Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2023, 18:54

General

  • Target

    2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe

  • Size

    606KB

  • MD5

    e3bc9ccc7644df0190adfa8d206f2b38

  • SHA1

    d33437f0c31f12e0ff0f0cfdd93241540ab6e7fd

  • SHA256

    2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671

  • SHA512

    29152ead9da272cd479d0c843def4e403cf72e5db4281b1d00bfa9aa0fc5e740eb201c247a06293a6bc5921c2048e60c9490ea7a4ab0b1d1505988167649e368

  • SSDEEP

    12288:/p7++i4yNmAvR0DHyBtuiFZe5CnPUI+vfvE6XuFb+m5cPYqYP6aOvSDaI5q:B7Xi4ysMqXuFb+8cPY1P6acSDaP

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe
        "C:\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a4328.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3008
          • C:\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe
            "C:\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe"
            4⤵
            • Executes dropped EXE
            PID:2764
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2464
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2184
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2832

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              6f8e136610aea78787b73d5e33dc69c8

              SHA1

              a5f2ce0d239bdedbcc203e4d2313cf2eba32901b

              SHA256

              b0af8b222c36a83ae08bed1817cb525cf17fb1c42ae0dbe23226fab5419e6610

              SHA512

              b6f5a3e8b9e7a0ec957a34dc485696b33a951fc9afb96c943ad33b6b4f6bd0a3a60944e7b0bac8e8b2d301ef79aed7cbf1f2e3196cdb2fbf874fdd3540a11ac1

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              4cfdb20b04aa239d6f9e83084d5d0a77

              SHA1

              f22863e04cc1fd4435f785993ede165bd8245ac6

              SHA256

              30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

              SHA512

              35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

            • C:\Users\Admin\AppData\Local\Temp\$$a4328.bat

              Filesize

              722B

              MD5

              eefd8db96f75cdf64ba7ed0f624b08de

              SHA1

              5394059ac69461c4ed8d5fea9b92d4296b1b583b

              SHA256

              a30d189768421d8f7cd73d04733b9668d9bc6ac5f924c1718365905dfde99ea6

              SHA512

              4fcec6ad77900a3d860a607112f926e1989d5096b6810d17faebff0a35f339e57b8bf80fc5ca67e31635547a14bb3e5cde3820027774c39345c2b7d319390851

            • C:\Users\Admin\AppData\Local\Temp\$$a4328.bat

              Filesize

              722B

              MD5

              eefd8db96f75cdf64ba7ed0f624b08de

              SHA1

              5394059ac69461c4ed8d5fea9b92d4296b1b583b

              SHA256

              a30d189768421d8f7cd73d04733b9668d9bc6ac5f924c1718365905dfde99ea6

              SHA512

              4fcec6ad77900a3d860a607112f926e1989d5096b6810d17faebff0a35f339e57b8bf80fc5ca67e31635547a14bb3e5cde3820027774c39345c2b7d319390851

            • C:\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe

              Filesize

              580KB

              MD5

              aaa268594863d78a357c991987b1626b

              SHA1

              dad656907fc580fa489664454a93f7549e4b7d6e

              SHA256

              c4c225adcf8ed1f7eda4727350ccdc9844edafb41db4ad4e52c35081c74e72b2

              SHA512

              42800a49b3baf62240dc1e73cf07acaea088910290727e9ff69a1b0519b87b9bc2fb36e635442374a7688b47aca1b5d590302d1dd803fa77693cabcfcd1160de

            • C:\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe.exe

              Filesize

              580KB

              MD5

              aaa268594863d78a357c991987b1626b

              SHA1

              dad656907fc580fa489664454a93f7549e4b7d6e

              SHA256

              c4c225adcf8ed1f7eda4727350ccdc9844edafb41db4ad4e52c35081c74e72b2

              SHA512

              42800a49b3baf62240dc1e73cf07acaea088910290727e9ff69a1b0519b87b9bc2fb36e635442374a7688b47aca1b5d590302d1dd803fa77693cabcfcd1160de

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              fda0fdf5a333fae26c2a2e6175a04450

              SHA1

              1919de79be65650960729112e3494cc106c44ade

              SHA256

              086b54378c9f0d4d25b0c9bc043b66e0117fe7d7a359993e5208ed437178a005

              SHA512

              1f3b2c42bd0e0a0dd49712969c79462bae74373a7a46975796f0b679cc3e75b679e4e5251370e5926b98f56c9fa9aa18274de18943be4b7cc0c6ce2da40fcc7d

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              fda0fdf5a333fae26c2a2e6175a04450

              SHA1

              1919de79be65650960729112e3494cc106c44ade

              SHA256

              086b54378c9f0d4d25b0c9bc043b66e0117fe7d7a359993e5208ed437178a005

              SHA512

              1f3b2c42bd0e0a0dd49712969c79462bae74373a7a46975796f0b679cc3e75b679e4e5251370e5926b98f56c9fa9aa18274de18943be4b7cc0c6ce2da40fcc7d

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              fda0fdf5a333fae26c2a2e6175a04450

              SHA1

              1919de79be65650960729112e3494cc106c44ade

              SHA256

              086b54378c9f0d4d25b0c9bc043b66e0117fe7d7a359993e5208ed437178a005

              SHA512

              1f3b2c42bd0e0a0dd49712969c79462bae74373a7a46975796f0b679cc3e75b679e4e5251370e5926b98f56c9fa9aa18274de18943be4b7cc0c6ce2da40fcc7d

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              fda0fdf5a333fae26c2a2e6175a04450

              SHA1

              1919de79be65650960729112e3494cc106c44ade

              SHA256

              086b54378c9f0d4d25b0c9bc043b66e0117fe7d7a359993e5208ed437178a005

              SHA512

              1f3b2c42bd0e0a0dd49712969c79462bae74373a7a46975796f0b679cc3e75b679e4e5251370e5926b98f56c9fa9aa18274de18943be4b7cc0c6ce2da40fcc7d

            • F:\$RECYCLE.BIN\S-1-5-21-3849525425-30183055-657688904-1000\_desktop.ini

              Filesize

              8B

              MD5

              6bdc569e34ba772e6a02bf98e5269208

              SHA1

              d6e9053ccd9906f78c9f4dd12414246f31622d49

              SHA256

              a2f6c9ea9fb63e52c84ba26b60450f841bafcf7378af3f8310c32c86701dc148

              SHA512

              d25858c63ebf7077fbf1a96c3fbb6577cab1ebd3d133f6982672e6c721bebee655028a8f35292c1c3fc1d3d1a166256da32a54e3981c453fa0b30df3b2278ee0

            • \Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe

              Filesize

              580KB

              MD5

              aaa268594863d78a357c991987b1626b

              SHA1

              dad656907fc580fa489664454a93f7549e4b7d6e

              SHA256

              c4c225adcf8ed1f7eda4727350ccdc9844edafb41db4ad4e52c35081c74e72b2

              SHA512

              42800a49b3baf62240dc1e73cf07acaea088910290727e9ff69a1b0519b87b9bc2fb36e635442374a7688b47aca1b5d590302d1dd803fa77693cabcfcd1160de

            • \Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe

              Filesize

              580KB

              MD5

              aaa268594863d78a357c991987b1626b

              SHA1

              dad656907fc580fa489664454a93f7549e4b7d6e

              SHA256

              c4c225adcf8ed1f7eda4727350ccdc9844edafb41db4ad4e52c35081c74e72b2

              SHA512

              42800a49b3baf62240dc1e73cf07acaea088910290727e9ff69a1b0519b87b9bc2fb36e635442374a7688b47aca1b5d590302d1dd803fa77693cabcfcd1160de

            • memory/1212-33-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

              Filesize

              4KB

            • memory/2040-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2040-15-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2040-20-0x0000000000440000-0x0000000000474000-memory.dmp

              Filesize

              208KB

            • memory/2040-21-0x0000000000440000-0x0000000000474000-memory.dmp

              Filesize

              208KB

            • memory/2040-35-0x0000000000440000-0x0000000000474000-memory.dmp

              Filesize

              208KB

            • memory/2464-36-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2464-22-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2464-44-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2464-51-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2464-96-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2464-102-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2464-1855-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2464-3315-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2764-31-0x0000000000400000-0x00000000004AA000-memory.dmp

              Filesize

              680KB

            • memory/3008-28-0x0000000002080000-0x000000000212A000-memory.dmp

              Filesize

              680KB