Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2023, 15:23

General

  • Target

    f40b30fab8230286d47616abb1d04090c6dcfa33fd1ece6a767586477376b4b0.exe

  • Size

    26KB

  • MD5

    99532c72a6a572c57d501d9c26fa8a2c

  • SHA1

    ca4b441b1d15c71864bcb52b35e289682465522f

  • SHA256

    f40b30fab8230286d47616abb1d04090c6dcfa33fd1ece6a767586477376b4b0

  • SHA512

    cb7921f9365c96e693facbd875f8de61e16394c020b91e93cafcf1726f60edf670befe1c98b3817aaaad392ad7614dd8f42cde528c5fff716d401d3795d6d3b7

  • SSDEEP

    768:q01ODKAaDMG8H92RwZNQSw+JnbmQj3FZJ9Vs9XnsD:9fgLdQAQfwt7FZJ92Bs

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3160
      • C:\Users\Admin\AppData\Local\Temp\f40b30fab8230286d47616abb1d04090c6dcfa33fd1ece6a767586477376b4b0.exe
        "C:\Users\Admin\AppData\Local\Temp\f40b30fab8230286d47616abb1d04090c6dcfa33fd1ece6a767586477376b4b0.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2468
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4740
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:3428

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        7e6e7ba916c50f31ee0f62efba0ce4dc

        SHA1

        23e010038b850f2271961285cddb5cc79ca5cde2

        SHA256

        d74096fb8a13abcb4460081ae5f05fbb3cefbf1ad60a5949084d520e9a911f7d

        SHA512

        1b2d74f660ae02bc5c533114d0befdf17af802290d3738c1458913595e0eee263c9dceca35670c48b574a4e3b85783bf824bcc3a364cf85df74ff391b576c493

      • C:\Program Files\Google\Chrome\Application\chrome.exe

        Filesize

        2.8MB

        MD5

        27dcecb87aedb60f44e6de64b461890a

        SHA1

        951aa8c085d096256c669e719ce07a298492d077

        SHA256

        2948bf841dd409c274903ade0bd9c8f7878761c048e969ee400d10ebd4ee6dfa

        SHA512

        465108594fd554a71f869edc074f46515e4da4520886603f1dd4b82b6f0188cdc2592316d00f5100626aff3114d17314f39c31995436d6deffe7dc1f9d9dacbf

      • F:\$RECYCLE.BIN\S-1-5-21-1045988481-1457812719-2617974652-1000\_desktop.ini

        Filesize

        9B

        MD5

        2c012c1af0648018cb6d8f5d91a5a1df

        SHA1

        a55ab94d1fdb3374bee98660f16093ebca4e9258

        SHA256

        50313ae96f06443d8a81be791ed17d2060cbbe0b3ab5675290bf34eabbbdce3a

        SHA512

        1db76dae120f6de58372c7aec1c84b213242e991bdd92fb1a327b32bb91af55bab93719d55d49ae3712bf0b42998d561960ffe086bb3e42e806acc248ce1664e

      • memory/2468-27-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2468-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2468-24-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2468-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2468-13-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2468-91-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2468-1264-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2468-4363-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2468-5-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2468-4806-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB