Analysis

  • max time kernel
    171s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 22:47

General

  • Target

    02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe

  • Size

    3.0MB

  • MD5

    7c82501f3619bfe3de10c12f2481e140

  • SHA1

    75d0eb6c246c8956651be36a0419d5553dc6665c

  • SHA256

    02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9

  • SHA512

    4e13dd0adde99ce7ecbdf3cf5d5af559e7325b7a72113116f2c3135935b9651adf5ca51ed9a3edfa2c37f0a03310fe9c10383741a3e43412733880246974680e

  • SSDEEP

    49152:Y7Digy13TW4jFCs2pfRdO8u60N1xcdd9gVIkdqfvEAkqcPI:M3Ts21i8WN1igVIf6O

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe
    "C:\Users\Admin\AppData\Local\Temp\02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE2BF.bat
      2⤵
        PID:5040
        • C:\Users\Admin\AppData\Local\Temp\02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe
          "C:\Users\Admin\AppData\Local\Temp\02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe"
          3⤵
          • Executes dropped EXE
          PID:2128
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3644
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4404
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:4428
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:3148

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files\7-Zip\7z.exe

                Filesize

                484KB

                MD5

                4e68211d5ca5b4384780da7163aca122

                SHA1

                067ede6d5d2e700aede8416cbc1344b48bc7f403

                SHA256

                3fc8a84a337c74c13ea397c9fd998726b36ccab37404f05a3460c0ee4be2d38d

                SHA512

                9e0d960b1bba53fef5641d5b26ac1798547882cf3d556d58a14bdaf30c00dd5e88b569a7ea362f9f60c92b001aa3267e1968854f45f0897f4b27fdacf16f14de

              • C:\Users\Admin\AppData\Local\Temp\$$aE2BF.bat

                Filesize

                722B

                MD5

                353270f7ec3a8e1206fc71eefe733bb7

                SHA1

                912c36a00c5d5a3d1935acb40de7107042ef6efd

                SHA256

                7fcab9dff247067d95157acb8db0f846dab6ecea5289930580dd6ca78b95912a

                SHA512

                6ddc6c7936753be953f43ed2f90c3eea7c78bc7b35789638dfaa66bd6cce680f94f60fe3557e9f31b857a0f71d5d024595027637544adf6744e5847809f58d7a

              • C:\Users\Admin\AppData\Local\Temp\02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe

                Filesize

                3.0MB

                MD5

                04e531df8ac0a7696570554ad87199da

                SHA1

                d6cf2a47536e08f1a27ed128a2d8f5288ec97e05

                SHA256

                f7aaad011fc7ed4d33e662641066e4808b42771b1228c352f3d68afa7fd0af44

                SHA512

                79e19742b537fff213b17b350b3b61c76a9ac8533707bed45224b6a72c02f9eebe351c4c8537cca1451060d8703ea2fe95da1b1a4c34fdb96b141b88237ce5b9

              • C:\Users\Admin\AppData\Local\Temp\02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe.exe

                Filesize

                3.0MB

                MD5

                04e531df8ac0a7696570554ad87199da

                SHA1

                d6cf2a47536e08f1a27ed128a2d8f5288ec97e05

                SHA256

                f7aaad011fc7ed4d33e662641066e4808b42771b1228c352f3d68afa7fd0af44

                SHA512

                79e19742b537fff213b17b350b3b61c76a9ac8533707bed45224b6a72c02f9eebe351c4c8537cca1451060d8703ea2fe95da1b1a4c34fdb96b141b88237ce5b9

              • C:\Windows\Logo1_.exe

                Filesize

                26KB

                MD5

                28948521636f027a6e321d0ece85f68b

                SHA1

                4cc393871c2174328558347094d44cef430836d9

                SHA256

                37d128b4b8f41d2ed52a38ef4b628fa082d4693729b1af11d4067a1781a1a197

                SHA512

                2952a8aca9924a6c5a1dbdb94f79a9da49696e88c06f50ca1ce3390efb2b9bb86c8fd1184a160e810485c8f7ff11bc0d58c22787877ae5a46c66d1a6a8173c3b

              • C:\Windows\Logo1_.exe

                Filesize

                26KB

                MD5

                28948521636f027a6e321d0ece85f68b

                SHA1

                4cc393871c2174328558347094d44cef430836d9

                SHA256

                37d128b4b8f41d2ed52a38ef4b628fa082d4693729b1af11d4067a1781a1a197

                SHA512

                2952a8aca9924a6c5a1dbdb94f79a9da49696e88c06f50ca1ce3390efb2b9bb86c8fd1184a160e810485c8f7ff11bc0d58c22787877ae5a46c66d1a6a8173c3b

              • C:\Windows\rundl132.exe

                Filesize

                26KB

                MD5

                28948521636f027a6e321d0ece85f68b

                SHA1

                4cc393871c2174328558347094d44cef430836d9

                SHA256

                37d128b4b8f41d2ed52a38ef4b628fa082d4693729b1af11d4067a1781a1a197

                SHA512

                2952a8aca9924a6c5a1dbdb94f79a9da49696e88c06f50ca1ce3390efb2b9bb86c8fd1184a160e810485c8f7ff11bc0d58c22787877ae5a46c66d1a6a8173c3b

              • F:\$RECYCLE.BIN\S-1-5-21-919254492-3979293997-764407192-1000\_desktop.ini

                Filesize

                10B

                MD5

                81570c50286369016cef7a9f904c4b04

                SHA1

                b5758b23667cb35cad0adb23371b830fcee4f4e5

                SHA256

                b882f41a5c84d248a75714eaf215a9e363a49361b6a14beedb921ee3dfdb46a1

                SHA512

                0e6c479b0252e24635810b7d030cc9b5b17603ee20ccf62812446b8d15884521c6c7be65dfc0090bb1502e859fae27c2a63b3e58be714021f473a88407982162

              • memory/3296-8-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3296-0-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3644-12-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3644-26-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3644-32-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3644-37-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3644-41-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3644-19-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3644-1278-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3644-1397-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3644-2110-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB