Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/09/2023, 15:33

General

  • Target

    4c1f92077122a38299ae26d3b5d2af93df64bf6db585c76cb708bd8551a3bb0e.exe

  • Size

    119KB

  • MD5

    9213ceb5b8e792cf51e86b3f2c05ea6d

  • SHA1

    1d241e1f36ced816990fc688cf841e67460052ee

  • SHA256

    4c1f92077122a38299ae26d3b5d2af93df64bf6db585c76cb708bd8551a3bb0e

  • SHA512

    d062566423fef774e4be3d3be35e5f7fa02da9b8dea81161f9ee164f6084836ae1c86f8fea29842849166afc871164f157c7f1b97c0376f8b4f9b2371ffabe69

  • SSDEEP

    3072:pvkuJVL9Jo/FQXy+uc//korlDFtNel3kaIFH/B0CyPvO3c0gCajNCg:quJTJo/qi+k

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3236
      • C:\Users\Admin\AppData\Local\Temp\4c1f92077122a38299ae26d3b5d2af93df64bf6db585c76cb708bd8551a3bb0e.exe
        "C:\Users\Admin\AppData\Local\Temp\4c1f92077122a38299ae26d3b5d2af93df64bf6db585c76cb708bd8551a3bb0e.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2976
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a692A.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3064
          • C:\Users\Admin\AppData\Local\Temp\4c1f92077122a38299ae26d3b5d2af93df64bf6db585c76cb708bd8551a3bb0e.exe
            "C:\Users\Admin\AppData\Local\Temp\4c1f92077122a38299ae26d3b5d2af93df64bf6db585c76cb708bd8551a3bb0e.exe"
            4⤵
            • Executes dropped EXE
            PID:4420
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1952
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4692
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3756

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        487KB

        MD5

        4b4a02045e48ab51de6cb2fecc851228

        SHA1

        e5a070a180689bcb9595850b5b4b5e81668d392f

        SHA256

        3e96e04c35a2b4b93049845f43f7505b4e92eacbce4497e69f290fc037463ef3

        SHA512

        94f2effb15b931f2b2fa9e2da74c7e416fc39cea70587af611e8c3a09d98a85b819fb55d701a684679176658180fcf901ad488f7072b9773fffab8c3335a37e3

      • C:\Users\Admin\AppData\Local\Temp\$$a692A.bat

        Filesize

        722B

        MD5

        049ae81e8a83e36e6e6dfd4ff32b1689

        SHA1

        673b0de4f9ca2f4ad6f91649f650d07efa36e901

        SHA256

        f005443fa8f7e7ab92e5cead33870baf4fc3c67534ec1d9817d37b77e81981c5

        SHA512

        37375af3a0580ecce0e00ee9a81398fca33f0445d5521820724384bee7f43394f8ed8f7ca768de666973d8e2b92ba7ab3680596182dc6dffe37d7ce057323cb2

      • C:\Users\Admin\AppData\Local\Temp\4c1f92077122a38299ae26d3b5d2af93df64bf6db585c76cb708bd8551a3bb0e.exe

        Filesize

        90KB

        MD5

        c8c3b8fb878ce29b75a69219abff4ccf

        SHA1

        e2e5d4feb0dff20ad1d83f72062f5816d365bc37

        SHA256

        4656a73e3e8ae7ab4dc9bcdcda922f18787978c758871c9bd51e4340d46e5113

        SHA512

        70c68e1c770cc806b2d2edf5d40cc86dd1781d8a01849cffc08a511133c1efcf892bd8a56dd4a7f8e307c46b038fff3a309ce9c1d78feb6190347ae6d77d6ad1

      • C:\Users\Admin\AppData\Local\Temp\4c1f92077122a38299ae26d3b5d2af93df64bf6db585c76cb708bd8551a3bb0e.exe.exe

        Filesize

        90KB

        MD5

        c8c3b8fb878ce29b75a69219abff4ccf

        SHA1

        e2e5d4feb0dff20ad1d83f72062f5816d365bc37

        SHA256

        4656a73e3e8ae7ab4dc9bcdcda922f18787978c758871c9bd51e4340d46e5113

        SHA512

        70c68e1c770cc806b2d2edf5d40cc86dd1781d8a01849cffc08a511133c1efcf892bd8a56dd4a7f8e307c46b038fff3a309ce9c1d78feb6190347ae6d77d6ad1

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        5570496f1582daebe7e692ae729aa575

        SHA1

        2e70d7b5674046a19bdd4d3b4f3f8c03fe13f3be

        SHA256

        6433b585bd1b15cbfd16c8b832c1881d8d836768cbe154d8afdd625977c2c0a9

        SHA512

        e4c31e47f0845172fffe1f005ba2bd0e11d234020f50f724c81a2aba70d1b302b2f1a503bc8c733c9be27005bd3b100e59f55b9958400a6f3078cf4f47b7b8b4

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        5570496f1582daebe7e692ae729aa575

        SHA1

        2e70d7b5674046a19bdd4d3b4f3f8c03fe13f3be

        SHA256

        6433b585bd1b15cbfd16c8b832c1881d8d836768cbe154d8afdd625977c2c0a9

        SHA512

        e4c31e47f0845172fffe1f005ba2bd0e11d234020f50f724c81a2aba70d1b302b2f1a503bc8c733c9be27005bd3b100e59f55b9958400a6f3078cf4f47b7b8b4

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        5570496f1582daebe7e692ae729aa575

        SHA1

        2e70d7b5674046a19bdd4d3b4f3f8c03fe13f3be

        SHA256

        6433b585bd1b15cbfd16c8b832c1881d8d836768cbe154d8afdd625977c2c0a9

        SHA512

        e4c31e47f0845172fffe1f005ba2bd0e11d234020f50f724c81a2aba70d1b302b2f1a503bc8c733c9be27005bd3b100e59f55b9958400a6f3078cf4f47b7b8b4

      • F:\$RECYCLE.BIN\S-1-5-21-4078585466-1563564224-3678410669-1000\_desktop.ini

        Filesize

        8B

        MD5

        95127a81ba5781b47158c7bade11f958

        SHA1

        fa289ca07d3998db8f732dc188ff099b7dcefd86

        SHA256

        4b413fdd0fc873cb5cf1b957078e2786827cb8d3665159e02b7bfda486133aaf

        SHA512

        c1403a7b2e462b09a03f09ba4ecff788db0d0402c09086b65c435c606a5c898ebc9959e47f77a5985881eee0e4364b035a3fa926672e8b61e2cc9bf7c3b169a0

      • memory/1952-26-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1952-19-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1952-8-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1952-32-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1952-37-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1952-41-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1952-342-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1952-1278-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1952-2381-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2976-9-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2976-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB