Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22-09-2023 05:09

General

  • Target

    124bb58c1b7e152e176e85cb18440ced11d47556d1d6d69dcda2a9fa78862f00.exe

  • Size

    103KB

  • MD5

    b14d0d9fc2f8ca14bcc13e2912171aae

  • SHA1

    8ba2fbd5bba87ad5428cfc9515b8674a2f1e425e

  • SHA256

    124bb58c1b7e152e176e85cb18440ced11d47556d1d6d69dcda2a9fa78862f00

  • SHA512

    2a31f544395579cad1e3c756098febbb2bba7746d40a664c786378e673deac39887429f4cfb5071a09f950472c467358684908c93678fc9c1741399bc89ba5af

  • SSDEEP

    3072:bLftffjmNATKZMRF+qqELfagnus3i6BR+8Cu1:nVfjmNCKZMRF+qRhi6B0a

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\124bb58c1b7e152e176e85cb18440ced11d47556d1d6d69dcda2a9fa78862f00.exe
        "C:\Users\Admin\AppData\Local\Temp\124bb58c1b7e152e176e85cb18440ced11d47556d1d6d69dcda2a9fa78862f00.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a391A.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2208
          • C:\Users\Admin\AppData\Local\Temp\124bb58c1b7e152e176e85cb18440ced11d47556d1d6d69dcda2a9fa78862f00.exe
            "C:\Users\Admin\AppData\Local\Temp\124bb58c1b7e152e176e85cb18440ced11d47556d1d6d69dcda2a9fa78862f00.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2772
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
              dw20.exe -x -s 940
              5⤵
              • Loads dropped DLL
              • Suspicious behavior: GetForegroundWindowSpam
              PID:2516
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2296
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2728
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2704

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        70f74cf4971343a9f26aca99c98ed7ba

        SHA1

        1e68782b838b8c9f824e2f6a09f3dfd17d83bd58

        SHA256

        1ae1a45c997a071ae877191b2708a820993f6027f0ddae920d51778dd5260200

        SHA512

        ad3168e3049d3943d7617d019b05b796c15c811ab8e9a7cb0d8da625ca1c8a2a28dcca92a3264ed3e429292e45c1bbf00b7bc6ec71a8b542b2c579f29f0d2584

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a391A.bat

        Filesize

        722B

        MD5

        91dde42cecab499e191f6daad5d326a2

        SHA1

        2c9bce1545fc4692cbea8b8afea952203769f01b

        SHA256

        ab01ca9cd59534878da0c0c567922fd3c636352e608bea31f26ab3a222688d2d

        SHA512

        25be1b48da28b5d49211311be14b1b5c13868ac6dab3623cfa19a7ff203e97c88cbab656230f725eab48ba98a2f5141c7a7f92c6622861ee02956336456e5d08

      • C:\Users\Admin\AppData\Local\Temp\$$a391A.bat

        Filesize

        722B

        MD5

        91dde42cecab499e191f6daad5d326a2

        SHA1

        2c9bce1545fc4692cbea8b8afea952203769f01b

        SHA256

        ab01ca9cd59534878da0c0c567922fd3c636352e608bea31f26ab3a222688d2d

        SHA512

        25be1b48da28b5d49211311be14b1b5c13868ac6dab3623cfa19a7ff203e97c88cbab656230f725eab48ba98a2f5141c7a7f92c6622861ee02956336456e5d08

      • C:\Users\Admin\AppData\Local\Temp\124bb58c1b7e152e176e85cb18440ced11d47556d1d6d69dcda2a9fa78862f00.exe

        Filesize

        77KB

        MD5

        6ac63d349d17b6b55ff4d0e07ad30e19

        SHA1

        0186365694505f90c5134832e18fab9583c1ec57

        SHA256

        57432324e83d5d2be87d7ad01ca3687143eed38b3d049cfb327c5a26f3bf4a01

        SHA512

        bcd1b9d4da1bd0b8862cf78d3257fec8be1496746378548191b8d63e2d3927c9205f376470266a380dd183a762b7eb3a94aedab8b1f14716d495a1b046148291

      • C:\Users\Admin\AppData\Local\Temp\124bb58c1b7e152e176e85cb18440ced11d47556d1d6d69dcda2a9fa78862f00.exe.exe

        Filesize

        77KB

        MD5

        6ac63d349d17b6b55ff4d0e07ad30e19

        SHA1

        0186365694505f90c5134832e18fab9583c1ec57

        SHA256

        57432324e83d5d2be87d7ad01ca3687143eed38b3d049cfb327c5a26f3bf4a01

        SHA512

        bcd1b9d4da1bd0b8862cf78d3257fec8be1496746378548191b8d63e2d3927c9205f376470266a380dd183a762b7eb3a94aedab8b1f14716d495a1b046148291

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        5b9f516a1ff924c0be92c504618c3197

        SHA1

        a18de40ea9f4a4c62e99653bd274151c9af4e927

        SHA256

        1ac67686379ff269e98e2b7221201bc00cbd111f3d7ce7314876730ee7a1a0c7

        SHA512

        4d20713958ff26df807d0c7773234f25ffb7eb325df7a94c3a93013c531adb1577912cf5f07ecce884b71b5206d9c7247561f9d9af96e6a4f1afff4f13b766e5

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        5b9f516a1ff924c0be92c504618c3197

        SHA1

        a18de40ea9f4a4c62e99653bd274151c9af4e927

        SHA256

        1ac67686379ff269e98e2b7221201bc00cbd111f3d7ce7314876730ee7a1a0c7

        SHA512

        4d20713958ff26df807d0c7773234f25ffb7eb325df7a94c3a93013c531adb1577912cf5f07ecce884b71b5206d9c7247561f9d9af96e6a4f1afff4f13b766e5

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        5b9f516a1ff924c0be92c504618c3197

        SHA1

        a18de40ea9f4a4c62e99653bd274151c9af4e927

        SHA256

        1ac67686379ff269e98e2b7221201bc00cbd111f3d7ce7314876730ee7a1a0c7

        SHA512

        4d20713958ff26df807d0c7773234f25ffb7eb325df7a94c3a93013c531adb1577912cf5f07ecce884b71b5206d9c7247561f9d9af96e6a4f1afff4f13b766e5

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        5b9f516a1ff924c0be92c504618c3197

        SHA1

        a18de40ea9f4a4c62e99653bd274151c9af4e927

        SHA256

        1ac67686379ff269e98e2b7221201bc00cbd111f3d7ce7314876730ee7a1a0c7

        SHA512

        4d20713958ff26df807d0c7773234f25ffb7eb325df7a94c3a93013c531adb1577912cf5f07ecce884b71b5206d9c7247561f9d9af96e6a4f1afff4f13b766e5

      • F:\$RECYCLE.BIN\S-1-5-21-3513876443-2771975297-1923446376-1000\_desktop.ini

        Filesize

        9B

        MD5

        dff4f6f0cc6b8b3bb8efb4a275a8f779

        SHA1

        e87d0f214e09712ed6d4d73e571edb2c1b140327

        SHA256

        34eaeafe313f318504cabbbdf6a150f2928ed89c13a836126478f56c6904cd20

        SHA512

        1a534267509c4dd7c0421a5460ea7b3d58e05ba1343c2f45ca6ca537ff5259f1fae31c68928acba3492875ba270242f41c43ed5d705d31cf9af5a56ca4edd0e0

      • \Users\Admin\AppData\Local\Temp\124bb58c1b7e152e176e85cb18440ced11d47556d1d6d69dcda2a9fa78862f00.exe

        Filesize

        77KB

        MD5

        6ac63d349d17b6b55ff4d0e07ad30e19

        SHA1

        0186365694505f90c5134832e18fab9583c1ec57

        SHA256

        57432324e83d5d2be87d7ad01ca3687143eed38b3d049cfb327c5a26f3bf4a01

        SHA512

        bcd1b9d4da1bd0b8862cf78d3257fec8be1496746378548191b8d63e2d3927c9205f376470266a380dd183a762b7eb3a94aedab8b1f14716d495a1b046148291

      • \Users\Admin\AppData\Local\Temp\124bb58c1b7e152e176e85cb18440ced11d47556d1d6d69dcda2a9fa78862f00.exe

        Filesize

        77KB

        MD5

        6ac63d349d17b6b55ff4d0e07ad30e19

        SHA1

        0186365694505f90c5134832e18fab9583c1ec57

        SHA256

        57432324e83d5d2be87d7ad01ca3687143eed38b3d049cfb327c5a26f3bf4a01

        SHA512

        bcd1b9d4da1bd0b8862cf78d3257fec8be1496746378548191b8d63e2d3927c9205f376470266a380dd183a762b7eb3a94aedab8b1f14716d495a1b046148291

      • \Users\Admin\AppData\Local\Temp\124bb58c1b7e152e176e85cb18440ced11d47556d1d6d69dcda2a9fa78862f00.exe

        Filesize

        77KB

        MD5

        6ac63d349d17b6b55ff4d0e07ad30e19

        SHA1

        0186365694505f90c5134832e18fab9583c1ec57

        SHA256

        57432324e83d5d2be87d7ad01ca3687143eed38b3d049cfb327c5a26f3bf4a01

        SHA512

        bcd1b9d4da1bd0b8862cf78d3257fec8be1496746378548191b8d63e2d3927c9205f376470266a380dd183a762b7eb3a94aedab8b1f14716d495a1b046148291

      • \Users\Admin\AppData\Local\Temp\124bb58c1b7e152e176e85cb18440ced11d47556d1d6d69dcda2a9fa78862f00.exe

        Filesize

        77KB

        MD5

        6ac63d349d17b6b55ff4d0e07ad30e19

        SHA1

        0186365694505f90c5134832e18fab9583c1ec57

        SHA256

        57432324e83d5d2be87d7ad01ca3687143eed38b3d049cfb327c5a26f3bf4a01

        SHA512

        bcd1b9d4da1bd0b8862cf78d3257fec8be1496746378548191b8d63e2d3927c9205f376470266a380dd183a762b7eb3a94aedab8b1f14716d495a1b046148291

      • memory/1280-45-0x0000000002A20000-0x0000000002A21000-memory.dmp

        Filesize

        4KB

      • memory/2296-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-116-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-3329-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-1869-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-206-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-47-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-111-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-64-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2296-58-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2516-51-0x00000000004B0000-0x00000000004B1000-memory.dmp

        Filesize

        4KB

      • memory/2516-43-0x00000000004B0000-0x00000000004B1000-memory.dmp

        Filesize

        4KB

      • memory/2772-50-0x0000000000410000-0x0000000000490000-memory.dmp

        Filesize

        512KB

      • memory/2772-48-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

        Filesize

        9.6MB

      • memory/2772-39-0x0000000000410000-0x0000000000490000-memory.dmp

        Filesize

        512KB

      • memory/2772-29-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

        Filesize

        9.6MB

      • memory/2772-38-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

        Filesize

        9.6MB

      • memory/3040-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3040-15-0x0000000000260000-0x0000000000294000-memory.dmp

        Filesize

        208KB

      • memory/3040-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB