Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2023 17:37

General

  • Target

    53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe

  • Size

    298KB

  • MD5

    20bfd2f230e5a9786c4aad703fbaee3d

  • SHA1

    d7805fcac6a95e766b8907e257236914abe48ee6

  • SHA256

    53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9

  • SHA512

    5fef25a19aa7012197b4269a03befcdcea5655862932436c293e6337850f8a8aa33486c293478fb822e45f6b7638b1766e1cbbf3fc68aa84dfba0ddfcbfb4474

  • SSDEEP

    6144:nVfjmNrbUARyUgzPcLactVks94DJ9TBA3QvE:V7+rlwUAPDsyLDJ9TagvE

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1172
    • C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe
      "C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\$$a3498.bat
        3⤵
        • Deletes itself
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2456
        • C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe
          "C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe"
          4⤵
          • Executes dropped EXE
          PID:2704
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2272
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            5⤵
              PID:2672

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      251KB

      MD5

      5725841defcb7e0548144bdc53e0b867

      SHA1

      dd8c3c919b9ee5d068c5c42ba049cc2898add5c5

      SHA256

      7a1876d6402a6e910fe1ace26d0fc6a0ae27599d0258f9352f6b81bc2b4b72a3

      SHA512

      de6785d1de40c6b86ec99918bd3b0e884a81377ad1d353799cd34a3399cde727ccbcd48af0880cd5f48ee9ef1bb98fa8f870a83c38f8b9aea77cbea2ade0331c

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      471KB

      MD5

      4cfdb20b04aa239d6f9e83084d5d0a77

      SHA1

      f22863e04cc1fd4435f785993ede165bd8245ac6

      SHA256

      30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

      SHA512

      35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

    • C:\Users\Admin\AppData\Local\Temp\$$a3498.bat

      Filesize

      722B

      MD5

      58d211934349b47eaefdd18294831af4

      SHA1

      39c60a128d393a19d9cf7f2718f201d55f4c8f97

      SHA256

      d77c3aca6a9d2339532014d80db7b2772c7996f9c7ab21ca6c0fdf7ed4d4eb7b

      SHA512

      4abc81a4e097b63943f2791f1d0b7598feff09bae640dd84c8fb3ea6bfa8de2d7c3cebf3718ca77958ee3725dd2f172bfa75a568f6a2a5a89eb321b1b5e2897e

    • C:\Users\Admin\AppData\Local\Temp\$$a3498.bat

      Filesize

      722B

      MD5

      58d211934349b47eaefdd18294831af4

      SHA1

      39c60a128d393a19d9cf7f2718f201d55f4c8f97

      SHA256

      d77c3aca6a9d2339532014d80db7b2772c7996f9c7ab21ca6c0fdf7ed4d4eb7b

      SHA512

      4abc81a4e097b63943f2791f1d0b7598feff09bae640dd84c8fb3ea6bfa8de2d7c3cebf3718ca77958ee3725dd2f172bfa75a568f6a2a5a89eb321b1b5e2897e

    • C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe

      Filesize

      271KB

      MD5

      63475fca261f68f0d42c9372f9a77308

      SHA1

      e1ab1002db6723da4cdd0ebd5952ad21c41b9a72

      SHA256

      77d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4

      SHA512

      520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96

    • C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe.exe

      Filesize

      271KB

      MD5

      63475fca261f68f0d42c9372f9a77308

      SHA1

      e1ab1002db6723da4cdd0ebd5952ad21c41b9a72

      SHA256

      77d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4

      SHA512

      520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96

    • C:\Windows\Logo1_.exe

      Filesize

      26KB

      MD5

      2da5a57d1ba2ed4b46bc3c9817948557

      SHA1

      8b28792220f874e0abd68de5d946c3ae111f6abb

      SHA256

      e3c3821d97d831fe32ef85bf7e78b397eba5cd839568aeae330e28e702eb662f

      SHA512

      29940a2b80714d8f816a0d6b4f5d93cfb4aeae5e0303f6f06d5091a3e0dc405ae1a1def41ea5e2e709ed6c20d4f4fd8f1d9527ca6eb4eb6d6cf1bc5fce4a7e91

    • C:\Windows\Logo1_.exe

      Filesize

      26KB

      MD5

      2da5a57d1ba2ed4b46bc3c9817948557

      SHA1

      8b28792220f874e0abd68de5d946c3ae111f6abb

      SHA256

      e3c3821d97d831fe32ef85bf7e78b397eba5cd839568aeae330e28e702eb662f

      SHA512

      29940a2b80714d8f816a0d6b4f5d93cfb4aeae5e0303f6f06d5091a3e0dc405ae1a1def41ea5e2e709ed6c20d4f4fd8f1d9527ca6eb4eb6d6cf1bc5fce4a7e91

    • C:\Windows\Logo1_.exe

      Filesize

      26KB

      MD5

      2da5a57d1ba2ed4b46bc3c9817948557

      SHA1

      8b28792220f874e0abd68de5d946c3ae111f6abb

      SHA256

      e3c3821d97d831fe32ef85bf7e78b397eba5cd839568aeae330e28e702eb662f

      SHA512

      29940a2b80714d8f816a0d6b4f5d93cfb4aeae5e0303f6f06d5091a3e0dc405ae1a1def41ea5e2e709ed6c20d4f4fd8f1d9527ca6eb4eb6d6cf1bc5fce4a7e91

    • C:\Windows\rundl132.exe

      Filesize

      26KB

      MD5

      2da5a57d1ba2ed4b46bc3c9817948557

      SHA1

      8b28792220f874e0abd68de5d946c3ae111f6abb

      SHA256

      e3c3821d97d831fe32ef85bf7e78b397eba5cd839568aeae330e28e702eb662f

      SHA512

      29940a2b80714d8f816a0d6b4f5d93cfb4aeae5e0303f6f06d5091a3e0dc405ae1a1def41ea5e2e709ed6c20d4f4fd8f1d9527ca6eb4eb6d6cf1bc5fce4a7e91

    • F:\$RECYCLE.BIN\S-1-5-21-686452656-3203474025-4140627569-1000\_desktop.ini

      Filesize

      8B

      MD5

      95127a81ba5781b47158c7bade11f958

      SHA1

      fa289ca07d3998db8f732dc188ff099b7dcefd86

      SHA256

      4b413fdd0fc873cb5cf1b957078e2786827cb8d3665159e02b7bfda486133aaf

      SHA512

      c1403a7b2e462b09a03f09ba4ecff788db0d0402c09086b65c435c606a5c898ebc9959e47f77a5985881eee0e4364b035a3fa926672e8b61e2cc9bf7c3b169a0

    • \Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe

      Filesize

      271KB

      MD5

      63475fca261f68f0d42c9372f9a77308

      SHA1

      e1ab1002db6723da4cdd0ebd5952ad21c41b9a72

      SHA256

      77d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4

      SHA512

      520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96

    • \Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe

      Filesize

      271KB

      MD5

      63475fca261f68f0d42c9372f9a77308

      SHA1

      e1ab1002db6723da4cdd0ebd5952ad21c41b9a72

      SHA256

      77d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4

      SHA512

      520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96

    • memory/1172-30-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

      Filesize

      4KB

    • memory/2000-17-0x00000000003B0000-0x00000000003E4000-memory.dmp

      Filesize

      208KB

    • memory/2000-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2000-15-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2196-32-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2196-21-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2196-39-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2196-45-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2196-91-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2196-98-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2196-109-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2196-1850-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2196-3310-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB