Analysis

  • max time kernel
    182s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 04:59

General

  • Target

    7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe

  • Size

    1.8MB

  • MD5

    aeec9d4e8e49b8c3cbd8ec691e0c071c

  • SHA1

    e24dfe791a6d0f988c76e1bdda149abde418fd6f

  • SHA256

    7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc

  • SHA512

    858280134baefb8a8076c966f665145573efc7a9c620a4e33725bd80217b396f4dfc57ed485224e96327ee4729e88a66a269c9df611023c42095ead833d42c5c

  • SSDEEP

    49152:07DYbVtugvKlSA+n32pWx43UxThfAToZqScjc3tu:O+rvgz+n32kCUxTRog

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe
        "C:\Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3020
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aC5A0.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2712
          • C:\Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe
            "C:\Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe"
            4⤵
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Writes to the Master Boot Record (MBR)
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            PID:2676
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1860
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1940

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        b74b60e3f66b89f3de5bd1e6c4d7ea88

        SHA1

        bc382ca48ac7d8801e8174355a72b010487d44e8

        SHA256

        23a2c358c164ab0ff7d5911a11da02e8517a30661df5a693643ee7666ff6d663

        SHA512

        d0065301ae7248b85aef84c9b061edbf04df0543d9ae3d352563aa9a245d3ef0d4063718a8c54fae48dd48429e691f64fa88264cf6d35544a647b14c6be45f8a

      • C:\Users\Admin\AppData\Local\Temp\$$aC5A0.bat

        Filesize

        722B

        MD5

        d2588bb5f9a70459b3365de7ad30cffe

        SHA1

        7ed80a2146474a07bf102945753889bb37f44972

        SHA256

        fc92830ddf906cee2146244a967fc755db49c4cc4dd06e3068930e0c981cba19

        SHA512

        8b2730c2147f26c06e8d9b3bcd3b4cb24a21e269c11195ff7ce74f142d4e5546801e5fa088f92a057ed703035c536ae82d9e188d9fd2337c3e281cb37c086c87

      • C:\Users\Admin\AppData\Local\Temp\$$aC5A0.bat

        Filesize

        722B

        MD5

        d2588bb5f9a70459b3365de7ad30cffe

        SHA1

        7ed80a2146474a07bf102945753889bb37f44972

        SHA256

        fc92830ddf906cee2146244a967fc755db49c4cc4dd06e3068930e0c981cba19

        SHA512

        8b2730c2147f26c06e8d9b3bcd3b4cb24a21e269c11195ff7ce74f142d4e5546801e5fa088f92a057ed703035c536ae82d9e188d9fd2337c3e281cb37c086c87

      • C:\Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe

        Filesize

        1.8MB

        MD5

        8f6a1effaab5bc3aa41a210fbe858148

        SHA1

        daab0e4852dfeb944d5fa13f5a9039880c9023f9

        SHA256

        ce537a333ddb3271a3bc68b9f1cd1d22808c0808eac1fe4225c9ad95e771c7e5

        SHA512

        bbe79b942937cf19a76ee5b320bf46e33323e09d587dc42066131ab83ad4da86181725560dd919c9316e67e34fded1f472a43235f99c4e3d3e1b780f4d5263b1

      • C:\Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe.exe

        Filesize

        1.8MB

        MD5

        8f6a1effaab5bc3aa41a210fbe858148

        SHA1

        daab0e4852dfeb944d5fa13f5a9039880c9023f9

        SHA256

        ce537a333ddb3271a3bc68b9f1cd1d22808c0808eac1fe4225c9ad95e771c7e5

        SHA512

        bbe79b942937cf19a76ee5b320bf46e33323e09d587dc42066131ab83ad4da86181725560dd919c9316e67e34fded1f472a43235f99c4e3d3e1b780f4d5263b1

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c438cd45dba79de60cfe6dedf51add8b

        SHA1

        9a84bde939cfeae643e96ce34a3bceee2e9f640e

        SHA256

        2d8f4cf4e9edb7b563432e0974e2de11b776c274739521674577c9242e509f9c

        SHA512

        7f28a39c22247d5ff2c14f02c415defa68f960b7448f87ca8c50ea2ca0f41454c313b57e76505f24ac5430da4f2afd487b3e32c10841fea01c86c5816a4f997c

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c438cd45dba79de60cfe6dedf51add8b

        SHA1

        9a84bde939cfeae643e96ce34a3bceee2e9f640e

        SHA256

        2d8f4cf4e9edb7b563432e0974e2de11b776c274739521674577c9242e509f9c

        SHA512

        7f28a39c22247d5ff2c14f02c415defa68f960b7448f87ca8c50ea2ca0f41454c313b57e76505f24ac5430da4f2afd487b3e32c10841fea01c86c5816a4f997c

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c438cd45dba79de60cfe6dedf51add8b

        SHA1

        9a84bde939cfeae643e96ce34a3bceee2e9f640e

        SHA256

        2d8f4cf4e9edb7b563432e0974e2de11b776c274739521674577c9242e509f9c

        SHA512

        7f28a39c22247d5ff2c14f02c415defa68f960b7448f87ca8c50ea2ca0f41454c313b57e76505f24ac5430da4f2afd487b3e32c10841fea01c86c5816a4f997c

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        c438cd45dba79de60cfe6dedf51add8b

        SHA1

        9a84bde939cfeae643e96ce34a3bceee2e9f640e

        SHA256

        2d8f4cf4e9edb7b563432e0974e2de11b776c274739521674577c9242e509f9c

        SHA512

        7f28a39c22247d5ff2c14f02c415defa68f960b7448f87ca8c50ea2ca0f41454c313b57e76505f24ac5430da4f2afd487b3e32c10841fea01c86c5816a4f997c

      • F:\$RECYCLE.BIN\S-1-5-21-2180306848-1874213455-4093218721-1000\_desktop.ini

        Filesize

        10B

        MD5

        81570c50286369016cef7a9f904c4b04

        SHA1

        b5758b23667cb35cad0adb23371b830fcee4f4e5

        SHA256

        b882f41a5c84d248a75714eaf215a9e363a49361b6a14beedb921ee3dfdb46a1

        SHA512

        0e6c479b0252e24635810b7d030cc9b5b17603ee20ccf62812446b8d15884521c6c7be65dfc0090bb1502e859fae27c2a63b3e58be714021f473a88407982162

      • \Users\Admin\AppData\Local\Temp\7e62fabd24864f6e937e3f4eb7b0d584eab1c7a1fea79074ae458d9d838a6edc.exe

        Filesize

        1.8MB

        MD5

        8f6a1effaab5bc3aa41a210fbe858148

        SHA1

        daab0e4852dfeb944d5fa13f5a9039880c9023f9

        SHA256

        ce537a333ddb3271a3bc68b9f1cd1d22808c0808eac1fe4225c9ad95e771c7e5

        SHA512

        bbe79b942937cf19a76ee5b320bf46e33323e09d587dc42066131ab83ad4da86181725560dd919c9316e67e34fded1f472a43235f99c4e3d3e1b780f4d5263b1

      • memory/1192-31-0x0000000002A60000-0x0000000002A61000-memory.dmp

        Filesize

        4KB

      • memory/2676-34-0x0000000000BC0000-0x0000000000DA0000-memory.dmp

        Filesize

        1.9MB

      • memory/2676-29-0x0000000000BC0000-0x0000000000DA0000-memory.dmp

        Filesize

        1.9MB

      • memory/2712-27-0x00000000020C0000-0x00000000022A0000-memory.dmp

        Filesize

        1.9MB

      • memory/2736-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2736-35-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2736-44-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2736-50-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2736-96-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2736-102-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2736-1624-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2736-1855-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2736-3315-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3020-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3020-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3020-12-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB