Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 03:58

General

  • Target

    16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe

  • Size

    41KB

  • MD5

    4626379585dea573d8474c80c39d824b

  • SHA1

    6d35c00056b582d724da219e13f43757f4b6e899

  • SHA256

    16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f

  • SHA512

    3ed9f01a2558ecdb47cf1b38b9ca3693e6e14c0b78f21b848b98e05b71ad3f25f64255acb8c3c6476edf7c7e1f00add0c0c6d295cf72c11ea63efcef7850cbb6

  • SSDEEP

    768:pJq16GVRu1yK9fMnJG2V9dHS8HI64LMP1wy:pJM3SHuJV9NUtLMP1wy

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3228
      • C:\Users\Admin\AppData\Local\Temp\16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe
        "C:\Users\Admin\AppData\Local\Temp\16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4084
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6B1E.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3692
          • C:\Users\Admin\AppData\Local\Temp\16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe
            "C:\Users\Admin\AppData\Local\Temp\16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe"
            4⤵
            • Executes dropped EXE
            PID:3004
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1556
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4752
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1116

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              254KB

              MD5

              fc5abdf84041898d0611e82ddfaa681b

              SHA1

              67b2b2a3c516aa82e687958db8799fce47b4aea2

              SHA256

              69d8a39499c612c4083459232412b68bb4c0edd4382c85ec2568318acf16db1e

              SHA512

              5bae9da9c8096b81b4c3049cd87b0ed0dee318a4b1ef81f60b081e898b6e38b1f74e61533d54c01de17974888583a7105ebeff6bb1cb54b8db89dacf45e78059

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              487KB

              MD5

              0f1595b6fc556bdd2110c22655cc1442

              SHA1

              0e26079fedf000158e9aea69a672ed091ce7b474

              SHA256

              f014da38ac56c8da2ec98f1cbd38d1db7863836872c0e5140971540ff4612644

              SHA512

              3683d65316c08c1197a57f7df07c54a7f41e45e79c866eb7efc999793536e858cf91a35768f20dbc6f92362b5cc75c7926887e4422089f8c28eeef31a06d42b9

            • C:\Users\Admin\AppData\Local\Temp\$$a6B1E.bat

              Filesize

              722B

              MD5

              3021095ad4a8de5a5e70336e468a569e

              SHA1

              e907c5eb041b81f8148ba2afdf5effb47097c4e3

              SHA256

              8001b45a7aa95aab1b767384124ce73c2f7af7379950a77c48e89bd7bf94d92f

              SHA512

              d3ab4bad40b6f274857834edb826536597b4088d672f73e2af0ad879f42dbc540e4f5b87f89d55d51bc31c8fcd64adb9fb2adc55bdb893138faee011bd1fd4b4

            • C:\Users\Admin\AppData\Local\Temp\16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe

              Filesize

              12KB

              MD5

              e3484945f925f2100f56440166ace7ff

              SHA1

              0fd86b8f1e0f1e70ad1cda6ad16b4f7e8448e390

              SHA256

              9f53f8fc797015e9b5ae35c802c879ce7d45ca78c364d12a99b8d9167056dee9

              SHA512

              99bbe843ab970f2fc9b210c207d0e83711033c200f369be7f5fb20c97003710baa56daf206e2e4356d820ad8a49d58b97d8c1c2882ac34a399376d2cdb4c63a5

            • C:\Users\Admin\AppData\Local\Temp\16197c782fd800bed43b302000fe3f8a9e4f500bcbe5ecc83d63c396261bcc8f.exe.exe

              Filesize

              12KB

              MD5

              e3484945f925f2100f56440166ace7ff

              SHA1

              0fd86b8f1e0f1e70ad1cda6ad16b4f7e8448e390

              SHA256

              9f53f8fc797015e9b5ae35c802c879ce7d45ca78c364d12a99b8d9167056dee9

              SHA512

              99bbe843ab970f2fc9b210c207d0e83711033c200f369be7f5fb20c97003710baa56daf206e2e4356d820ad8a49d58b97d8c1c2882ac34a399376d2cdb4c63a5

            • C:\Windows\Logo1_.exe

              Filesize

              29KB

              MD5

              780759899c3b5324b5ee62b0d656f11a

              SHA1

              6e46823a92632b76dbe47f14553f631c391d00b9

              SHA256

              5c9a1e2526783e8a167c7bbcb2c57d459ca3640de6598dc7ad92934e1bfb1084

              SHA512

              041828e5fa86c07058869726160e95f8c630599fd3ebb3754a02e423d225339e2b533c3c10e00e1382503190a53aa127168314c1a4fe50736e7071437e7cc636

            • C:\Windows\Logo1_.exe

              Filesize

              29KB

              MD5

              780759899c3b5324b5ee62b0d656f11a

              SHA1

              6e46823a92632b76dbe47f14553f631c391d00b9

              SHA256

              5c9a1e2526783e8a167c7bbcb2c57d459ca3640de6598dc7ad92934e1bfb1084

              SHA512

              041828e5fa86c07058869726160e95f8c630599fd3ebb3754a02e423d225339e2b533c3c10e00e1382503190a53aa127168314c1a4fe50736e7071437e7cc636

            • C:\Windows\rundl132.exe

              Filesize

              29KB

              MD5

              780759899c3b5324b5ee62b0d656f11a

              SHA1

              6e46823a92632b76dbe47f14553f631c391d00b9

              SHA256

              5c9a1e2526783e8a167c7bbcb2c57d459ca3640de6598dc7ad92934e1bfb1084

              SHA512

              041828e5fa86c07058869726160e95f8c630599fd3ebb3754a02e423d225339e2b533c3c10e00e1382503190a53aa127168314c1a4fe50736e7071437e7cc636

            • F:\$RECYCLE.BIN\S-1-5-21-1043950675-1972537973-2972532878-1000\_desktop.ini

              Filesize

              9B

              MD5

              ec7139d5bb99bcebaf0b91c58a9ec5aa

              SHA1

              70404362dd74e309722fd282c3492ec95674123c

              SHA256

              eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

              SHA512

              b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

            • memory/1556-49-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1556-38-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1556-4832-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1556-3913-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1556-1290-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1556-214-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1556-8-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1556-53-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1556-27-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1556-42-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/3004-24-0x000000001B260000-0x000000001B268000-memory.dmp

              Filesize

              32KB

            • memory/3004-31-0x0000000000A90000-0x0000000000AA0000-memory.dmp

              Filesize

              64KB

            • memory/3004-18-0x0000000000310000-0x000000000031A000-memory.dmp

              Filesize

              40KB

            • memory/3004-30-0x0000000000A90000-0x0000000000AA0000-memory.dmp

              Filesize

              64KB

            • memory/3004-28-0x00007FFB54200000-0x00007FFB54BA1000-memory.dmp

              Filesize

              9.6MB

            • memory/3004-26-0x0000000000A90000-0x0000000000AA0000-memory.dmp

              Filesize

              64KB

            • memory/3004-19-0x00007FFB54200000-0x00007FFB54BA1000-memory.dmp

              Filesize

              9.6MB

            • memory/3004-23-0x000000001B1C0000-0x000000001B25C000-memory.dmp

              Filesize

              624KB

            • memory/3004-22-0x000000001B750000-0x000000001BC1E000-memory.dmp

              Filesize

              4.8MB

            • memory/3004-21-0x0000000000A90000-0x0000000000AA0000-memory.dmp

              Filesize

              64KB

            • memory/3004-20-0x00007FFB54200000-0x00007FFB54BA1000-memory.dmp

              Filesize

              9.6MB

            • memory/4084-0-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/4084-9-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB