Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2023, 12:50

General

  • Target

    a07bda63842447ffe3715e890a88862bb467cef36c74a3e08790b619c85617e2.exe

  • Size

    26KB

  • MD5

    a98e067ede8f54af4671309bda737590

  • SHA1

    a29879db38c075e6e35bb0f26785d62d1cb826d5

  • SHA256

    a07bda63842447ffe3715e890a88862bb467cef36c74a3e08790b619c85617e2

  • SHA512

    1c1553b0b9fae7fe0c99d5bea9b847b6a7eaea92bafbe4c6b933eb88e07cc219c13a9e87543e1ea9914a704244f8e3c95920dc75f463d4c875bf32fce8af4781

  • SSDEEP

    768:NtT1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:NtJfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1388
      • C:\Users\Admin\AppData\Local\Temp\a07bda63842447ffe3715e890a88862bb467cef36c74a3e08790b619c85617e2.exe
        "C:\Users\Admin\AppData\Local\Temp\a07bda63842447ffe3715e890a88862bb467cef36c74a3e08790b619c85617e2.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2052
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2924
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2992

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              787399baaa78a70ceeb5d54645c9fe37

              SHA1

              30234bd1df2dfa8f5faa133ad5acf09a2e72dd23

              SHA256

              2523c69eab1451ec0ecfb63464bea6ee3a47a36e56dbd627d86c5ae14da44adc

              SHA512

              8ba987bb04019d9385d6c77e676fb2bb1643377fd662867a9d37566f260835290db7ddb3918ddb3fdcfa24b868a9447b2a69654d3fed32f853711a7bff7381ca

            • C:\Program Files\7-Zip\7zFM.exe

              Filesize

              873KB

              MD5

              880010b76b645e19600b111824e44d33

              SHA1

              faf998528f850819d55d9cf421bddcc7fd209856

              SHA256

              a9018f82dd377845c58e460b4271a845291a524347c9a9bf5550f6aa374498b9

              SHA512

              f7a1043a9fd368fb6103e3ff2f760d69b92733ae973c55e6b150bc834b0df5e344d81c736ee79377d6102600d1c7216965dcb9963ab69fec5c9c51761ab03da4

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              4cfdb20b04aa239d6f9e83084d5d0a77

              SHA1

              f22863e04cc1fd4435f785993ede165bd8245ac6

              SHA256

              30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

              SHA512

              35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

            • F:\$RECYCLE.BIN\S-1-5-21-686452656-3203474025-4140627569-1000\_desktop.ini

              Filesize

              9B

              MD5

              dff4f6f0cc6b8b3bb8efb4a275a8f779

              SHA1

              e87d0f214e09712ed6d4d73e571edb2c1b140327

              SHA256

              34eaeafe313f318504cabbbdf6a150f2928ed89c13a836126478f56c6904cd20

              SHA512

              1a534267509c4dd7c0421a5460ea7b3d58e05ba1343c2f45ca6ca537ff5259f1fae31c68928acba3492875ba270242f41c43ed5d705d31cf9af5a56ca4edd0e0

            • memory/1388-5-0x0000000002660000-0x0000000002661000-memory.dmp

              Filesize

              4KB

            • memory/2052-66-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2052-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2052-73-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2052-20-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2052-80-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2052-1825-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2052-14-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2052-3285-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2052-7-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB