Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2023, 23:23

General

  • Target

    cfc678b3c41de2924916997fea1d3c9fa28b6e64d32fdd1511b7da0f021b6e17.exe

  • Size

    46KB

  • MD5

    7628003f4744a604377dbf289902eaf9

  • SHA1

    9f19d11d8722e3cc9ae3676576e16b9f220d1a00

  • SHA256

    cfc678b3c41de2924916997fea1d3c9fa28b6e64d32fdd1511b7da0f021b6e17

  • SHA512

    7c4774615634d8427fb174cd0334ec8504dcf199b8ee48a1ae478cde158c64d38b4b2acb0f8fe877619dcbe1b62fe44406b8742501d4b83a1c3c677e0b6fa277

  • SSDEEP

    768:7Y1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLSnVtPCv6NFZhfyDG7aUf2hSn:7KfgLdQAQfcfymN+VtlhfxaUfTn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3248
      • C:\Users\Admin\AppData\Local\Temp\cfc678b3c41de2924916997fea1d3c9fa28b6e64d32fdd1511b7da0f021b6e17.exe
        "C:\Users\Admin\AppData\Local\Temp\cfc678b3c41de2924916997fea1d3c9fa28b6e64d32fdd1511b7da0f021b6e17.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3036
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a733C.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1112
          • C:\Users\Admin\AppData\Local\Temp\cfc678b3c41de2924916997fea1d3c9fa28b6e64d32fdd1511b7da0f021b6e17.exe
            "C:\Users\Admin\AppData\Local\Temp\cfc678b3c41de2924916997fea1d3c9fa28b6e64d32fdd1511b7da0f021b6e17.exe"
            4⤵
            • Executes dropped EXE
            PID:1956
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4156
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4324
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3008
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
        1⤵
          PID:4700
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4576

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          251KB

          MD5

          69f6da654a3a49de8590243642d590c3

          SHA1

          f78aaa784459c8ae30c9a3c4d3859e2c865fa1f8

          SHA256

          56be6a70c7a51c57f12564c5da636e21c3238a085f6dcdb3ffcb3d3e61d4ccc8

          SHA512

          3bd6cf50d13e42ce4264c24b67bccf93e45d360bcecf496df62e22678dbccd8ddc774e575bcd83332fcdf13e2b8f6b4a40df30ec07decf5915dfdeedae21e684

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          484KB

          MD5

          4e68211d5ca5b4384780da7163aca122

          SHA1

          067ede6d5d2e700aede8416cbc1344b48bc7f403

          SHA256

          3fc8a84a337c74c13ea397c9fd998726b36ccab37404f05a3460c0ee4be2d38d

          SHA512

          9e0d960b1bba53fef5641d5b26ac1798547882cf3d556d58a14bdaf30c00dd5e88b569a7ea362f9f60c92b001aa3267e1968854f45f0897f4b27fdacf16f14de

        • C:\Users\Admin\AppData\Local\Temp\$$a733C.bat

          Filesize

          722B

          MD5

          2213521aeeeb707b3ea2ecb09349b523

          SHA1

          9562eaad51911c760aac5b59a07d79f8edffa113

          SHA256

          e7d8d59be706c677bdfcaffe99df3d4b1c877f3442b4cefc6ae66224ade6ad8e

          SHA512

          9b757ef835145b507a9249ac672885fdd2c434572b72d44a8f82dbbc53fa7db89af8aa2c0cff297934fa1c675b78d634d6a47516cb7da253c8864e8a2aca3a5d

        • C:\Users\Admin\AppData\Local\Temp\cfc678b3c41de2924916997fea1d3c9fa28b6e64d32fdd1511b7da0f021b6e17.exe

          Filesize

          20KB

          MD5

          eb0efb5a05aee8f8a6f685fbb0f29a04

          SHA1

          0fcd8c62db64b9b28c10969ba8729a78254aeef0

          SHA256

          167b2f7a37aa70859ad94cb2637c86cdeed06beb573343bcbcc653c45cb6bbc6

          SHA512

          82af250491356e58cb4f6efa239fa4d84f834578db429c707d829a4baf211095a94accd17f6e6f10c38c48ce559bf08ecf53365b0290728d342ec8ed0276a049

        • C:\Users\Admin\AppData\Local\Temp\cfc678b3c41de2924916997fea1d3c9fa28b6e64d32fdd1511b7da0f021b6e17.exe.exe

          Filesize

          20KB

          MD5

          eb0efb5a05aee8f8a6f685fbb0f29a04

          SHA1

          0fcd8c62db64b9b28c10969ba8729a78254aeef0

          SHA256

          167b2f7a37aa70859ad94cb2637c86cdeed06beb573343bcbcc653c45cb6bbc6

          SHA512

          82af250491356e58cb4f6efa239fa4d84f834578db429c707d829a4baf211095a94accd17f6e6f10c38c48ce559bf08ecf53365b0290728d342ec8ed0276a049

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          28948521636f027a6e321d0ece85f68b

          SHA1

          4cc393871c2174328558347094d44cef430836d9

          SHA256

          37d128b4b8f41d2ed52a38ef4b628fa082d4693729b1af11d4067a1781a1a197

          SHA512

          2952a8aca9924a6c5a1dbdb94f79a9da49696e88c06f50ca1ce3390efb2b9bb86c8fd1184a160e810485c8f7ff11bc0d58c22787877ae5a46c66d1a6a8173c3b

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          28948521636f027a6e321d0ece85f68b

          SHA1

          4cc393871c2174328558347094d44cef430836d9

          SHA256

          37d128b4b8f41d2ed52a38ef4b628fa082d4693729b1af11d4067a1781a1a197

          SHA512

          2952a8aca9924a6c5a1dbdb94f79a9da49696e88c06f50ca1ce3390efb2b9bb86c8fd1184a160e810485c8f7ff11bc0d58c22787877ae5a46c66d1a6a8173c3b

        • C:\Windows\rundl132.exe

          Filesize

          26KB

          MD5

          28948521636f027a6e321d0ece85f68b

          SHA1

          4cc393871c2174328558347094d44cef430836d9

          SHA256

          37d128b4b8f41d2ed52a38ef4b628fa082d4693729b1af11d4067a1781a1a197

          SHA512

          2952a8aca9924a6c5a1dbdb94f79a9da49696e88c06f50ca1ce3390efb2b9bb86c8fd1184a160e810485c8f7ff11bc0d58c22787877ae5a46c66d1a6a8173c3b

        • F:\$RECYCLE.BIN\S-1-5-21-2344688013-2965468717-2034126-1000\_desktop.ini

          Filesize

          9B

          MD5

          0387f4acd0cfa16ac07fab88bff7f344

          SHA1

          60da1a37a16077ad337f6a91cc4acb9fba2940b3

          SHA256

          0b1b21f717a6f4add9692073f01b9b560898213b197ef3b47165d56be17c617d

          SHA512

          7d52216da22ceed1afe2b9d31fcea1798b2879eb6426d3634f38b7ea296627c516ff022d3cfe34df3aac4fa6fb6e2ad8eb21d2c9c040c83c53ea79487b1d13ab

        • memory/3036-0-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3036-12-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4156-32-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4156-4456-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4156-37-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4156-41-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4156-19-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4156-1278-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4156-8-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4156-26-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4156-4810-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4576-4811-0x0000018C613A0000-0x0000018C613B0000-memory.dmp

          Filesize

          64KB

        • memory/4576-4827-0x0000018C614A0000-0x0000018C614B0000-memory.dmp

          Filesize

          64KB

        • memory/4576-4843-0x0000018C69810000-0x0000018C69811000-memory.dmp

          Filesize

          4KB

        • memory/4576-4845-0x0000018C69840000-0x0000018C69841000-memory.dmp

          Filesize

          4KB

        • memory/4576-4846-0x0000018C69840000-0x0000018C69841000-memory.dmp

          Filesize

          4KB

        • memory/4576-4847-0x0000018C69950000-0x0000018C69951000-memory.dmp

          Filesize

          4KB