Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2023, 14:53

General

  • Target

    f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe

  • Size

    239KB

  • MD5

    e901a439877039b187d424356f5b7167

  • SHA1

    4ff344a889fae1b21208ab1cb4472f7f94edf831

  • SHA256

    f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138

  • SHA512

    1e74c2c3c2d52ec301d2b930223710fcd32256677e3957d27a39e8eaeccf852f3a6f5163bc94bf4dbdff9256ffba6ffe34436b19c361f297b98cce9ee772ff08

  • SSDEEP

    3072:aftffjmNXqcVz5fzsTl4dsOc6v2vTzwU+Pho86meq+FaSoB2+vSHrX:aVfjmN6cT93PiY+Fa7BdvGX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2496
      • C:\Users\Admin\AppData\Local\Temp\f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe
        "C:\Users\Admin\AppData\Local\Temp\f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:368
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5FE3.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:956
          • C:\Users\Admin\AppData\Local\Temp\f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe
            "C:\Users\Admin\AppData\Local\Temp\f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe"
            4⤵
            • Executes dropped EXE
            PID:2468
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4244
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:316
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4492

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              8591b14f2c92328b95455ec670799642

              SHA1

              d17c6a31a66dbd3cc53961d2f0e85fdb605af667

              SHA256

              ce9bfeb973ae43c94157901c348098551f599a8ad1ed62dc845ad9198c029182

              SHA512

              cf2dfde459a660000e0af861be7708218537319040b220972de5aeca886f8e520f26dcf05902e4b3875ae6bf34576a18334064f100550bb15125c3a46a97445c

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              484KB

              MD5

              7322201ea1f1128a2d6bdea39cc37b8e

              SHA1

              c646cd395d37fda6aa3a6a831b205b7cf39fa147

              SHA256

              c3f63033404d2b285b0eba68635f6971debbbb9654b4444b2d0876f214a817b9

              SHA512

              fe32ba19f98b1f8a28fc32f035778c3fc1a97b52fa1ec6aa10c9a141b82b533752ad7d3f3b9461338e15053305f686432e454b73c05b1976753e04b723733cf0

            • C:\Users\Admin\AppData\Local\Temp\$$a5FE3.bat

              Filesize

              722B

              MD5

              87e3fe898e4cfcf357f6d927d0f21c7c

              SHA1

              6fe6c7ecdcbdafe3625a808e420a45c7fbf0b786

              SHA256

              dcf07a4b1f76e40e8bd7ffdc5ab07bf5f4c3aaf15c91906f9cf52fcf5e3a58bd

              SHA512

              be6af798f939e362b0ac2eaafd856855b2bb611a87c6a8c38159d8bfefef232447ef0817f020619995ef8c6779f5474c1d138073d7dfa2843703f913b8844a6c

            • C:\Users\Admin\AppData\Local\Temp\f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe

              Filesize

              213KB

              MD5

              20d89d1781cde87db3a8b59da816efcc

              SHA1

              4f6670c4dcd8d978b21d1db91e081e609f5abcd0

              SHA256

              4653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983

              SHA512

              7b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e

            • C:\Users\Admin\AppData\Local\Temp\f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe.exe

              Filesize

              213KB

              MD5

              20d89d1781cde87db3a8b59da816efcc

              SHA1

              4f6670c4dcd8d978b21d1db91e081e609f5abcd0

              SHA256

              4653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983

              SHA512

              7b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              effabf58aa1a3a22c697a47eab559ac7

              SHA1

              48d54b1aa74e05414e98824a769682907b4cba8b

              SHA256

              142c3db22634f219899ef2f0a60a7f857419dc69d896bec778bbef38c055c5c0

              SHA512

              6bfbb7159315b1d396edf318539e152fcfbc3aa9a1f8d7737957dd3cf43bffedeee9a60b68a2b2c3cc4025316b16509b5c504eca93619e18806c57af2e5fbc39

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              effabf58aa1a3a22c697a47eab559ac7

              SHA1

              48d54b1aa74e05414e98824a769682907b4cba8b

              SHA256

              142c3db22634f219899ef2f0a60a7f857419dc69d896bec778bbef38c055c5c0

              SHA512

              6bfbb7159315b1d396edf318539e152fcfbc3aa9a1f8d7737957dd3cf43bffedeee9a60b68a2b2c3cc4025316b16509b5c504eca93619e18806c57af2e5fbc39

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              effabf58aa1a3a22c697a47eab559ac7

              SHA1

              48d54b1aa74e05414e98824a769682907b4cba8b

              SHA256

              142c3db22634f219899ef2f0a60a7f857419dc69d896bec778bbef38c055c5c0

              SHA512

              6bfbb7159315b1d396edf318539e152fcfbc3aa9a1f8d7737957dd3cf43bffedeee9a60b68a2b2c3cc4025316b16509b5c504eca93619e18806c57af2e5fbc39

            • F:\$RECYCLE.BIN\S-1-5-21-2890696111-2332180956-3312704074-1000\_desktop.ini

              Filesize

              9B

              MD5

              23e9e04bdc208ed2faea8df16fc821d5

              SHA1

              6a685f0967e907daad0ccef02d08a369103c7341

              SHA256

              2077bbb75045c2110e350ac69eb9a01de6bb4bd991c16ff10de73587781e445f

              SHA512

              64a5a2d6754b0e0dee759ef283262e9a984e9d1a12e17839a107c3fa08f437512c43b5615cc3a8db3024b5bcc62f7b9fb15611d11df69e2ed427cd0d2fb15020

            • memory/368-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/368-9-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4244-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4244-26-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4244-32-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4244-37-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4244-41-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4244-8-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4244-422-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4244-1278-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4244-4819-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB