Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2023 14:29

General

  • Target

    1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe

  • Size

    180KB

  • MD5

    80a11cd2aeb53af45f78af93e0cd1d33

  • SHA1

    65367038e9d89a113b1a1c1dd4da42d8930e6951

  • SHA256

    1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18

  • SHA512

    b1f9aaad935d1493f2a5d5b145c399e476cfe5de17cf81ea6d56d3008ab60ae1cf6305be0dfd6c294ba038776f2959bd7624aa7934b68c81cf9980d0c4a8f6fd

  • SSDEEP

    3072:5ftffjmNs9CEAGxiVRh+h85ufeKg0eylJ6YSXWkvDObXt4O:RVfjmNUxiVRh+i4Wt0ey/6YSXAmO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3188
      • C:\Users\Admin\AppData\Local\Temp\1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe
        "C:\Users\Admin\AppData\Local\Temp\1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4916
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA345.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3312
          • C:\Users\Admin\AppData\Local\Temp\1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe
            "C:\Users\Admin\AppData\Local\Temp\1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe"
            4⤵
            • Executes dropped EXE
            PID:1680
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2196
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1968
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:952

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        cf60447b5a5d7b2e800c5389c00686b9

        SHA1

        537bd6ffe4c8393f09faf07ce7e67c6355a29683

        SHA256

        15ca4a536e83e6637b34d89a07be1aa47f19c24eb4ed8cc8ce4f7cd5a7d6e6be

        SHA512

        ed7c4691f3ffec6a19538b872525758d17c4b72de2efe24b49da3197d1454e07ca4c9cfbcc02db692d4adada71936ecdcb4e44e1508aea778d80028430d831ac

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        4296ca7070db49a5a0927a486d0b9d67

        SHA1

        2d74bf8174925d4746bf98046bac314ea1fb511b

        SHA256

        e81ed268575198411bafd037b4bc2666dd5fd99bd843e626e7ae7a0c775182c0

        SHA512

        f0d7c24fb9c93843884b2ff5e6b1100766f7436228b443ebb64fcd367cda5422bfd677d040e09117948e288f572a3c6b9936525826f1b89a6322d7e4f0c72b9d

      • C:\Users\Admin\AppData\Local\Temp\$$aA345.bat

        Filesize

        722B

        MD5

        27f5cf619daef02b31ca721937c4f258

        SHA1

        21f3f3051887ed00039bd404bfae30ad646df91c

        SHA256

        f3572007e1dd196df277f61c855f9e64a15e02218c69dca204304df69d367615

        SHA512

        4f8444bff810192a5dd2beb20d742a28ccef449bc5108dec2613be4e4eaa1e6c0cc6afbfa2e539bb64899d6e2fe0f6eeabecdd6218e3f235d79b0ec423b33231

      • C:\Users\Admin\AppData\Local\Temp\1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe

        Filesize

        154KB

        MD5

        99c93b09d70b12cda44554b78d0667a7

        SHA1

        2241e25b63f032dd5167e29375eb9565a0fa1406

        SHA256

        4a3dd52b06a4334ca382e9fd669ecb3fcd37d1b38c2f91a757d32fa76c762ce2

        SHA512

        45935d5670d6d1c37807c214c87d2c81e6b4147df0dff6bc3629a286eb1391834e406fc70b84cdd9a1468ed429ffdc174fef3c0afcac901a97e66b21d1659af4

      • C:\Users\Admin\AppData\Local\Temp\1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe.exe

        Filesize

        154KB

        MD5

        99c93b09d70b12cda44554b78d0667a7

        SHA1

        2241e25b63f032dd5167e29375eb9565a0fa1406

        SHA256

        4a3dd52b06a4334ca382e9fd669ecb3fcd37d1b38c2f91a757d32fa76c762ce2

        SHA512

        45935d5670d6d1c37807c214c87d2c81e6b4147df0dff6bc3629a286eb1391834e406fc70b84cdd9a1468ed429ffdc174fef3c0afcac901a97e66b21d1659af4

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        36b3f02b659eb0ad5fddf054af96b525

        SHA1

        17eab1988b6601611ae0683bb8b26ec04c377cb9

        SHA256

        a1822df7617c493bc4dca454e06a5f93d3dac7b6133b5a8dca37866d3cd3c1c6

        SHA512

        e20e9add4525449be31da571226255cb3cb06bf1f2efe84591e77972283407c783321b676f2e3bc78dd85dcfb0f20db77a40bcd179599cdd0f453534acf9dbaf

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        36b3f02b659eb0ad5fddf054af96b525

        SHA1

        17eab1988b6601611ae0683bb8b26ec04c377cb9

        SHA256

        a1822df7617c493bc4dca454e06a5f93d3dac7b6133b5a8dca37866d3cd3c1c6

        SHA512

        e20e9add4525449be31da571226255cb3cb06bf1f2efe84591e77972283407c783321b676f2e3bc78dd85dcfb0f20db77a40bcd179599cdd0f453534acf9dbaf

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        36b3f02b659eb0ad5fddf054af96b525

        SHA1

        17eab1988b6601611ae0683bb8b26ec04c377cb9

        SHA256

        a1822df7617c493bc4dca454e06a5f93d3dac7b6133b5a8dca37866d3cd3c1c6

        SHA512

        e20e9add4525449be31da571226255cb3cb06bf1f2efe84591e77972283407c783321b676f2e3bc78dd85dcfb0f20db77a40bcd179599cdd0f453534acf9dbaf

      • F:\$RECYCLE.BIN\S-1-5-21-1141987721-3945596982-3297311814-1000\_desktop.ini

        Filesize

        9B

        MD5

        2c012c1af0648018cb6d8f5d91a5a1df

        SHA1

        a55ab94d1fdb3374bee98660f16093ebca4e9258

        SHA256

        50313ae96f06443d8a81be791ed17d2060cbbe0b3ab5675290bf34eabbbdce3a

        SHA512

        1db76dae120f6de58372c7aec1c84b213242e991bdd92fb1a327b32bb91af55bab93719d55d49ae3712bf0b42998d561960ffe086bb3e42e806acc248ce1664e

      • memory/2196-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2196-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2196-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2196-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2196-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2196-252-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2196-1278-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2196-2341-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2196-10-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2196-4977-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4916-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4916-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB