Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
29/08/2023, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe
Resource
win10v2004-20230703-en
General
-
Target
d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe
-
Size
29KB
-
MD5
b1a515735de819d35a407e5a134a528c
-
SHA1
f4ed54971045aabb7e9345e3c3a93b335e2fd719
-
SHA256
d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012
-
SHA512
5c5190cc87be23ccef165d66df6392e80b010cf4909cab8a8c7456eb2cc54d000d3cc8c287843999b59ffcdddade3362c00e6c13a110c04b9d7c60e8ba3bdc5d
-
SSDEEP
384:NbbP1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:pL16GVRu1yK9fMnJG2V9dHS8
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\K: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\H: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\Y: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\W: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\V: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\Q: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\P: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\E: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\S: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\O: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\G: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\Z: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\U: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\R: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\N: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\I: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\X: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\T: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\M: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened (read-only) \??\J: d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\Mozilla Firefox\browser\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Windows Media Player\setup_wm.exe d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1031\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\fr-FR\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\VideoLAN\VLC\locale\ia\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\en-US\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Bibliography\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe File created C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2200 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 28 PID 1708 wrote to memory of 2200 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 28 PID 1708 wrote to memory of 2200 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 28 PID 1708 wrote to memory of 2200 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 28 PID 2200 wrote to memory of 1944 2200 net.exe 30 PID 2200 wrote to memory of 1944 2200 net.exe 30 PID 2200 wrote to memory of 1944 2200 net.exe 30 PID 2200 wrote to memory of 1944 2200 net.exe 30 PID 1708 wrote to memory of 1328 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 6 PID 1708 wrote to memory of 1328 1708 d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe 6
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe"C:\Users\Admin\AppData\Local\Temp\d41706d5baa47b2e0ac2e901106411f092d704668498e75c5819da0069b24012.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1944
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5cd56a8930bdb4ea6727306f6d74a2f1f
SHA12a00734778b729723fdd2e5824173b5fb7542e84
SHA256cfab0105fa605a5dce73f9fe7e8746a6bb5e541e883f31019b2b3152ef242f42
SHA5128223902010a7e557da6432e0133feb7a4c342330dc421763746ff347762b89127a0b8d0ec1c342539078667eed011e94459d54ebe5b0a124486691acb9cc9439
-
Filesize
876KB
MD5b290d9f79f525fb3948a17d3b4459818
SHA1e1afcc226eeb830e6c6e60877cb87747adf83350
SHA256408bc80c28309189369e730d5ac387680a411b4c973fe1f8791bd6a0ba02fd61
SHA512625c111ae9c4072d289d5f4177702ded262cca196fdf6b1ae9b4a88cee54c36c3391dd5aa8834f629fafd22b50364e7c82662278d92430e3c9a052e58b94b0db
-
Filesize
9B
MD52326d479b287193a70f520700dc8d23e
SHA1afea66d3788a50debd6f5d4c9dd51f68a4477e64
SHA25695d41561a1467d20977f59108e85da181e0b4dfd3db9e40182ae7378c4a927f8
SHA512cb971c406ddf7147536a6a1569d4ff49d7219aa52cde5d110be1109874d66daace832d423d7969af9e6bbc9738a65734c7e68e994591b7677aad51fa0f52cf37