Analysis

  • max time kernel
    153s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 23:34

General

  • Target

    e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe

  • Size

    1.2MB

  • MD5

    cc65649a3b3f111c5cdc366def31bb7d

  • SHA1

    767adfea06b0506d969741e5aeea5b94577bcd80

  • SHA256

    e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f

  • SHA512

    93448435482ce9110672c1af9dc2bedac8593a53c511317b34a04f18335fbff0f5818dc92860bf95e5ca064a20bd9a150dee03a75126c13dac757cb0860cd91c

  • SSDEEP

    24576:L7jFDh3ih3XeodfDaJbTG6HAAr4EttjIenf+Yz+/:L7jFF3iBzdLOb5Hp48tgB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe
        "C:\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2576
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a93B7.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2996
          • C:\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe
            "C:\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe"
            4⤵
            • Executes dropped EXE
            PID:3024
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2640
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2364

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        8ee4869d45087b8936368461175ec914

        SHA1

        51657e90d3c86ce5b770fa493e8bfb176bf60a5b

        SHA256

        55811b05b7c8d3e815647b2576711768f69ee3ac73f7ba162b663b8512af9304

        SHA512

        ad593034984ec8ab548f2c85d88568905ce15c2ac8335072e47d5cbe364199c3ce34dc98809db13ce835abf940ac86ffbe79f91f45566e1a843b6620c4c25783

      • C:\Users\Admin\AppData\Local\Temp\$$a93B7.bat

        Filesize

        722B

        MD5

        4fed66ea8b6a7dc6960bd0f4147a54c1

        SHA1

        ec868cdf9446a2ee8ae7aa613dc7cca2c601ad14

        SHA256

        ac7d9d4372cb746bd1c8bb055a9d273cdae75d0a83d8167257c1579c98630436

        SHA512

        20785e621981a453a1bfae192b0fe6373dbddd19dbd6d56b12367f37367ecbe7f7f933c6f4e152d28357d3a297a57feacaff3d041b2c4b7b59a685e7795647e0

      • C:\Users\Admin\AppData\Local\Temp\$$a93B7.bat

        Filesize

        722B

        MD5

        4fed66ea8b6a7dc6960bd0f4147a54c1

        SHA1

        ec868cdf9446a2ee8ae7aa613dc7cca2c601ad14

        SHA256

        ac7d9d4372cb746bd1c8bb055a9d273cdae75d0a83d8167257c1579c98630436

        SHA512

        20785e621981a453a1bfae192b0fe6373dbddd19dbd6d56b12367f37367ecbe7f7f933c6f4e152d28357d3a297a57feacaff3d041b2c4b7b59a685e7795647e0

      • C:\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe

        Filesize

        1.2MB

        MD5

        b1519cbcbf4f6be2304c0641c38204f3

        SHA1

        8d981b9c5eca16108ec5982c8733281f7e18d67c

        SHA256

        8afbe1aa9a763d1826f44c2446454ffcffcd2fe9392fc4f527520e4acfdfffa2

        SHA512

        b487747d0b357760e590c9c7f3711c0cbac734888f6b21cdcd7af83972d1281ad980c6ab2a113163ee318a096a95aa7ff7a1d9fdb916ad05cddd98a643187df9

      • C:\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe.exe

        Filesize

        1.2MB

        MD5

        b1519cbcbf4f6be2304c0641c38204f3

        SHA1

        8d981b9c5eca16108ec5982c8733281f7e18d67c

        SHA256

        8afbe1aa9a763d1826f44c2446454ffcffcd2fe9392fc4f527520e4acfdfffa2

        SHA512

        b487747d0b357760e590c9c7f3711c0cbac734888f6b21cdcd7af83972d1281ad980c6ab2a113163ee318a096a95aa7ff7a1d9fdb916ad05cddd98a643187df9

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b3b06deb198b202a65ff721b4bfcf030

        SHA1

        57416046b156d2935cc2eab344d32365e530ca90

        SHA256

        ee04bf7b1421c820f4cf2785d33d00a409caf24228470f5ad1df359f2997cd6a

        SHA512

        76d7f398197ee7d9f6349505f849d8e04d8b66aa02ed1376d3caa598afdd181a8450d95fdac0ea51ec2de9a8b1faff85fd53ad54ec5777ac92c960a658349082

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b3b06deb198b202a65ff721b4bfcf030

        SHA1

        57416046b156d2935cc2eab344d32365e530ca90

        SHA256

        ee04bf7b1421c820f4cf2785d33d00a409caf24228470f5ad1df359f2997cd6a

        SHA512

        76d7f398197ee7d9f6349505f849d8e04d8b66aa02ed1376d3caa598afdd181a8450d95fdac0ea51ec2de9a8b1faff85fd53ad54ec5777ac92c960a658349082

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b3b06deb198b202a65ff721b4bfcf030

        SHA1

        57416046b156d2935cc2eab344d32365e530ca90

        SHA256

        ee04bf7b1421c820f4cf2785d33d00a409caf24228470f5ad1df359f2997cd6a

        SHA512

        76d7f398197ee7d9f6349505f849d8e04d8b66aa02ed1376d3caa598afdd181a8450d95fdac0ea51ec2de9a8b1faff85fd53ad54ec5777ac92c960a658349082

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        b3b06deb198b202a65ff721b4bfcf030

        SHA1

        57416046b156d2935cc2eab344d32365e530ca90

        SHA256

        ee04bf7b1421c820f4cf2785d33d00a409caf24228470f5ad1df359f2997cd6a

        SHA512

        76d7f398197ee7d9f6349505f849d8e04d8b66aa02ed1376d3caa598afdd181a8450d95fdac0ea51ec2de9a8b1faff85fd53ad54ec5777ac92c960a658349082

      • F:\$RECYCLE.BIN\S-1-5-21-86725733-3001458681-3405935542-1000\_desktop.ini

        Filesize

        10B

        MD5

        dbf19ca54500e964528b156763234c1d

        SHA1

        05376f86423aec8badf0adbc47887234ac83ef5a

        SHA256

        bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae

        SHA512

        fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0

      • \Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe

        Filesize

        1.2MB

        MD5

        b1519cbcbf4f6be2304c0641c38204f3

        SHA1

        8d981b9c5eca16108ec5982c8733281f7e18d67c

        SHA256

        8afbe1aa9a763d1826f44c2446454ffcffcd2fe9392fc4f527520e4acfdfffa2

        SHA512

        b487747d0b357760e590c9c7f3711c0cbac734888f6b21cdcd7af83972d1281ad980c6ab2a113163ee318a096a95aa7ff7a1d9fdb916ad05cddd98a643187df9

      • \Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe

        Filesize

        1.2MB

        MD5

        b1519cbcbf4f6be2304c0641c38204f3

        SHA1

        8d981b9c5eca16108ec5982c8733281f7e18d67c

        SHA256

        8afbe1aa9a763d1826f44c2446454ffcffcd2fe9392fc4f527520e4acfdfffa2

        SHA512

        b487747d0b357760e590c9c7f3711c0cbac734888f6b21cdcd7af83972d1281ad980c6ab2a113163ee318a096a95aa7ff7a1d9fdb916ad05cddd98a643187df9

      • memory/1216-30-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

        Filesize

        4KB

      • memory/2576-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2576-12-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2576-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2640-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2640-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2640-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2640-91-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2640-98-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2640-1850-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2640-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2640-3310-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB