Analysis

  • max time kernel
    160s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 06:11

General

  • Target

    5b95993842ee5c457c161000b53d129110c9dcb144abbc73a44f07b50fc24548.exe

  • Size

    29KB

  • MD5

    935320c4695ec4790a3ac30084e9da3e

  • SHA1

    7ca7ec6819c9e9fffb46c60c37966d250864a9dd

  • SHA256

    5b95993842ee5c457c161000b53d129110c9dcb144abbc73a44f07b50fc24548

  • SHA512

    7507f9386fb70a7f7fff8e65ba4ed3ce14e13e380893c8c6bbcaf68fbd832c3ea05a2d2e128200a9c83f7264271ad743668be5d857d6cf9d280d4bf4801ffeeb

  • SSDEEP

    384:z7nbbOVsEQ1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfR9C5fyuGu:/b4DQ16GVRu1yK9fMnJG2V9dDClcx

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3164
      • C:\Users\Admin\AppData\Local\Temp\5b95993842ee5c457c161000b53d129110c9dcb144abbc73a44f07b50fc24548.exe
        "C:\Users\Admin\AppData\Local\Temp\5b95993842ee5c457c161000b53d129110c9dcb144abbc73a44f07b50fc24548.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3752
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3928
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:560
      • C:\Windows\System32\Upfc.exe
        C:\Windows\System32\Upfc.exe /launchtype periodic /cv UYTZ3ZdrpUOCQP3kb+Lhsw.0
        1⤵
          PID:3232

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\_desktop.ini

                Filesize

                10B

                MD5

                dbf19ca54500e964528b156763234c1d

                SHA1

                05376f86423aec8badf0adbc47887234ac83ef5a

                SHA256

                bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae

                SHA512

                fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0

              • C:\Program Files\Google\Chrome\Application\chrome.exe

                Filesize

                2.8MB

                MD5

                5be2181fce0944e288f82062e5d3499b

                SHA1

                6bfa96657cfb3710d2dbdc9bd4e6968dcfaef903

                SHA256

                5c2d9710b0cbeeba71385c553e91374d0928c8b1edda8a94a4f2d1d6b0fd1e20

                SHA512

                a3745e4dad700eb0b2ea145d986c434f6efdf53b3152b463fc3011ddcad0eed57e3c0712e3cdfbbaaaae63d877455ff0328ef1b45032cf2f8be4e008f21ffc5b

              • C:\_desktop.ini

                Filesize

                9B

                MD5

                872506f1dadcc0cedd1e9dee11f54da4

                SHA1

                d1e87145ed1d918f10ae4e93ccdbb994bc906ed5

                SHA256

                a0049e98811438481e150df54f7b555026746c943cb03106677bf75b4e412104

                SHA512

                6cf3aeeed18e66a16ed653a5c33133ec8d5fb58cf42aab9e712cf473233e506d4f14692dff04b7c20847718e5c344ec2651e57d2ae7a034610b07679b786344c

              • memory/3752-0-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/3752-5-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/3752-13-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/3752-19-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/3752-24-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/3752-28-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/3752-1264-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/3752-1270-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/3752-2451-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB