Analysis

  • max time kernel
    152s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 14:42

General

  • Target

    feeec515641c4924a617431ee694000d5f4e5cb4d328678b3130237653f9979a.exe

  • Size

    434KB

  • MD5

    231948659b7f4a720d4b6ae4d492694a

  • SHA1

    cbfd1b17b0191e5d91f9bcf544b3f7694b60da38

  • SHA256

    feeec515641c4924a617431ee694000d5f4e5cb4d328678b3130237653f9979a

  • SHA512

    7bd41a7b74b7044fdf4ab0db599e276d7b6e55c8c353dfaa22579333e267b2ee7e4e68f0c20ea1e18275b17721a9f22a9d3521f9b22d497ffe815efd08c17f68

  • SSDEEP

    3072:AftffjmNID6O+JVo4G+a40mCy/uGK0qFYrRrvwNVN:AVfjmNE6xJHA40gIrIrvk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3248
      • C:\Users\Admin\AppData\Local\Temp\feeec515641c4924a617431ee694000d5f4e5cb4d328678b3130237653f9979a.exe
        "C:\Users\Admin\AppData\Local\Temp\feeec515641c4924a617431ee694000d5f4e5cb4d328678b3130237653f9979a.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4308
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7455.bat
          3⤵
            PID:4316
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4660
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4536
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:3208

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          484KB

          MD5

          2033497e172bc0123c4eef9ce6be8ca6

          SHA1

          47e4775b623241bcfe4512d9bbdc82f96f1f3eb0

          SHA256

          2c9b3c0a074a0184de29b2eab616822fd7ae6a9944e89f6c9d38795557843390

          SHA512

          919551b63f7ce4def989b1824c6cca2fd81b33ce8f949fb6dad7999f434b9060adb9b2d78d72b9c106e193256b8925cce859d8d0d47730dbd067fe8e57027f4e

        • C:\Program Files\_desktop.ini

          Filesize

          9B

          MD5

          872506f1dadcc0cedd1e9dee11f54da4

          SHA1

          d1e87145ed1d918f10ae4e93ccdbb994bc906ed5

          SHA256

          a0049e98811438481e150df54f7b555026746c943cb03106677bf75b4e412104

          SHA512

          6cf3aeeed18e66a16ed653a5c33133ec8d5fb58cf42aab9e712cf473233e506d4f14692dff04b7c20847718e5c344ec2651e57d2ae7a034610b07679b786344c

        • C:\Users\Admin\AppData\Local\Temp\$$a7455.bat

          Filesize

          722B

          MD5

          bd96da61e591b19b0833f9e75461a342

          SHA1

          55f3d081603778388e5ddd792bef783226d193a2

          SHA256

          2ec9c1a0a411f86056d9172171b0c5f142ca18c3aeb850e75ff9fc322aa2afe8

          SHA512

          f07ab5b965fa17513972556e02f6a2baa954c2e984e07733ab1cbfcb637f3936026d5dda3ace65af3e74a64051622cbeb80b5f365f43b1b7f9139bb8145549d0

        • C:\Users\Admin\AppData\Local\Temp\feeec515641c4924a617431ee694000d5f4e5cb4d328678b3130237653f9979a.exe.exe

          Filesize

          407KB

          MD5

          62ca5fc8100cc18744bf1aca9c9c6cc6

          SHA1

          c12de09b42457a8a0e4b95409fcdf936a7177f1f

          SHA256

          4e0401f6c7937d83daf96b5860f8e79e2e226a1733ee499c6f5982ac90edfc45

          SHA512

          a9c1524d4a3687a1ce03f096fb08c088e5aeb5962a08748c0be82e7d4112586fe3b7a790dd481d481ea84c4bb760cccb78d8b4f25e7735dcdf22bc1a988b058f

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          ed556e19d17001e2e3acc54fa3494e44

          SHA1

          ff4ca1d69ea9cadc7e0437e823ff1d15ce2ae8d9

          SHA256

          d451cd578e3d5b6bd97862a617dde8099803e219409f4c8124da772aed6ff65b

          SHA512

          64de143fafa7066f1f28d63907fb3e287125a76a13ef8b0ed6c2de1d921697297b751b9e2838ed413fbc532d7a2fc7df486c13dc17c80f5e15d99a20f1a0301a

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          ed556e19d17001e2e3acc54fa3494e44

          SHA1

          ff4ca1d69ea9cadc7e0437e823ff1d15ce2ae8d9

          SHA256

          d451cd578e3d5b6bd97862a617dde8099803e219409f4c8124da772aed6ff65b

          SHA512

          64de143fafa7066f1f28d63907fb3e287125a76a13ef8b0ed6c2de1d921697297b751b9e2838ed413fbc532d7a2fc7df486c13dc17c80f5e15d99a20f1a0301a

        • C:\Windows\rundl132.exe

          Filesize

          26KB

          MD5

          ed556e19d17001e2e3acc54fa3494e44

          SHA1

          ff4ca1d69ea9cadc7e0437e823ff1d15ce2ae8d9

          SHA256

          d451cd578e3d5b6bd97862a617dde8099803e219409f4c8124da772aed6ff65b

          SHA512

          64de143fafa7066f1f28d63907fb3e287125a76a13ef8b0ed6c2de1d921697297b751b9e2838ed413fbc532d7a2fc7df486c13dc17c80f5e15d99a20f1a0301a

        • F:\$RECYCLE.BIN\S-1-5-21-919254492-3979293997-764407192-1000\_desktop.ini

          Filesize

          10B

          MD5

          dbf19ca54500e964528b156763234c1d

          SHA1

          05376f86423aec8badf0adbc47887234ac83ef5a

          SHA256

          bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae

          SHA512

          fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0

        • memory/4308-0-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4308-8-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4660-28-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4660-31-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4660-36-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4660-39-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4660-24-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4660-43-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4660-17-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4660-1070-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4660-1277-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4660-1590-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB