Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2023, 15:24

General

  • Target

    5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe

  • Size

    553KB

  • MD5

    9e8d4831830ae5adf60857656659a9e7

  • SHA1

    9a5a9f255f26d32762429c76160cc4de7a7c2a3a

  • SHA256

    5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb

  • SHA512

    b652d17bd708beb75d1944666d4544f01dac89e2e787ba24608c31bbf61c8ed908420fae5a7a34b3ce6d083b179f0646969727bcee60890614da925224548025

  • SSDEEP

    6144:V9TuJbruuAVc13OKegKtK1nOEThioZsqmUfAf0J6eYKpWldq1Jg:b9a13OHgztjZ6yIq1m

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe
    "C:\Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\$$a4692.bat
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe
        "C:\Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe"
        3⤵
        • Executes dropped EXE
        PID:2740
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:2920
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1252

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        568f17750238ab463c745953a303648a

        SHA1

        25e9de37d6edb52c584c442e4f93a0448b4b37d4

        SHA256

        5351b82387339c78b116a077f2ba633da2a6fef86a165d92bfe28c2c3770ac81

        SHA512

        9034bc060e8155e07009d2142830f03b29c50525232fa1719038eae4fc742d460c5dad7b7fdd6957264c338072fbe71193a23d994510dc809ae240023b9f1ed3

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        474KB

        MD5

        82d95ff3c368229d3ecd547bfc2e95e4

        SHA1

        05c2c8065f243260792924168f85c614057119e8

        SHA256

        5fd8262ebaf159fa1ba5a2b80dad6f98477d1f549a651fc1a327f0dd207f2fdb

        SHA512

        27815b93d6070f7026c23ceac6210a78e694616d6a6a2012369b271e2d2ec986438f80dd3a29db4c4419b08084cb5a5914af216177669b86d8e2ae7184691699

      • C:\Users\Admin\AppData\Local\Temp\$$a4692.bat

        Filesize

        722B

        MD5

        99ed722be4da29df26574fad88bdc79d

        SHA1

        14c663e78ceaf22218a64be330f7120d97634d84

        SHA256

        cd4c19e5b7c63f2b6504d3a2a3afaa2e794c6348bb64bcd5acb5b5d7eb03b93c

        SHA512

        e4f40aa9b4064b6d3938b8a67bfb803d08caf925e77bfc22786ab8c5608b9ad77f5fa2d15eb18a38b3085e41fb921a518c163f1fc27ff33d143cdd02525d5d0b

      • C:\Users\Admin\AppData\Local\Temp\$$a4692.bat

        Filesize

        722B

        MD5

        99ed722be4da29df26574fad88bdc79d

        SHA1

        14c663e78ceaf22218a64be330f7120d97634d84

        SHA256

        cd4c19e5b7c63f2b6504d3a2a3afaa2e794c6348bb64bcd5acb5b5d7eb03b93c

        SHA512

        e4f40aa9b4064b6d3938b8a67bfb803d08caf925e77bfc22786ab8c5608b9ad77f5fa2d15eb18a38b3085e41fb921a518c163f1fc27ff33d143cdd02525d5d0b

      • C:\Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe

        Filesize

        524KB

        MD5

        7e082b8ab985d73267fa0ad76f12db93

        SHA1

        4dab44724431dc743aaac4762575e9d38084d55a

        SHA256

        227c925e1dafa0c48fbee542678064c6718124fd02a0b8f656987fe8646298ec

        SHA512

        f6286c1426f3ebde192a300822593a1c9fa6c26e09b5068b44630d10e1c33001bb42467a08f92c884a49dbdcff2cffe5721359ec044cb6b89c09c8622da65823

      • C:\Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe.exe

        Filesize

        524KB

        MD5

        7e082b8ab985d73267fa0ad76f12db93

        SHA1

        4dab44724431dc743aaac4762575e9d38084d55a

        SHA256

        227c925e1dafa0c48fbee542678064c6718124fd02a0b8f656987fe8646298ec

        SHA512

        f6286c1426f3ebde192a300822593a1c9fa6c26e09b5068b44630d10e1c33001bb42467a08f92c884a49dbdcff2cffe5721359ec044cb6b89c09c8622da65823

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        a0a84e76a495cbe3dd66615625e80be3

        SHA1

        e17712c6939d13dc78aa8306871ff685c9cf00b5

        SHA256

        908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d

        SHA512

        b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        a0a84e76a495cbe3dd66615625e80be3

        SHA1

        e17712c6939d13dc78aa8306871ff685c9cf00b5

        SHA256

        908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d

        SHA512

        b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        a0a84e76a495cbe3dd66615625e80be3

        SHA1

        e17712c6939d13dc78aa8306871ff685c9cf00b5

        SHA256

        908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d

        SHA512

        b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        a0a84e76a495cbe3dd66615625e80be3

        SHA1

        e17712c6939d13dc78aa8306871ff685c9cf00b5

        SHA256

        908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d

        SHA512

        b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2

      • F:\$RECYCLE.BIN\S-1-5-21-686452656-3203474025-4140627569-1000\_desktop.ini

        Filesize

        8B

        MD5

        621383aab05ec88688f5cce893e26550

        SHA1

        03967cdd69bd47cd2ccede557778546ef7c015eb

        SHA256

        0992c9b2d0872dece2ee570393745ccb6fbeadc2ded371a1f5406447aa872360

        SHA512

        085e0e3da3ad9ebb7b05ad58803f979ad4873337f91e4e0f209756ecf02b5050e33c3ad4a38212308e8beaf1f81625003f28bdc52d41cb2853e8f5a7eeb7a18b

      • \Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe

        Filesize

        524KB

        MD5

        7e082b8ab985d73267fa0ad76f12db93

        SHA1

        4dab44724431dc743aaac4762575e9d38084d55a

        SHA256

        227c925e1dafa0c48fbee542678064c6718124fd02a0b8f656987fe8646298ec

        SHA512

        f6286c1426f3ebde192a300822593a1c9fa6c26e09b5068b44630d10e1c33001bb42467a08f92c884a49dbdcff2cffe5721359ec044cb6b89c09c8622da65823

      • memory/1252-29-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

        Filesize

        4KB

      • memory/1868-42-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1868-34-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1868-21-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1868-48-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1868-94-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1868-101-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1868-156-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1868-1853-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1868-3313-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2436-33-0x0000000001B90000-0x0000000001BC6000-memory.dmp

        Filesize

        216KB

      • memory/2436-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2436-12-0x0000000001B90000-0x0000000001BC6000-memory.dmp

        Filesize

        216KB

      • memory/2436-16-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB