Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 15:25

General

  • Target

    0b5f785a6d61624fb5618c310421f09847d9eeee481a9d15df5d67326f03e4af.exe

  • Size

    83KB

  • MD5

    9455b9f6832cdcbac081d594f3b0ffa8

  • SHA1

    de8849aee6c697801be70ee835a88fb0e8e71009

  • SHA256

    0b5f785a6d61624fb5618c310421f09847d9eeee481a9d15df5d67326f03e4af

  • SHA512

    f6b6272af9be6c3eb31228046ae77c6a8efea9c35e4591ff5518c55f297bacf9d13b5179993f301503aa5d92254886f6e9de6a8cbbf9e173541724f36bfffbed

  • SSDEEP

    1536:2fgLdQAQfhJIJ0IO61oPeacurY7Rc/a/ysfq2hltssjWpVCVuM0nm:2ftffhJCuUorcUY7zvhfsGuKuMGm

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1236
      • C:\Users\Admin\AppData\Local\Temp\0b5f785a6d61624fb5618c310421f09847d9eeee481a9d15df5d67326f03e4af.exe
        "C:\Users\Admin\AppData\Local\Temp\0b5f785a6d61624fb5618c310421f09847d9eeee481a9d15df5d67326f03e4af.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a6EF9.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2600
          • C:\Users\Admin\AppData\Local\Temp\0b5f785a6d61624fb5618c310421f09847d9eeee481a9d15df5d67326f03e4af.exe
            "C:\Users\Admin\AppData\Local\Temp\0b5f785a6d61624fb5618c310421f09847d9eeee481a9d15df5d67326f03e4af.exe"
            4⤵
            • Executes dropped EXE
            PID:2724
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1664
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2968

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        74cb2130c3c6ea6afe222eec4414e766

        SHA1

        c52ded7d46afc3fd31f57120aa11dca7ad48aa27

        SHA256

        7e9a000693830c2569cca018e73d01d25e2b18190db07e9e549860e41e7005e3

        SHA512

        cb076d63b1b18fb441d8f95ca115835c5be4acef6e6179403740623a4370e18ea8276a512c6c662f9059d3bf53de119fdbb0b7c9ec41b8efc281de1a6b465289

      • C:\Users\Admin\AppData\Local\Temp\$$a6EF9.bat

        Filesize

        722B

        MD5

        31e12fdf315856fd52bfc574138b662a

        SHA1

        0ac8937a5e572d2fe22dc3ac1c8c151334a609af

        SHA256

        a7c230a5f84338f8996db3a66d67bb93ca277884adb2300e6b255a86065b9b57

        SHA512

        14002584fa1971a107ad2a6b93984fa16c8dd7a21a75ee6ee2e717edab94e4c8bb9f3442a0e4ac6843c3d1d5fbd9db0113c671a514f27a101c74e04b76d39cec

      • C:\Users\Admin\AppData\Local\Temp\$$a6EF9.bat

        Filesize

        722B

        MD5

        31e12fdf315856fd52bfc574138b662a

        SHA1

        0ac8937a5e572d2fe22dc3ac1c8c151334a609af

        SHA256

        a7c230a5f84338f8996db3a66d67bb93ca277884adb2300e6b255a86065b9b57

        SHA512

        14002584fa1971a107ad2a6b93984fa16c8dd7a21a75ee6ee2e717edab94e4c8bb9f3442a0e4ac6843c3d1d5fbd9db0113c671a514f27a101c74e04b76d39cec

      • C:\Users\Admin\AppData\Local\Temp\0b5f785a6d61624fb5618c310421f09847d9eeee481a9d15df5d67326f03e4af.exe

        Filesize

        57KB

        MD5

        f20120319812bf92cffc6a7f5f8134d0

        SHA1

        7d6b2b23d3e0791ce9f646e1b7c00a815e29ccdf

        SHA256

        ddc3bc440c3ab581e4968dad35e0f43b15be9c6690c701e702d9f615adf86606

        SHA512

        820137b5b94676bb1937f68b5947ed7ffbdc5bc15f6e21ccc1cc67c8c2226dd157469dd039a7bbaa04096f46f2c7919c0e5c7d9c53e7343568969ab02785cafa

      • C:\Users\Admin\AppData\Local\Temp\0b5f785a6d61624fb5618c310421f09847d9eeee481a9d15df5d67326f03e4af.exe.exe

        Filesize

        57KB

        MD5

        f20120319812bf92cffc6a7f5f8134d0

        SHA1

        7d6b2b23d3e0791ce9f646e1b7c00a815e29ccdf

        SHA256

        ddc3bc440c3ab581e4968dad35e0f43b15be9c6690c701e702d9f615adf86606

        SHA512

        820137b5b94676bb1937f68b5947ed7ffbdc5bc15f6e21ccc1cc67c8c2226dd157469dd039a7bbaa04096f46f2c7919c0e5c7d9c53e7343568969ab02785cafa

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8d52fa03a0b7e8a6766b2d769aacd7e6

        SHA1

        f2b8804c1efd0a2544a5c59dd1d2a0589a336761

        SHA256

        d3a5d60f78a59fcdfe9f0cc7fd087c0fbccb338a78a193f0da0fe0661cf5a8cd

        SHA512

        d0771b56e9c8b0a998a9730d68fe5c362512d5ffb8c0e06d4dee8bedd4f455e61ae08d346388ec9abd6350aa26d49298720aea3de112dfaa9687bc6d136a62a2

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8d52fa03a0b7e8a6766b2d769aacd7e6

        SHA1

        f2b8804c1efd0a2544a5c59dd1d2a0589a336761

        SHA256

        d3a5d60f78a59fcdfe9f0cc7fd087c0fbccb338a78a193f0da0fe0661cf5a8cd

        SHA512

        d0771b56e9c8b0a998a9730d68fe5c362512d5ffb8c0e06d4dee8bedd4f455e61ae08d346388ec9abd6350aa26d49298720aea3de112dfaa9687bc6d136a62a2

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8d52fa03a0b7e8a6766b2d769aacd7e6

        SHA1

        f2b8804c1efd0a2544a5c59dd1d2a0589a336761

        SHA256

        d3a5d60f78a59fcdfe9f0cc7fd087c0fbccb338a78a193f0da0fe0661cf5a8cd

        SHA512

        d0771b56e9c8b0a998a9730d68fe5c362512d5ffb8c0e06d4dee8bedd4f455e61ae08d346388ec9abd6350aa26d49298720aea3de112dfaa9687bc6d136a62a2

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        8d52fa03a0b7e8a6766b2d769aacd7e6

        SHA1

        f2b8804c1efd0a2544a5c59dd1d2a0589a336761

        SHA256

        d3a5d60f78a59fcdfe9f0cc7fd087c0fbccb338a78a193f0da0fe0661cf5a8cd

        SHA512

        d0771b56e9c8b0a998a9730d68fe5c362512d5ffb8c0e06d4dee8bedd4f455e61ae08d346388ec9abd6350aa26d49298720aea3de112dfaa9687bc6d136a62a2

      • F:\$RECYCLE.BIN\S-1-5-21-86725733-3001458681-3405935542-1000\_desktop.ini

        Filesize

        10B

        MD5

        dbf19ca54500e964528b156763234c1d

        SHA1

        05376f86423aec8badf0adbc47887234ac83ef5a

        SHA256

        bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae

        SHA512

        fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0

      • \Users\Admin\AppData\Local\Temp\0b5f785a6d61624fb5618c310421f09847d9eeee481a9d15df5d67326f03e4af.exe

        Filesize

        57KB

        MD5

        f20120319812bf92cffc6a7f5f8134d0

        SHA1

        7d6b2b23d3e0791ce9f646e1b7c00a815e29ccdf

        SHA256

        ddc3bc440c3ab581e4968dad35e0f43b15be9c6690c701e702d9f615adf86606

        SHA512

        820137b5b94676bb1937f68b5947ed7ffbdc5bc15f6e21ccc1cc67c8c2226dd157469dd039a7bbaa04096f46f2c7919c0e5c7d9c53e7343568969ab02785cafa

      • \Users\Admin\AppData\Local\Temp\0b5f785a6d61624fb5618c310421f09847d9eeee481a9d15df5d67326f03e4af.exe

        Filesize

        57KB

        MD5

        f20120319812bf92cffc6a7f5f8134d0

        SHA1

        7d6b2b23d3e0791ce9f646e1b7c00a815e29ccdf

        SHA256

        ddc3bc440c3ab581e4968dad35e0f43b15be9c6690c701e702d9f615adf86606

        SHA512

        820137b5b94676bb1937f68b5947ed7ffbdc5bc15f6e21ccc1cc67c8c2226dd157469dd039a7bbaa04096f46f2c7919c0e5c7d9c53e7343568969ab02785cafa

      • memory/1236-31-0x0000000002590000-0x0000000002591000-memory.dmp

        Filesize

        4KB

      • memory/2656-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2656-47-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2656-3312-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2656-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2656-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2656-3165-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2656-42-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2656-1851-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2656-93-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2656-99-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3040-17-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3040-15-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/3040-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3040-12-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB