Analysis

  • max time kernel
    152s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 22:48

General

  • Target

    8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe

  • Size

    59KB

  • MD5

    70e60a07fc5ec3cfecad11f9d7e8b644

  • SHA1

    f62e04a8b05c22c0bf7522359428f720714e9206

  • SHA256

    8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7

  • SHA512

    e2cdbf9d3218342fdd3f895b2d7e54f16e3c34f58fd3c2cd7fb42fbb034b208dfac43710fb8bb58f68c27855f7dbf53e3846bb4e1fa0a92f508d7ca4b2cc3605

  • SSDEEP

    1536:dfgLdQAQfcfymNf+nHDUSLxXtDxZHMJhpuNUsRln:dftffjmNuUSLx9DeptQln

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe
        "C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a96F2.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1848
          • C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe
            "C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe"
            4⤵
            • Executes dropped EXE
            PID:2756
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3060
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2604

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\$$a96F2.bat

        Filesize

        722B

        MD5

        323fe521926560a69b8928ebeec26488

        SHA1

        284b26eebb1924c8e03ee0af69b403ce3f25b6b5

        SHA256

        a83e1f0840186b6b0adee23178ef96a8656a10a6d838c5e0c6f2ac068957c319

        SHA512

        8f35766e5b9d5c33be15ef8666b4b721b72fbdd71f0344ec867ac55d247a2f11d633dfc541fc043efb765be01649c0befe8b3cb7293c4ef5343e5664fa309483

      • C:\Users\Admin\AppData\Local\Temp\$$a96F2.bat

        Filesize

        722B

        MD5

        323fe521926560a69b8928ebeec26488

        SHA1

        284b26eebb1924c8e03ee0af69b403ce3f25b6b5

        SHA256

        a83e1f0840186b6b0adee23178ef96a8656a10a6d838c5e0c6f2ac068957c319

        SHA512

        8f35766e5b9d5c33be15ef8666b4b721b72fbdd71f0344ec867ac55d247a2f11d633dfc541fc043efb765be01649c0befe8b3cb7293c4ef5343e5664fa309483

      • C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe

        Filesize

        33KB

        MD5

        8d05ecf2ab1c6977a588ea5d668050ab

        SHA1

        ba402e1035ec8f5d1c686752584993395aa9e1b9

        SHA256

        caa73b1e0d729f03de5e8deee8316dd0e1976f1ba3fedb0c6a85dd4096c109d3

        SHA512

        4827c4aab9ffc7a9857e399b8b8480fe842a61e92193ab50ca6ed557884d64458c4bce9f4d2ca2105bcd2276098bc61e0c6968e9cf6b1d881ab6dea2c3945c88

      • C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe.exe

        Filesize

        33KB

        MD5

        8d05ecf2ab1c6977a588ea5d668050ab

        SHA1

        ba402e1035ec8f5d1c686752584993395aa9e1b9

        SHA256

        caa73b1e0d729f03de5e8deee8316dd0e1976f1ba3fedb0c6a85dd4096c109d3

        SHA512

        4827c4aab9ffc7a9857e399b8b8480fe842a61e92193ab50ca6ed557884d64458c4bce9f4d2ca2105bcd2276098bc61e0c6968e9cf6b1d881ab6dea2c3945c88

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        3b3bb3d8ab4a2a4e6d740495a52d6e25

        SHA1

        a97eacc11f455bcb7de6b924df8a64d99062ce34

        SHA256

        12c99fb5c6b78e193dd16bc5eb659b4a7510e51fef318914ad76414bec69a4a2

        SHA512

        d70b5417117116c85e790150f311f489e25104861ffb0888bcdf7b6ab8411e2777318801eb97552ae5e373aaf21c142e16f9871326d630c6335ad80031c738ee

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        3b3bb3d8ab4a2a4e6d740495a52d6e25

        SHA1

        a97eacc11f455bcb7de6b924df8a64d99062ce34

        SHA256

        12c99fb5c6b78e193dd16bc5eb659b4a7510e51fef318914ad76414bec69a4a2

        SHA512

        d70b5417117116c85e790150f311f489e25104861ffb0888bcdf7b6ab8411e2777318801eb97552ae5e373aaf21c142e16f9871326d630c6335ad80031c738ee

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        3b3bb3d8ab4a2a4e6d740495a52d6e25

        SHA1

        a97eacc11f455bcb7de6b924df8a64d99062ce34

        SHA256

        12c99fb5c6b78e193dd16bc5eb659b4a7510e51fef318914ad76414bec69a4a2

        SHA512

        d70b5417117116c85e790150f311f489e25104861ffb0888bcdf7b6ab8411e2777318801eb97552ae5e373aaf21c142e16f9871326d630c6335ad80031c738ee

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        3b3bb3d8ab4a2a4e6d740495a52d6e25

        SHA1

        a97eacc11f455bcb7de6b924df8a64d99062ce34

        SHA256

        12c99fb5c6b78e193dd16bc5eb659b4a7510e51fef318914ad76414bec69a4a2

        SHA512

        d70b5417117116c85e790150f311f489e25104861ffb0888bcdf7b6ab8411e2777318801eb97552ae5e373aaf21c142e16f9871326d630c6335ad80031c738ee

      • F:\$RECYCLE.BIN\S-1-5-21-3185155662-718608226-894467740-1000\_desktop.ini

        Filesize

        10B

        MD5

        81570c50286369016cef7a9f904c4b04

        SHA1

        b5758b23667cb35cad0adb23371b830fcee4f4e5

        SHA256

        b882f41a5c84d248a75714eaf215a9e363a49361b6a14beedb921ee3dfdb46a1

        SHA512

        0e6c479b0252e24635810b7d030cc9b5b17603ee20ccf62812446b8d15884521c6c7be65dfc0090bb1502e859fae27c2a63b3e58be714021f473a88407982162

      • \Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe

        Filesize

        33KB

        MD5

        8d05ecf2ab1c6977a588ea5d668050ab

        SHA1

        ba402e1035ec8f5d1c686752584993395aa9e1b9

        SHA256

        caa73b1e0d729f03de5e8deee8316dd0e1976f1ba3fedb0c6a85dd4096c109d3

        SHA512

        4827c4aab9ffc7a9857e399b8b8480fe842a61e92193ab50ca6ed557884d64458c4bce9f4d2ca2105bcd2276098bc61e0c6968e9cf6b1d881ab6dea2c3945c88

      • memory/1252-30-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

        Filesize

        4KB

      • memory/2044-34-0x00000000002C0000-0x00000000002F4000-memory.dmp

        Filesize

        208KB

      • memory/2044-17-0x00000000002C0000-0x00000000002F4000-memory.dmp

        Filesize

        208KB

      • memory/2044-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-12-0x00000000002C0000-0x00000000002F4000-memory.dmp

        Filesize

        208KB

      • memory/2044-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2576-52-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2576-104-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2576-35-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2576-1859-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2576-1438-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2576-622-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2576-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2576-281-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2576-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2576-98-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2756-38-0x0000000004D40000-0x0000000004D80000-memory.dmp

        Filesize

        256KB

      • memory/2756-46-0x0000000004D40000-0x0000000004D80000-memory.dmp

        Filesize

        256KB

      • memory/2756-32-0x0000000073FD0000-0x00000000746BE000-memory.dmp

        Filesize

        6.9MB

      • memory/2756-33-0x00000000009F0000-0x00000000009FE000-memory.dmp

        Filesize

        56KB

      • memory/2756-36-0x0000000073FD0000-0x00000000746BE000-memory.dmp

        Filesize

        6.9MB