Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/09/2023, 10:39

General

  • Target

    e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe

  • Size

    251KB

  • MD5

    e51942534e975a10d4a82f48ad033621

  • SHA1

    3f3ee8d1ce6a5766a760006a5e7422add57b90ab

  • SHA256

    e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611

  • SHA512

    fb3b9fe6f397fc59b3a084d0fd9dc1450ea8c8b5d43df5ff054b48652e7b891e6db333842aaad5a5d26f42e50a61407e19a2d1e36ae6e8f42a0b0f920f4bffa3

  • SSDEEP

    6144:xVfjmNwgiC4bXqsTk90qC1AOb7eswf1Px++fD8PJ:n7+LitXqsTkiR7twRx+gD8PJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3168
      • C:\Users\Admin\AppData\Local\Temp\e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe
        "C:\Users\Admin\AppData\Local\Temp\e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4696
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBCB8.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4916
          • C:\Users\Admin\AppData\Local\Temp\e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe
            "C:\Users\Admin\AppData\Local\Temp\e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe"
            4⤵
            • Executes dropped EXE
            PID:1756
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3716
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1728
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2044

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        05837162449feda11dd795d03402268c

        SHA1

        ed5d26c8c53b676650d028e1b3014de10bce8456

        SHA256

        19446ff46a22fc264a82d155dc51a15a52f11068027611617a8ec1b2fe208f38

        SHA512

        77b6553f9650fd92f7fada8481d3b427882741e3eeaf5ca3dfcdbb16eda0c86933d7fb42f86acd05df44d56751fc394fdd30b59a95e30c07ce9d8dd538653c88

      • C:\Users\Admin\AppData\Local\Temp\$$aBCB8.bat

        Filesize

        722B

        MD5

        710874947d1928274162ab0288eb527f

        SHA1

        40a79077467607ff2fd4ecb1955c8008427a91db

        SHA256

        5f7cca78eba73fc1c1fc81d6126cca3bd84f4ca5ad5a6148eab06671dbcf847f

        SHA512

        282ceae1a8261bb2472a73b7fdbf36746ae9b00d23c5906215acf91813323fd7ba18bb3d8ab5c883d95c05a426533971fd771367fdd9585e78f65e9f0fd2ad34

      • C:\Users\Admin\AppData\Local\Temp\e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe

        Filesize

        224KB

        MD5

        d4b257c01bbaa68d15d8368475a4e227

        SHA1

        fafae083a882e163cfa8c77258baaab891c17df2

        SHA256

        dd6dd981c7f1a6673dc8cc3a0fe1fc8a54e059a9fdb0545b0dc9258299c0c546

        SHA512

        167494ecb32196e8e199d7d14a1c0498eee45ab8e8862e5441539fa569313bb602b9e979935c7cc5ba39300e54e8bdbdf2f502e4ea24b5e8339fd2c3685ca502

      • C:\Users\Admin\AppData\Local\Temp\e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe.exe

        Filesize

        224KB

        MD5

        d4b257c01bbaa68d15d8368475a4e227

        SHA1

        fafae083a882e163cfa8c77258baaab891c17df2

        SHA256

        dd6dd981c7f1a6673dc8cc3a0fe1fc8a54e059a9fdb0545b0dc9258299c0c546

        SHA512

        167494ecb32196e8e199d7d14a1c0498eee45ab8e8862e5441539fa569313bb602b9e979935c7cc5ba39300e54e8bdbdf2f502e4ea24b5e8339fd2c3685ca502

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        126becf8099e1c58345358ed37931228

        SHA1

        d6870a8b2320fc2f28343c2089e972a120f5bd18

        SHA256

        499b62fcbdbbafc71126b753a799897bdb099f09c78fab30ec868dbcfca821a1

        SHA512

        776a2aac52f708f124490ee27fd196f6c3a6a81e09a0bcf99de9f370940b53d2b64648a2fc0a49588474352d641c0f003fdc9df1a2d2a08461037615803c6425

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        126becf8099e1c58345358ed37931228

        SHA1

        d6870a8b2320fc2f28343c2089e972a120f5bd18

        SHA256

        499b62fcbdbbafc71126b753a799897bdb099f09c78fab30ec868dbcfca821a1

        SHA512

        776a2aac52f708f124490ee27fd196f6c3a6a81e09a0bcf99de9f370940b53d2b64648a2fc0a49588474352d641c0f003fdc9df1a2d2a08461037615803c6425

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        126becf8099e1c58345358ed37931228

        SHA1

        d6870a8b2320fc2f28343c2089e972a120f5bd18

        SHA256

        499b62fcbdbbafc71126b753a799897bdb099f09c78fab30ec868dbcfca821a1

        SHA512

        776a2aac52f708f124490ee27fd196f6c3a6a81e09a0bcf99de9f370940b53d2b64648a2fc0a49588474352d641c0f003fdc9df1a2d2a08461037615803c6425

      • F:\$RECYCLE.BIN\S-1-5-21-2415528079-3794552930-4264847036-1000\_desktop.ini

        Filesize

        8B

        MD5

        587438ba3214d6958f23eced1b2cd39c

        SHA1

        56d9150b977089419b026aaf6ee032981c437dfd

        SHA256

        4a9d4c3f321c10e2bb0319dca7695b9b3252a0e1d35cfc2a09bac15d5c36e090

        SHA512

        31309fcfa73bf18bb138cbe3744414acc13498184290586c8f185e828027f7b0c647f3f102826099465c7995a29e8a33d95f832ffac8d16b619b53f037e4fd63

      • memory/3716-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3716-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3716-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3716-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3716-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3716-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3716-372-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3716-1278-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3716-3723-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3716-4820-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4696-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4696-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB