Analysis

  • max time kernel
    152s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 23:01

General

  • Target

    6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe

  • Size

    1.5MB

  • MD5

    b4b681e775ddfe7f86ed395047aad190

  • SHA1

    95e9a4b4ece01c8314c9b7f50d2852a1cc8da330

  • SHA256

    6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2

  • SHA512

    c8b2dd4886b22811940dce1c15d9cbf929901e6f9ffa1e52ed62fd7f8e7df9a0954330de3083e3affa4008f8bc55f305b4dda608e6d9df8bf8e3f43c1988b552

  • SSDEEP

    24576:g7HIjcBsBiM6H6JlpKf8MqiJ2XyzTetFjoLUEoNICJLBPPQkkkkkkkkkkizANs:g7ojmSKYifetFjoLgNICVU+

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe
    "C:\Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2616
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\$$a50CE.bat
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe
        "C:\Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 180
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2668
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
        2⤵
          PID:2680

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        e5089fa56c8bfd5d555dc286bf3fca65

        SHA1

        9d0578a22fd2765989ebf89be734ebd8b451ead8

        SHA256

        f39d35201e7f725ea3490e21ce80632d52eebd25a54d0233fd39870d19c240be

        SHA512

        55f2d6d67aff1b9e825ae5ff486fa9abdb9c2f1498b3209cbfb20714091f1b8de19138647c6cbb6a67cea0a3dff63041396827ea3bbc8020dbec2018a0bd99d7

      • C:\Users\Admin\AppData\Local\Temp\$$a50CE.bat

        Filesize

        722B

        MD5

        302ab06cb2b45714c294bb0ad6b30fa9

        SHA1

        ebc50d13dd8002c48e73598a3169712968bef589

        SHA256

        8a9466ca062e57687d3fe264a3aff668905046c64d59af2e41f867012c66fad0

        SHA512

        c891c73547ea18c31cda670082083ee497712788fbbe0e41a16eb67331e5c5a1411524995a33d5e1dcf29ea891145bcb990f74c6b1898c13cf8acce1eac22e99

      • C:\Users\Admin\AppData\Local\Temp\$$a50CE.bat

        Filesize

        722B

        MD5

        302ab06cb2b45714c294bb0ad6b30fa9

        SHA1

        ebc50d13dd8002c48e73598a3169712968bef589

        SHA256

        8a9466ca062e57687d3fe264a3aff668905046c64d59af2e41f867012c66fad0

        SHA512

        c891c73547ea18c31cda670082083ee497712788fbbe0e41a16eb67331e5c5a1411524995a33d5e1dcf29ea891145bcb990f74c6b1898c13cf8acce1eac22e99

      • C:\Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe

        Filesize

        1.5MB

        MD5

        d36e8bf1c058ce941025f02eb291e7bf

        SHA1

        2aab7480570413b1cf0aea480987c275f932e22d

        SHA256

        fcb2193d9be5520a4594bf278abf69ee4ca0755598a3c50916050bd258921366

        SHA512

        859d71e4990b38b250d7a6f30bb241ff801d32aec716f88d48eb5a2c9a70bfd15fe7d227bad1f5612358da8438809192b42fed3017305a05aad9605b30e01e29

      • C:\Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe.exe

        Filesize

        1.5MB

        MD5

        d36e8bf1c058ce941025f02eb291e7bf

        SHA1

        2aab7480570413b1cf0aea480987c275f932e22d

        SHA256

        fcb2193d9be5520a4594bf278abf69ee4ca0755598a3c50916050bd258921366

        SHA512

        859d71e4990b38b250d7a6f30bb241ff801d32aec716f88d48eb5a2c9a70bfd15fe7d227bad1f5612358da8438809192b42fed3017305a05aad9605b30e01e29

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        6fadaac78f96d97d3ec3282e077a706c

        SHA1

        cd9739a72f76e901db6532f5274d8d9484981dcd

        SHA256

        7ff1b46578d7201e7ce8adc97ce10f566c3fec3b4aeeafea32973bbbc3732c72

        SHA512

        e0223d3bafae63c0517389afbf3b24cd78ca43dea498177a3954c88f2cf3f8390665e3259ea312d0a36e3de610e4f84c556b01abea641257ebf2d042ba566f2f

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        6fadaac78f96d97d3ec3282e077a706c

        SHA1

        cd9739a72f76e901db6532f5274d8d9484981dcd

        SHA256

        7ff1b46578d7201e7ce8adc97ce10f566c3fec3b4aeeafea32973bbbc3732c72

        SHA512

        e0223d3bafae63c0517389afbf3b24cd78ca43dea498177a3954c88f2cf3f8390665e3259ea312d0a36e3de610e4f84c556b01abea641257ebf2d042ba566f2f

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        6fadaac78f96d97d3ec3282e077a706c

        SHA1

        cd9739a72f76e901db6532f5274d8d9484981dcd

        SHA256

        7ff1b46578d7201e7ce8adc97ce10f566c3fec3b4aeeafea32973bbbc3732c72

        SHA512

        e0223d3bafae63c0517389afbf3b24cd78ca43dea498177a3954c88f2cf3f8390665e3259ea312d0a36e3de610e4f84c556b01abea641257ebf2d042ba566f2f

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        6fadaac78f96d97d3ec3282e077a706c

        SHA1

        cd9739a72f76e901db6532f5274d8d9484981dcd

        SHA256

        7ff1b46578d7201e7ce8adc97ce10f566c3fec3b4aeeafea32973bbbc3732c72

        SHA512

        e0223d3bafae63c0517389afbf3b24cd78ca43dea498177a3954c88f2cf3f8390665e3259ea312d0a36e3de610e4f84c556b01abea641257ebf2d042ba566f2f

      • F:\$RECYCLE.BIN\S-1-5-21-3849525425-30183055-657688904-1000\_desktop.ini

        Filesize

        10B

        MD5

        dbf19ca54500e964528b156763234c1d

        SHA1

        05376f86423aec8badf0adbc47887234ac83ef5a

        SHA256

        bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae

        SHA512

        fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0

      • \Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe

        Filesize

        1.5MB

        MD5

        d36e8bf1c058ce941025f02eb291e7bf

        SHA1

        2aab7480570413b1cf0aea480987c275f932e22d

        SHA256

        fcb2193d9be5520a4594bf278abf69ee4ca0755598a3c50916050bd258921366

        SHA512

        859d71e4990b38b250d7a6f30bb241ff801d32aec716f88d48eb5a2c9a70bfd15fe7d227bad1f5612358da8438809192b42fed3017305a05aad9605b30e01e29

      • \Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe

        Filesize

        1.5MB

        MD5

        d36e8bf1c058ce941025f02eb291e7bf

        SHA1

        2aab7480570413b1cf0aea480987c275f932e22d

        SHA256

        fcb2193d9be5520a4594bf278abf69ee4ca0755598a3c50916050bd258921366

        SHA512

        859d71e4990b38b250d7a6f30bb241ff801d32aec716f88d48eb5a2c9a70bfd15fe7d227bad1f5612358da8438809192b42fed3017305a05aad9605b30e01e29

      • \Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe

        Filesize

        1.5MB

        MD5

        d36e8bf1c058ce941025f02eb291e7bf

        SHA1

        2aab7480570413b1cf0aea480987c275f932e22d

        SHA256

        fcb2193d9be5520a4594bf278abf69ee4ca0755598a3c50916050bd258921366

        SHA512

        859d71e4990b38b250d7a6f30bb241ff801d32aec716f88d48eb5a2c9a70bfd15fe7d227bad1f5612358da8438809192b42fed3017305a05aad9605b30e01e29

      • \Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe

        Filesize

        1.5MB

        MD5

        d36e8bf1c058ce941025f02eb291e7bf

        SHA1

        2aab7480570413b1cf0aea480987c275f932e22d

        SHA256

        fcb2193d9be5520a4594bf278abf69ee4ca0755598a3c50916050bd258921366

        SHA512

        859d71e4990b38b250d7a6f30bb241ff801d32aec716f88d48eb5a2c9a70bfd15fe7d227bad1f5612358da8438809192b42fed3017305a05aad9605b30e01e29

      • \Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe

        Filesize

        1.5MB

        MD5

        d36e8bf1c058ce941025f02eb291e7bf

        SHA1

        2aab7480570413b1cf0aea480987c275f932e22d

        SHA256

        fcb2193d9be5520a4594bf278abf69ee4ca0755598a3c50916050bd258921366

        SHA512

        859d71e4990b38b250d7a6f30bb241ff801d32aec716f88d48eb5a2c9a70bfd15fe7d227bad1f5612358da8438809192b42fed3017305a05aad9605b30e01e29

      • \Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe

        Filesize

        1.5MB

        MD5

        d36e8bf1c058ce941025f02eb291e7bf

        SHA1

        2aab7480570413b1cf0aea480987c275f932e22d

        SHA256

        fcb2193d9be5520a4594bf278abf69ee4ca0755598a3c50916050bd258921366

        SHA512

        859d71e4990b38b250d7a6f30bb241ff801d32aec716f88d48eb5a2c9a70bfd15fe7d227bad1f5612358da8438809192b42fed3017305a05aad9605b30e01e29

      • \Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe

        Filesize

        1.5MB

        MD5

        d36e8bf1c058ce941025f02eb291e7bf

        SHA1

        2aab7480570413b1cf0aea480987c275f932e22d

        SHA256

        fcb2193d9be5520a4594bf278abf69ee4ca0755598a3c50916050bd258921366

        SHA512

        859d71e4990b38b250d7a6f30bb241ff801d32aec716f88d48eb5a2c9a70bfd15fe7d227bad1f5612358da8438809192b42fed3017305a05aad9605b30e01e29

      • \Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe

        Filesize

        1.5MB

        MD5

        d36e8bf1c058ce941025f02eb291e7bf

        SHA1

        2aab7480570413b1cf0aea480987c275f932e22d

        SHA256

        fcb2193d9be5520a4594bf278abf69ee4ca0755598a3c50916050bd258921366

        SHA512

        859d71e4990b38b250d7a6f30bb241ff801d32aec716f88d48eb5a2c9a70bfd15fe7d227bad1f5612358da8438809192b42fed3017305a05aad9605b30e01e29

      • \Users\Admin\AppData\Local\Temp\6e934866fe552fed9caf8a3f9b0322f7a6a07dbd2e7eff5cf1a829f630b445e2.exe

        Filesize

        1.5MB

        MD5

        d36e8bf1c058ce941025f02eb291e7bf

        SHA1

        2aab7480570413b1cf0aea480987c275f932e22d

        SHA256

        fcb2193d9be5520a4594bf278abf69ee4ca0755598a3c50916050bd258921366

        SHA512

        859d71e4990b38b250d7a6f30bb241ff801d32aec716f88d48eb5a2c9a70bfd15fe7d227bad1f5612358da8438809192b42fed3017305a05aad9605b30e01e29

      • memory/1260-36-0x0000000002B60000-0x0000000002B61000-memory.dmp

        Filesize

        4KB

      • memory/2440-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2440-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2440-20-0x00000000003B0000-0x00000000003E4000-memory.dmp

        Filesize

        208KB

      • memory/2616-53-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2616-47-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2616-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2616-71-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2616-100-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2616-106-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2616-118-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2616-1733-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2616-1860-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2616-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB