Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2023, 15:26

General

  • Target

    eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe

  • Size

    168KB

  • MD5

    b78fa119b0f670308d842d5c8c1ccbd1

  • SHA1

    452a2ba1e7e29ef83082285ebbeeb7e878964e38

  • SHA256

    eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8

  • SHA512

    df6f7057d41bc254185bca58598ae1d0fc7f366e000c637f0d0b9960426e7c9e425df287c27c61fe631386112ba73bb8f348f7a8d18a92693356f73ea99a1605

  • SSDEEP

    3072:AftffhJCuUq2aACAMfVxHsjqUwkMejsRkCdvR0FlgHIRXmUa9Il6:AVfhguD2dMQRcR0FZXpw

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe
        "C:\Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1492
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a4AA7.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2880
          • C:\Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe
            "C:\Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe"
            4⤵
            • Executes dropped EXE
            PID:2748
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2292
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2704
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1944

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              caee131315efa751ebd002e137cbfcee

              SHA1

              83a35c118b2a8b1327ef95d608ed2e1b8068e57e

              SHA256

              512774feac23e5acd64ba67883e932f9f5bccb5139e48656acedb62a3d202c7c

              SHA512

              e0b19a2e3c6932802dd43fbfcfe8de5ec860af2f1da72fe4f99e5f214ca53ee87dce9a5457969d5637b12ac3afcd1e2209e64b524a8bea9490ce2dd7616c2a23

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              f9fc019eacb573ec828d2d9ff6a48318

              SHA1

              b91958dc8d178b6eeb35e829bab84d0fb12c2280

              SHA256

              bf9ba3df2bad76d15f4efe42c0c59f37b9454907958892df8ab996552658934e

              SHA512

              998ba7bc7cdd5df3e1acfda6f4f92ec9d27732e1e182177dff310f3c918f3be99626a3526bebdff5bb7eb980640434baf56e0f08bfd125168c0a9e37e7239305

            • C:\Users\Admin\AppData\Local\Temp\$$a4AA7.bat

              Filesize

              722B

              MD5

              c0158fb91fb8c9a621eba9338f5ff175

              SHA1

              44882966e283d2661927d45c95360457a4da3a0d

              SHA256

              20ce42a177f26446d2760c130050f513a632861c6315c6378d1116afa93e7185

              SHA512

              5df32bfe98ff7dac5f6b6eaa4bb325bf8923e6b4f4c465d81995477b6a4e56dab9071117a30f69965a99b99ff336fb4dab16f8cd36c69a76381acb597a0a25ce

            • C:\Users\Admin\AppData\Local\Temp\$$a4AA7.bat

              Filesize

              722B

              MD5

              c0158fb91fb8c9a621eba9338f5ff175

              SHA1

              44882966e283d2661927d45c95360457a4da3a0d

              SHA256

              20ce42a177f26446d2760c130050f513a632861c6315c6378d1116afa93e7185

              SHA512

              5df32bfe98ff7dac5f6b6eaa4bb325bf8923e6b4f4c465d81995477b6a4e56dab9071117a30f69965a99b99ff336fb4dab16f8cd36c69a76381acb597a0a25ce

            • C:\Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe

              Filesize

              141KB

              MD5

              5a432a042dae460abe7199b758e8606c

              SHA1

              821b965267ee15c6c59178777ae7a8dcfc80f4ba

              SHA256

              6e5d1f477d290905be27cebf9572bac6b05ffef2fad901d3c8e11f665f8b9a71

              SHA512

              72823cc212c585a8080122c416e66fe28cb5a1787ae384d52b2068aec4a16944ed10731c622c1db0d8035aee7b5706bc7d2a4e6295a6ce3e50eb4895cc968c75

            • C:\Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe.exe

              Filesize

              141KB

              MD5

              5a432a042dae460abe7199b758e8606c

              SHA1

              821b965267ee15c6c59178777ae7a8dcfc80f4ba

              SHA256

              6e5d1f477d290905be27cebf9572bac6b05ffef2fad901d3c8e11f665f8b9a71

              SHA512

              72823cc212c585a8080122c416e66fe28cb5a1787ae384d52b2068aec4a16944ed10731c622c1db0d8035aee7b5706bc7d2a4e6295a6ce3e50eb4895cc968c75

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              78761f691ce89e5780f17a32aca842dc

              SHA1

              41d328d56c86eafcc5fbc9505f4d3815c31db648

              SHA256

              449ac0cadf5032548397b51ec9af0353a900dd337bab222504b4bd516f054812

              SHA512

              dba1b6a631327c3b106f9e9f93aae3a75c4d0b1866ea7a1ad9e2b4a65df5d8eee12ee7861d497671cd409d92ff2ec3fc0e91a59058fceac242734264d6c6b142

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              78761f691ce89e5780f17a32aca842dc

              SHA1

              41d328d56c86eafcc5fbc9505f4d3815c31db648

              SHA256

              449ac0cadf5032548397b51ec9af0353a900dd337bab222504b4bd516f054812

              SHA512

              dba1b6a631327c3b106f9e9f93aae3a75c4d0b1866ea7a1ad9e2b4a65df5d8eee12ee7861d497671cd409d92ff2ec3fc0e91a59058fceac242734264d6c6b142

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              78761f691ce89e5780f17a32aca842dc

              SHA1

              41d328d56c86eafcc5fbc9505f4d3815c31db648

              SHA256

              449ac0cadf5032548397b51ec9af0353a900dd337bab222504b4bd516f054812

              SHA512

              dba1b6a631327c3b106f9e9f93aae3a75c4d0b1866ea7a1ad9e2b4a65df5d8eee12ee7861d497671cd409d92ff2ec3fc0e91a59058fceac242734264d6c6b142

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              78761f691ce89e5780f17a32aca842dc

              SHA1

              41d328d56c86eafcc5fbc9505f4d3815c31db648

              SHA256

              449ac0cadf5032548397b51ec9af0353a900dd337bab222504b4bd516f054812

              SHA512

              dba1b6a631327c3b106f9e9f93aae3a75c4d0b1866ea7a1ad9e2b4a65df5d8eee12ee7861d497671cd409d92ff2ec3fc0e91a59058fceac242734264d6c6b142

            • F:\$RECYCLE.BIN\S-1-5-21-607259312-1573743425-2763420908-1000\_desktop.ini

              Filesize

              9B

              MD5

              0387f4acd0cfa16ac07fab88bff7f344

              SHA1

              60da1a37a16077ad337f6a91cc4acb9fba2940b3

              SHA256

              0b1b21f717a6f4add9692073f01b9b560898213b197ef3b47165d56be17c617d

              SHA512

              7d52216da22ceed1afe2b9d31fcea1798b2879eb6426d3634f38b7ea296627c516ff022d3cfe34df3aac4fa6fb6e2ad8eb21d2c9c040c83c53ea79487b1d13ab

            • \Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe

              Filesize

              141KB

              MD5

              5a432a042dae460abe7199b758e8606c

              SHA1

              821b965267ee15c6c59178777ae7a8dcfc80f4ba

              SHA256

              6e5d1f477d290905be27cebf9572bac6b05ffef2fad901d3c8e11f665f8b9a71

              SHA512

              72823cc212c585a8080122c416e66fe28cb5a1787ae384d52b2068aec4a16944ed10731c622c1db0d8035aee7b5706bc7d2a4e6295a6ce3e50eb4895cc968c75

            • memory/1192-29-0x0000000002A70000-0x0000000002A71000-memory.dmp

              Filesize

              4KB

            • memory/1492-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1492-31-0x0000000000310000-0x0000000000344000-memory.dmp

              Filesize

              208KB

            • memory/1492-12-0x0000000000310000-0x0000000000344000-memory.dmp

              Filesize

              208KB

            • memory/1492-16-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2292-40-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2292-46-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2292-92-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2292-99-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2292-154-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2292-1851-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2292-21-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2292-3311-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2292-32-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB