Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2023 13:57

General

  • Target

    f82028ae065230e18f328c7d77d6f988a589295ba05d994b5f94dec086d14c8c.exe

  • Size

    127KB

  • MD5

    195a3e7cbbdb0f5f0c0f864c6619da18

  • SHA1

    0274998c7cc8abd61eb94b8b2be4924179caa6f7

  • SHA256

    f82028ae065230e18f328c7d77d6f988a589295ba05d994b5f94dec086d14c8c

  • SHA512

    2c41a9514cd4f07847a75a89ed2ab0a4e6a790ce50e998a69409807bf440635b08ee865c9fdd987a0c0a42a5a9c106d99aa8d8ae7158089bb520876d70b7296d

  • SSDEEP

    3072:KNftffjmNm0GSrIqU7DWDM5IXy1aOmRu8XljkiZhP5X25:KdVfjmNmars7DOu8XHPx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3148
      • C:\Users\Admin\AppData\Local\Temp\f82028ae065230e18f328c7d77d6f988a589295ba05d994b5f94dec086d14c8c.exe
        "C:\Users\Admin\AppData\Local\Temp\f82028ae065230e18f328c7d77d6f988a589295ba05d994b5f94dec086d14c8c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3612
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB381.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3572
          • C:\Users\Admin\AppData\Local\Temp\f82028ae065230e18f328c7d77d6f988a589295ba05d994b5f94dec086d14c8c.exe
            "C:\Users\Admin\AppData\Local\Temp\f82028ae065230e18f328c7d77d6f988a589295ba05d994b5f94dec086d14c8c.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3520
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1144
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3496
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3556

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        823531bbd70233476ca605959cb8d2cc

        SHA1

        74d878fd6828e77407da2f3c7a4085df4a6911ab

        SHA256

        9a10abcfd9877c51a6a4bfd5f81681f59537171b37f398571d9ba9cbde784c16

        SHA512

        08bb43ac1d17d35709a4beafe60fd5074d9ee0c30398e0e934ff3bef0577a19f20be821dbf5d02fcaa0fb1f48fa2defec4b41d6ca99bfb2b7d51f5290f622632

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        6a7f204fa4ffd417ccd83928b35482b6

        SHA1

        c9b8d6c232b0584326938e67703c0a3f1ca839ef

        SHA256

        0898d285d5ec1843485b7380bcbc3f665cfbe759a426b525007a76ad77940917

        SHA512

        2c13e6ff5ee26a25d4e5be491fc5ad526aa6dfb34fb2c4b8a5f1a7c8286e0e911985dc3a70cfc82924137d70e361382c2fe15be9ceecebb6a5787c770477d677

      • C:\Users\Admin\AppData\Local\Temp\$$aB381.bat

        Filesize

        722B

        MD5

        d99b77652a12006d53d14c50a3672081

        SHA1

        f6b31b85a1da905a033ecf0b8b928264908181ce

        SHA256

        c94c6beca19fbc8d3d2ca3fce7f9a88820b61cdbb16e5cc362dcec48b291317d

        SHA512

        8b91449a18bd4bccaf63bdadec16e9ca50f830fa288790ef7c1f796668911b26d7f88f2fb3d586c87756ce52519c292475f9cf6be9142646fc9da672d323beeb

      • C:\Users\Admin\AppData\Local\Temp\f82028ae065230e18f328c7d77d6f988a589295ba05d994b5f94dec086d14c8c.exe

        Filesize

        100KB

        MD5

        e6991a57fbaebcfab51d7897001d2320

        SHA1

        fc482e66f32c572f0f934e2b3dcb0b97fa2fa2e5

        SHA256

        33f5cf13684f5ca72172f8302a8e62209a1dbad2a6958821b0199c3d08064b71

        SHA512

        6d905a649fc47c3e6e141b3f360da93d45bc6b9ab2a59b63facdb6d68606cc2059d952c2ea5e8e02e1295e88a101c384afff725e0ea978879d47fac6952ae7a8

      • C:\Users\Admin\AppData\Local\Temp\f82028ae065230e18f328c7d77d6f988a589295ba05d994b5f94dec086d14c8c.exe.exe

        Filesize

        100KB

        MD5

        e6991a57fbaebcfab51d7897001d2320

        SHA1

        fc482e66f32c572f0f934e2b3dcb0b97fa2fa2e5

        SHA256

        33f5cf13684f5ca72172f8302a8e62209a1dbad2a6958821b0199c3d08064b71

        SHA512

        6d905a649fc47c3e6e141b3f360da93d45bc6b9ab2a59b63facdb6d68606cc2059d952c2ea5e8e02e1295e88a101c384afff725e0ea978879d47fac6952ae7a8

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b16f445581f1c84748e3ef64f127b97d

        SHA1

        b5eee38ce13635f35a781926f8434a07ca295872

        SHA256

        b3fe889ff71155b7882670d7a2197a75cc11601a7a1003eb1948be8a87f916f8

        SHA512

        de97b113bed31ba85a533a4f8bc6a6f25df09403299e45a23cd908cbd6dded5b033fc0dbd800f143045871f57dff198036bc1a539b1d44527fca2cb7cb195e54

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b16f445581f1c84748e3ef64f127b97d

        SHA1

        b5eee38ce13635f35a781926f8434a07ca295872

        SHA256

        b3fe889ff71155b7882670d7a2197a75cc11601a7a1003eb1948be8a87f916f8

        SHA512

        de97b113bed31ba85a533a4f8bc6a6f25df09403299e45a23cd908cbd6dded5b033fc0dbd800f143045871f57dff198036bc1a539b1d44527fca2cb7cb195e54

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        b16f445581f1c84748e3ef64f127b97d

        SHA1

        b5eee38ce13635f35a781926f8434a07ca295872

        SHA256

        b3fe889ff71155b7882670d7a2197a75cc11601a7a1003eb1948be8a87f916f8

        SHA512

        de97b113bed31ba85a533a4f8bc6a6f25df09403299e45a23cd908cbd6dded5b033fc0dbd800f143045871f57dff198036bc1a539b1d44527fca2cb7cb195e54

      • F:\$RECYCLE.BIN\S-1-5-21-1574508946-349927670-1185736483-1000\_desktop.ini

        Filesize

        9B

        MD5

        aefd96a8d669fca3e61965ad4b456dbb

        SHA1

        a59ed0823bb825478bf4fa66cf84a474ac4f5272

        SHA256

        74e41853b6b9afd3ddd0261721f2c376a6c037a7659d829e65426afecfdbb8a2

        SHA512

        33e6dead0656b021014d6df9026a8988ab0b1098a476292ddde356a6c9d3536fc775419bc091399879d38ce403d6c450420c5bdc8423d4b20b945d75237696d1

      • memory/1144-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1144-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1144-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1144-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1144-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1144-1278-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1144-1355-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1144-4369-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1144-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3612-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3612-10-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB