Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2023 18:28

General

  • Target

    104413c8414d2b0cc21bc270a833dc4a07eb04a7c87f44a1ebfdf64b0af390d9.exe

  • Size

    26KB

  • MD5

    a5d37063aaca62143a8222dae9a2d97c

  • SHA1

    54d461778af4e801ec1c8d54cb128025079053e8

  • SHA256

    104413c8414d2b0cc21bc270a833dc4a07eb04a7c87f44a1ebfdf64b0af390d9

  • SHA512

    d080873aef85a073d0e52bb189ff7f72bf2d6ac82dd622de4520e4b07cd828890469f9868ee97de9ca7370f0625692e74c63173fcbe4e0bc93d15d54d4f55c2a

  • SSDEEP

    768:Y1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoZw:KfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:904
      • C:\Users\Admin\AppData\Local\Temp\104413c8414d2b0cc21bc270a833dc4a07eb04a7c87f44a1ebfdf64b0af390d9.exe
        "C:\Users\Admin\AppData\Local\Temp\104413c8414d2b0cc21bc270a833dc4a07eb04a7c87f44a1ebfdf64b0af390d9.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1288
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4540
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1232

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        ec2e6a277c765243926a298835e05019

        SHA1

        022a830abaedcabc62a9ebf860cb461d5ed79990

        SHA256

        aa909c55ac95e7d095b1a03d06e08413cd0a22a29fb7167e5732fb004414c53b

        SHA512

        a4874c771cad3bd972714e1cf72204bff6cbff94388fa72dd5a2c2db4591bcd8474fc056842be1d9dada97f11d3557c768b86cf2272df8ac1f367c7bf4e1452c

      • C:\Program Files\Google\Chrome\Application\chrome.exe

        Filesize

        2.8MB

        MD5

        7c313f145baf0ea3feaac4416946fa6b

        SHA1

        15e26715a75ed280b2aa504e6b1d14e26cf2f84a

        SHA256

        ba1b37faf7770abd2930935fda5f32d414ba13571616bdbce039789af746aec3

        SHA512

        b847fa63fa4612bbfaa0c09270a70ca6c7da1c83d712167727c77dca8d4d35c07d31ebb60a8bf3bb805a5f4f85b226ab128c4a98685b984e51bec4dc353bc75e

      • F:\$RECYCLE.BIN\S-1-5-21-1045988481-1457812719-2617974652-1000\_desktop.ini

        Filesize

        9B

        MD5

        9871758f1c8c7fb518b6793d4aa66294

        SHA1

        2808f61dd22a0bf12c85bbc65326e0bfe2f7f627

        SHA256

        1f836ee8dbd13a9f1fa0f2de0976570138232addb74f0a354ed9b499191dc80d

        SHA512

        a261ec877b3ccc43db77712359d10c360a50f420fed5cf6a65fd6894d2cd5055f5b72f85edb823a1da22121955aaaa6da34550da9f825c12982602c579a6bb3d

      • memory/1288-27-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1288-18-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1288-23-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1288-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1288-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1288-174-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1288-1264-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1288-3361-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1288-5-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1288-4806-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB