Analysis

  • max time kernel
    153s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2023 07:47

General

  • Target

    042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe

  • Size

    106KB

  • MD5

    5e9cf02766e819ed2e9790701a15abc8

  • SHA1

    8560510b425f265fc0d5d692dda1b9736231bccc

  • SHA256

    042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e

  • SHA512

    35a2b60f192c49f160e88cb91374e586969efd3fa6f0c3e8a4fd522fd802bd720babad7b165f11ccbca07f9a6ed5cba5605e760d33172b20b1544a658dc4e1c6

  • SSDEEP

    3072:pykuJVLgzoTNenyOLZaYWbB7dol+pW77M90B:5uJuzoTkLZa/lRol+pf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3168
      • C:\Users\Admin\AppData\Local\Temp\042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe
        "C:\Users\Admin\AppData\Local\Temp\042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aF695.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3912
          • C:\Users\Admin\AppData\Local\Temp\042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe
            "C:\Users\Admin\AppData\Local\Temp\042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe"
            4⤵
            • Executes dropped EXE
            PID:3836
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1428
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4076
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4652

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        487KB

        MD5

        7933abe48809ab31e0918d9e179da33b

        SHA1

        f85cc9e1049e57ec6da464a404a926d43119fd0f

        SHA256

        ab2d9f6b589b63d388bcf8ea14bfc2dd0ad18fb0bb82db5f13bebe75ce990856

        SHA512

        dfb982067c6daa2ec19b9b6e0e92be11a9784a06ef9c5b239fc12c84cada1dfa4252512253afdd052aba5940928b58eff8ffb479e1a68a1b685491948030f21a

      • C:\Users\Admin\AppData\Local\Temp\$$aF695.bat

        Filesize

        722B

        MD5

        82314c322684294e97cd57a788c51ed4

        SHA1

        39549cc4db9b2f912983c175fbd6438100454479

        SHA256

        9f87d0f38db4ecc25aee69a314c48fd1e597ea9380c54feee208233864a7bb6e

        SHA512

        b086628b8303a001701666bfddb39466198bbefeedfa8c66f975ad3d7e26a5e07a1bcab4a14de84e9566c41aef197920a21f808d05f2463667bac0b13c74856f

      • C:\Users\Admin\AppData\Local\Temp\042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe

        Filesize

        77KB

        MD5

        a7716d38fea21265e471d4ef980e71c5

        SHA1

        371ce2ec176015299d9605e06271dd85bb35b393

        SHA256

        2d9749fb6e3fbf080c8261974ade955fbb10dbba5ef7f37863820a199caf81f1

        SHA512

        c402373b60e50166537334116bc7a3e78f7794de198700f610101e6a479071c395fbbef66f23d2169e212672ef85debd45c17b9290eae929cb22fc9ff480d3b8

      • C:\Users\Admin\AppData\Local\Temp\042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe.exe

        Filesize

        77KB

        MD5

        a7716d38fea21265e471d4ef980e71c5

        SHA1

        371ce2ec176015299d9605e06271dd85bb35b393

        SHA256

        2d9749fb6e3fbf080c8261974ade955fbb10dbba5ef7f37863820a199caf81f1

        SHA512

        c402373b60e50166537334116bc7a3e78f7794de198700f610101e6a479071c395fbbef66f23d2169e212672ef85debd45c17b9290eae929cb22fc9ff480d3b8

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        cf88808bf1a7bb211e559a06b88bcb9d

        SHA1

        494e46d62930a122e416356c9d2cec58d7fd7e45

        SHA256

        4bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4

        SHA512

        e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        cf88808bf1a7bb211e559a06b88bcb9d

        SHA1

        494e46d62930a122e416356c9d2cec58d7fd7e45

        SHA256

        4bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4

        SHA512

        e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        cf88808bf1a7bb211e559a06b88bcb9d

        SHA1

        494e46d62930a122e416356c9d2cec58d7fd7e45

        SHA256

        4bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4

        SHA512

        e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65

      • F:\$RECYCLE.BIN\S-1-5-21-1574508946-349927670-1185736483-1000\_desktop.ini

        Filesize

        9B

        MD5

        dff4f6f0cc6b8b3bb8efb4a275a8f779

        SHA1

        e87d0f214e09712ed6d4d73e571edb2c1b140327

        SHA256

        34eaeafe313f318504cabbbdf6a150f2928ed89c13a836126478f56c6904cd20

        SHA512

        1a534267509c4dd7c0421a5460ea7b3d58e05ba1343c2f45ca6ca537ff5259f1fae31c68928acba3492875ba270242f41c43ed5d705d31cf9af5a56ca4edd0e0

      • memory/1428-41-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1428-19-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1428-27-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1428-28-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1428-33-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1428-37-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1428-9-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1428-74-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1428-1116-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1428-1279-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1428-2604-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2020-12-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2020-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB