Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    17/09/2023, 22:16

General

  • Target

    251705bff81065dd9542bb01b938b1ea76b846ebbdad1255880cc7f416e89e7c.exe

  • Size

    26KB

  • MD5

    fd67facdbcb3418d53b336fa29a4ebaf

  • SHA1

    bf4130709c66654c783c758f4963bfef4a13c6e6

  • SHA256

    251705bff81065dd9542bb01b938b1ea76b846ebbdad1255880cc7f416e89e7c

  • SHA512

    90f633eb47eb22f28715bf5bf5afd71b2f7a344765f46d7eb43f3b0a8ade8aa825342f02fd8236e82280e998314f93074bde1c7b2f6ee50880afbf8b5656a189

  • SSDEEP

    768:YK1ODKAaDMG8H92RwZNQSw+IlJIJJREIOAEeF1:VfgLdQAQfhJIJ0IO61

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1236
      • C:\Users\Admin\AppData\Local\Temp\251705bff81065dd9542bb01b938b1ea76b846ebbdad1255880cc7f416e89e7c.exe
        "C:\Users\Admin\AppData\Local\Temp\251705bff81065dd9542bb01b938b1ea76b846ebbdad1255880cc7f416e89e7c.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2080
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2356

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              fb0e55bd598718eeb4a10556052bcc0e

              SHA1

              7973070c0cfc65997f07519c93cbbec18093edfe

              SHA256

              636ac1d870c072f456e9452f3286fc44986e28f22def36784c555b51dc6c4527

              SHA512

              3304b991f3f2d058cae86f99c4cd093f2d50f5153f24e34bfb9636ca964cf6ef11cf0abdd3365d63afb36413394f9fa06f34a839e9c33d962d5c9e90b3c40a85

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              484KB

              MD5

              7ad329623d317267a53d9c99d2cef5a1

              SHA1

              76571f0f04e411d8b482495174283da53f388f9a

              SHA256

              96bf09d7542ca288363639d26bc7bd6c07e70cec360cc8e839582752791fed48

              SHA512

              f41ca59433771492559b17065d4ae523e500dd7f7cd3683c0fccc791f679c4f1376cc13894378b60d207c303d619062836853f64e686346fd4e8887be83112aa

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              f9fc019eacb573ec828d2d9ff6a48318

              SHA1

              b91958dc8d178b6eeb35e829bab84d0fb12c2280

              SHA256

              bf9ba3df2bad76d15f4efe42c0c59f37b9454907958892df8ab996552658934e

              SHA512

              998ba7bc7cdd5df3e1acfda6f4f92ec9d27732e1e182177dff310f3c918f3be99626a3526bebdff5bb7eb980640434baf56e0f08bfd125168c0a9e37e7239305

            • F:\$RECYCLE.BIN\S-1-5-21-3750544865-3773649541-1858556521-1000\_desktop.ini

              Filesize

              9B

              MD5

              2c0dac5a0ee90681d41a5cbf86d94297

              SHA1

              b307129f31736ea24c948dca5581aef59a81d7e4

              SHA256

              66a0286083e73a4fc72c934ced498268654207bc94b597c7c6c7f5df5dd03877

              SHA512

              cde36e6bd833ec09b79438b98ed8c5424c12c06d7e6afdbedf7b3e97786c57cf51bf6458b958fa9ef820b884b17daad45be0901b5a16fdc276489b7ffdc67e80

            • memory/1236-5-0x0000000002A20000-0x0000000002A21000-memory.dmp

              Filesize

              4KB

            • memory/2872-66-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2872-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2872-73-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2872-20-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2872-91-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2872-1826-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2872-14-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2872-3286-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2872-7-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB