Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-09-2023 09:21

General

  • Target

    3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe

  • Size

    1.2MB

  • MD5

    9b132130d596f1267c033e6836c6dae0

  • SHA1

    f79117f9afb7988bcf3dec3bedf7f630919986b3

  • SHA256

    3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438

  • SHA512

    a01b28c0e5f189e0483752b48f7d1cc92a216d96b682aa55ae5e7fcc745ad37331c3f628d0d913271ee48d0842abdc50aa226714fba460d3afe7fa3bdf4f8476

  • SSDEEP

    12288:bwuNTkUqw8FOw2uRpfd2PSKWcRn8FvhPkCBZg87KvQSqWy/SUfo3MA+nkzixGy3:b9Ww8Fh2uRpMPSJcx8FvdlgGCh8hfZGA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2568
      • C:\Users\Admin\AppData\Local\Temp\3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe
        "C:\Users\Admin\AppData\Local\Temp\3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4164
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5D72.bat
          3⤵
            PID:4116
            • C:\Users\Admin\AppData\Local\Temp\3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe
              "C:\Users\Admin\AppData\Local\Temp\3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe"
              4⤵
              • Executes dropped EXE
              PID:4328
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3636
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4428
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:1744

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          254KB

          MD5

          568f17750238ab463c745953a303648a

          SHA1

          25e9de37d6edb52c584c442e4f93a0448b4b37d4

          SHA256

          5351b82387339c78b116a077f2ba633da2a6fef86a165d92bfe28c2c3770ac81

          SHA512

          9034bc060e8155e07009d2142830f03b29c50525232fa1719038eae4fc742d460c5dad7b7fdd6957264c338072fbe71193a23d994510dc809ae240023b9f1ed3

        • C:\Program Files\ResetConvertTo.exe

          Filesize

          781KB

          MD5

          bcfb6bd2668a601a5970d0c2736774ba

          SHA1

          1f26d662ddd2aca57cc5426949770e0a9c64144d

          SHA256

          2c2ede4ad08c37fbfaff4ec777d657210df4534e51302956ed1a5ba06ab7c9f5

          SHA512

          33a6b9921ab62ccb2d7fc54c9fe3a3384740f5028f0964c82df8d103dda25ccaf2b45e7510c06b4bdc6a5bc0ec1c80f72261c9c32a88c0163a3d051725f305a2

        • C:\Users\Admin\AppData\Local\Temp\$$a5D72.bat

          Filesize

          722B

          MD5

          8d1487352cdb7ce195ce1f096b45dd04

          SHA1

          1737c862d47fa8b25df8dfc8d227aa525d1b5629

          SHA256

          472d71f98c00eaba1cc1aa55a8c151296b950ae586ef61b12385783f6166a269

          SHA512

          613ccb0d5c9fb8573eb42ef480c6b680e50e063dcc86c3d1fbde8dd19afd4fd59306117b2a7f8367cb2b7e983b283f53c1e7cdf6dafd964651415fac083676a1

        • C:\Users\Admin\AppData\Local\Temp\3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe

          Filesize

          1.2MB

          MD5

          a51cd5d5d0d731a48ff85bc636f6857c

          SHA1

          980018a6fbf1122e7d5fc5d5cdb01ae212d80b70

          SHA256

          92345a3ff8ee21ed4f830f4a581c8f385536c00e492f078f542d2f5e72229529

          SHA512

          04d7c8787c0f44fcc7d2fe4a10016c1b72f9356987148f9e133d6b8e438c60a16c0a931f00129f0cf3b80fe19c941f7445fe1240b9b1c8eb7e1636e7b25ac947

        • C:\Users\Admin\AppData\Local\Temp\3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe.exe

          Filesize

          1.2MB

          MD5

          a51cd5d5d0d731a48ff85bc636f6857c

          SHA1

          980018a6fbf1122e7d5fc5d5cdb01ae212d80b70

          SHA256

          92345a3ff8ee21ed4f830f4a581c8f385536c00e492f078f542d2f5e72229529

          SHA512

          04d7c8787c0f44fcc7d2fe4a10016c1b72f9356987148f9e133d6b8e438c60a16c0a931f00129f0cf3b80fe19c941f7445fe1240b9b1c8eb7e1636e7b25ac947

        • C:\Windows\Logo1_.exe

          Filesize

          29KB

          MD5

          a0a84e76a495cbe3dd66615625e80be3

          SHA1

          e17712c6939d13dc78aa8306871ff685c9cf00b5

          SHA256

          908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d

          SHA512

          b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2

        • C:\Windows\Logo1_.exe

          Filesize

          29KB

          MD5

          a0a84e76a495cbe3dd66615625e80be3

          SHA1

          e17712c6939d13dc78aa8306871ff685c9cf00b5

          SHA256

          908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d

          SHA512

          b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2

        • C:\Windows\rundl132.exe

          Filesize

          29KB

          MD5

          a0a84e76a495cbe3dd66615625e80be3

          SHA1

          e17712c6939d13dc78aa8306871ff685c9cf00b5

          SHA256

          908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d

          SHA512

          b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2

        • F:\$RECYCLE.BIN\S-1-5-21-1859779917-101786662-3680946609-1000\_desktop.ini

          Filesize

          8B

          MD5

          6bdc569e34ba772e6a02bf98e5269208

          SHA1

          d6e9053ccd9906f78c9f4dd12414246f31622d49

          SHA256

          a2f6c9ea9fb63e52c84ba26b60450f841bafcf7378af3f8310c32c86701dc148

          SHA512

          d25858c63ebf7077fbf1a96c3fbb6577cab1ebd3d133f6982672e6c721bebee655028a8f35292c1c3fc1d3d1a166256da32a54e3981c453fa0b30df3b2278ee0

        • memory/3636-32-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3636-19-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3636-26-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3636-37-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3636-41-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3636-407-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3636-1279-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3636-8-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3636-4645-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3636-4832-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4164-0-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4164-12-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB