Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2023, 10:44

General

  • Target

    4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe

  • Size

    298KB

  • MD5

    5b861b390e8f4e218e39c7763c422b1a

  • SHA1

    a194287f9f67b360a9ad6ac062e944530d4778b0

  • SHA256

    4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b

  • SHA512

    b8f1c1ab672ac425d6956c95858089bfa1e51636f8c35c51c5d7626a78be8a748ef3221756fff6ceaa17ce85d8a2c1d579c64573081d0069dbc99df7c1d9f45b

  • SSDEEP

    6144:DVfjmNrbUARyUgzPcLactVks94DJ9TBA3QvE:Z7+rlwUAPDsyLDJ9TagvE

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe
      "C:\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\$$a41A2.bat
        3⤵
        • Deletes itself
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe
          "C:\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe"
          4⤵
          • Executes dropped EXE
          PID:2612
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            5⤵
              PID:2740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      251KB

      MD5

      0b8ca9bd200cfc077367fafb2f5e99ba

      SHA1

      0a8494c1fb2a50067e6ecd63af5ce1431439ad0a

      SHA256

      bb93e63dbe4a922d8a33ce7d446ef9c52e489991fb586884a28b0bb66a363263

      SHA512

      39585db684d3a59d72bf049c9d4611dc7539ae7be7471bdacf7cdb9a63d8ac2b643658b77143e7827a6d3502f87c4cb48add5dc80966db3a5e2c4ec362389723

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      471KB

      MD5

      4cfdb20b04aa239d6f9e83084d5d0a77

      SHA1

      f22863e04cc1fd4435f785993ede165bd8245ac6

      SHA256

      30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

      SHA512

      35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

    • C:\Users\Admin\AppData\Local\Temp\$$a41A2.bat

      Filesize

      722B

      MD5

      682963cf899a6cf383055a0b7cfdafc1

      SHA1

      69818753ce50c06752876d8bfd0a909ab92ef0b4

      SHA256

      11322108f36203e4fa09431d8ee5be0250371b798447e7741e2b53dfe1e4bb3d

      SHA512

      8d33c737441cfba08e662392a20d285f0b9585d25fa4344f5b84acdea2a43a93f53b136c3908ef61f1e84882f8bc84791258f550bbdbe32046e7600a8e7f8592

    • C:\Users\Admin\AppData\Local\Temp\$$a41A2.bat

      Filesize

      722B

      MD5

      682963cf899a6cf383055a0b7cfdafc1

      SHA1

      69818753ce50c06752876d8bfd0a909ab92ef0b4

      SHA256

      11322108f36203e4fa09431d8ee5be0250371b798447e7741e2b53dfe1e4bb3d

      SHA512

      8d33c737441cfba08e662392a20d285f0b9585d25fa4344f5b84acdea2a43a93f53b136c3908ef61f1e84882f8bc84791258f550bbdbe32046e7600a8e7f8592

    • C:\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe

      Filesize

      271KB

      MD5

      63475fca261f68f0d42c9372f9a77308

      SHA1

      e1ab1002db6723da4cdd0ebd5952ad21c41b9a72

      SHA256

      77d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4

      SHA512

      520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96

    • C:\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe.exe

      Filesize

      271KB

      MD5

      63475fca261f68f0d42c9372f9a77308

      SHA1

      e1ab1002db6723da4cdd0ebd5952ad21c41b9a72

      SHA256

      77d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4

      SHA512

      520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96

    • C:\Windows\Logo1_.exe

      Filesize

      26KB

      MD5

      7aa3f7d0ddde37d1ba8a81eb45ae6238

      SHA1

      f6cfaf6008198edfb624e959404928c0fd860d5c

      SHA256

      8aee1ead2b934856107773de256c27c38118249a07a88e5f3fb0e710f61f4fc8

      SHA512

      5440020514ad92a5c52113cfd5077dd012cb0605530140a582d55a828d9b626cbc809593f1400685b1109f17e98e5f03e0e228ebca1ec19bf09430ce2fa11061

    • C:\Windows\Logo1_.exe

      Filesize

      26KB

      MD5

      7aa3f7d0ddde37d1ba8a81eb45ae6238

      SHA1

      f6cfaf6008198edfb624e959404928c0fd860d5c

      SHA256

      8aee1ead2b934856107773de256c27c38118249a07a88e5f3fb0e710f61f4fc8

      SHA512

      5440020514ad92a5c52113cfd5077dd012cb0605530140a582d55a828d9b626cbc809593f1400685b1109f17e98e5f03e0e228ebca1ec19bf09430ce2fa11061

    • C:\Windows\Logo1_.exe

      Filesize

      26KB

      MD5

      7aa3f7d0ddde37d1ba8a81eb45ae6238

      SHA1

      f6cfaf6008198edfb624e959404928c0fd860d5c

      SHA256

      8aee1ead2b934856107773de256c27c38118249a07a88e5f3fb0e710f61f4fc8

      SHA512

      5440020514ad92a5c52113cfd5077dd012cb0605530140a582d55a828d9b626cbc809593f1400685b1109f17e98e5f03e0e228ebca1ec19bf09430ce2fa11061

    • C:\Windows\rundl132.exe

      Filesize

      26KB

      MD5

      7aa3f7d0ddde37d1ba8a81eb45ae6238

      SHA1

      f6cfaf6008198edfb624e959404928c0fd860d5c

      SHA256

      8aee1ead2b934856107773de256c27c38118249a07a88e5f3fb0e710f61f4fc8

      SHA512

      5440020514ad92a5c52113cfd5077dd012cb0605530140a582d55a828d9b626cbc809593f1400685b1109f17e98e5f03e0e228ebca1ec19bf09430ce2fa11061

    • F:\$RECYCLE.BIN\S-1-5-21-3750544865-3773649541-1858556521-1000\_desktop.ini

      Filesize

      9B

      MD5

      9871758f1c8c7fb518b6793d4aa66294

      SHA1

      2808f61dd22a0bf12c85bbc65326e0bfe2f7f627

      SHA256

      1f836ee8dbd13a9f1fa0f2de0976570138232addb74f0a354ed9b499191dc80d

      SHA512

      a261ec877b3ccc43db77712359d10c360a50f420fed5cf6a65fd6894d2cd5055f5b72f85edb823a1da22121955aaaa6da34550da9f825c12982602c579a6bb3d

    • \Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe

      Filesize

      271KB

      MD5

      63475fca261f68f0d42c9372f9a77308

      SHA1

      e1ab1002db6723da4cdd0ebd5952ad21c41b9a72

      SHA256

      77d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4

      SHA512

      520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96

    • \Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe

      Filesize

      271KB

      MD5

      63475fca261f68f0d42c9372f9a77308

      SHA1

      e1ab1002db6723da4cdd0ebd5952ad21c41b9a72

      SHA256

      77d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4

      SHA512

      520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96

    • memory/1172-18-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1172-34-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1172-42-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1172-48-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1172-94-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1172-101-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1172-177-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1172-1853-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1172-3313-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1268-30-0x0000000002C70000-0x0000000002C71000-memory.dmp

      Filesize

      4KB

    • memory/2116-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2116-17-0x0000000000220000-0x0000000000254000-memory.dmp

      Filesize

      208KB

    • memory/2116-15-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB