c23826e33aaa80f1129ddde22549a4de04df

          SHA256

          bf7d4777c2282c85e0a71d8e1a53569711a50a1fa2d9dee05c3784cf2558ae50

          SHA512

          f3ba71b8673f74fc47381fe5a846eb145428ae7dd657f7196489b240eccbf42c4777130336f043fa1ea1348d9f008ef461819518250328fbd9a075918dac2583

        • C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe.exe

          Filesize

          782KB

          MD5

          a033be21d106286ae2bc02e16ac9abf6

          SHA1

          a784c23826e33aaa80f1129ddde22549a4de04df

          SHA256

          bf7d4777c2282c85e0a71d8e1a53569711a50a1fa2d9dee05c3784cf2558ae50

          SHA512

          f3ba71b8673f74fc47381fe5a846eb145428ae7dd657f7196489b240eccbf42c4777130336f043fa1ea1348d9f008ef461819518250328fbd9a075918dac2583

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          c8d2b0c724ddd6b09cef9ca32d60e4b4

          SHA1

          926f1f2dfd17610c86ace2cad82f8c9177e1ac0d

          SHA256

          b2f4119c8742c3540498c62caa7a2a81579400ecde7b4d95c0021a76c7809d4e

          SHA512

          88eda91c0f53ee75bcdef0b293063e3dba9a2d8a173f4eaf94ad0f63e6ca289e7254c7c60ee903c0db1fc2aaa37ceab943c8150249130299676e40a94a3d0ea3

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          c8d2b0c724ddd6b09cef9ca32d60e4b4

          SHA1

          926f1f2dfd17610c86ace2cad82f8c9177e1ac0d

          SHA256

          b2f4119c8742c3540498c62caa7a2a81579400ecde7b4d95c0021a76c7809d4e

          SHA512

          88eda91c0f53ee75bcdef0b293063e3dba9a2d8a173f4eaf94ad0f63e6ca289e7254c7c60ee903c0db1fc2aaa37ceab943c8150249130299676e40a94a3d0ea3

        • C:\Windows\rundl132.exe

          Filesize

          26KB

          MD5

          c8d2b0c724ddd6b09cef9ca32d60e4b4

          SHA1

          926f1f2dfd17610c86ace2cad82f8c9177e1ac0d

          SHA256

          b2f4119c8742c3540498c62caa7a2a81579400ecde7b4d95c0021a76c7809d4e

          SHA512

          88eda91c0f53ee75bcdef0b293063e3dba9a2d8a173f4eaf94ad0f63e6ca289e7254c7c60ee903c0db1fc2aaa37ceab943c8150249130299676e40a94a3d0ea3

        • F:\$RECYCLE.BIN\S-1-5-21-3011986978-2180659500-3669311805-1000\_desktop.ini

          Filesize

          9B

          MD5

          ec7139d5bb99bcebaf0b91c58a9ec5aa

          SHA1

          70404362dd74e309722fd282c3492ec95674123c

          SHA256

          eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

          SHA512

          b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

        • memory/852-10-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/852-0-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3504-18-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/4416-20-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4416-35-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4416-38-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4416-40-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4416-43-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4416-28-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4416-166-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4416-1280-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4416-8-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4416-4533-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4416-4833-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB