Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-08-2023 10:23

General

  • Target

    43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe

  • Size

    175KB

  • MD5

    f302f54a69d60917e528f8dc434212dc

  • SHA1

    86d7b44964fc2ce182df334514f4218861248dfb

  • SHA256

    43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633

  • SHA512

    9a269ec1c5eacc980e5e087b61a6d23f2f42aeb2cdab6e05e9ba84ab9443761d305bbf9b67ffd5041818438b53404e84789ccaa72a0c5dee73c9dac42b451f5d

  • SSDEEP

    3072:TakuJVFoTEUC+VxP6eZgxhmWcCRaWoOWo666dn0ixm5lHB1ufdu:LuJXkfb/x+62iQ5la0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3256
      • C:\Users\Admin\AppData\Local\Temp\43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe
        "C:\Users\Admin\AppData\Local\Temp\43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:460
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6A72.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4812
          • C:\Users\Admin\AppData\Local\Temp\43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe
            "C:\Users\Admin\AppData\Local\Temp\43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe"
            4⤵
            • Executes dropped EXE
            PID:4748
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:420
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4860
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:852

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        8e7d72af16d480995008ce9377ad763d

        SHA1

        2c87ec754a40eee2b7c74e255e2f16974575e416

        SHA256

        83106696096c3ef4d0c2d7c3b4012a35d07267ad415a8d67500cc78c0ed6a76e

        SHA512

        fe8b1696715c085afad5a7d27a44b6ead31c09ea8eb7003b76759344ac8a3ae642527ede0629030bbd0d591bfa9aa96ec75badf2bae5943fba0600b62c1c3347

      • C:\Program Files\TraceReceive.exe

        Filesize

        1.5MB

        MD5

        b7890c0f82843dd39428315d588ce3a4

        SHA1

        900ad5209b4bdaa3c6f3002ed5fc0aa4b65c861c

        SHA256

        7b8f66bc31ca2de8966f7224676677619c35bf431ba8c92e1e39ed644a4aec77

        SHA512

        779611413aeae1c7a5397c36b47d19a89661a432241226debc4706b159da03f6a98d85a20378cb5e160c683b139005bca8dee424d0ac1fbb38675e6aeec5ae74

      • C:\Users\Admin\AppData\Local\Temp\$$a6A72.bat

        Filesize

        722B

        MD5

        93dd528a87a95efa9c2b16351e8217d5

        SHA1

        e13be405c066e02646ab47710b94a3b9f5b2b7c7

        SHA256

        c76e02ecf543c839f55e30ad5eafd2353597dc23acce2098ac3ef0f8b69a2cd4

        SHA512

        b2965ed2f9debd095f9e236628f642b84c26d107f89ac81b097075d033ff4c2351fadc6942873487cab16cbaee0cb300a5c33e7b52dff065dbba85a1c9408872

      • C:\Users\Admin\AppData\Local\Temp\43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe

        Filesize

        145KB

        MD5

        5b5c1a1d36299bf0a652c2cd9a1604f7

        SHA1

        7a8c26531e37e7438566def064dda378e05666d8

        SHA256

        d69e8350dff47b787ad6b2e0cabf9c0e8e96f8804f0e5013986d949c790c4838

        SHA512

        bce1ffa8e9856e7381541b20a912904b11c9134a194ec870e201473f81fe09aa69f25e93bc45bd528da1245bf25b6959dd593d9e4d2376b27047a76b0602e3d5

      • C:\Users\Admin\AppData\Local\Temp\43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe.exe

        Filesize

        145KB

        MD5

        5b5c1a1d36299bf0a652c2cd9a1604f7

        SHA1

        7a8c26531e37e7438566def064dda378e05666d8

        SHA256

        d69e8350dff47b787ad6b2e0cabf9c0e8e96f8804f0e5013986d949c790c4838

        SHA512

        bce1ffa8e9856e7381541b20a912904b11c9134a194ec870e201473f81fe09aa69f25e93bc45bd528da1245bf25b6959dd593d9e4d2376b27047a76b0602e3d5

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        9f43fcf648cb02979e3b0637244cb859

        SHA1

        8fc35471aaf5616c83e4f0c42845556cbf91cc6d

        SHA256

        93f34122cf461251d57040bdbd558d4bcb787e28bdbdbed0982d87c01f7b5f81

        SHA512

        9335f837ffbe8a5b0973003606c19744ff6e52c2b46fab7e2d908eda772a1c824d0f393c8164d438c5e01b2f712f698b0ea36a7e5307f06e812083c480781a5e

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        9f43fcf648cb02979e3b0637244cb859

        SHA1

        8fc35471aaf5616c83e4f0c42845556cbf91cc6d

        SHA256

        93f34122cf461251d57040bdbd558d4bcb787e28bdbdbed0982d87c01f7b5f81

        SHA512

        9335f837ffbe8a5b0973003606c19744ff6e52c2b46fab7e2d908eda772a1c824d0f393c8164d438c5e01b2f712f698b0ea36a7e5307f06e812083c480781a5e

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        9f43fcf648cb02979e3b0637244cb859

        SHA1

        8fc35471aaf5616c83e4f0c42845556cbf91cc6d

        SHA256

        93f34122cf461251d57040bdbd558d4bcb787e28bdbdbed0982d87c01f7b5f81

        SHA512

        9335f837ffbe8a5b0973003606c19744ff6e52c2b46fab7e2d908eda772a1c824d0f393c8164d438c5e01b2f712f698b0ea36a7e5307f06e812083c480781a5e

      • F:\$RECYCLE.BIN\S-1-5-21-1043950675-1972537973-2972532878-1000\_desktop.ini

        Filesize

        9B

        MD5

        ec7139d5bb99bcebaf0b91c58a9ec5aa

        SHA1

        70404362dd74e309722fd282c3492ec95674123c

        SHA256

        eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

        SHA512

        b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

      • memory/420-37-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/420-19-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/420-26-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/420-32-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/420-41-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/420-307-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/420-1279-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/420-4264-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/420-9-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/420-4821-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/460-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/460-10-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB