Analysis

  • max time kernel
    152s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 15:33

General

  • Target

    baf0a98ea4328d906b97d2ae6ed932ba0562a0740589e50f821cce7cbe79a356.exe

  • Size

    1.3MB

  • MD5

    643c32a49721a1d4667b01b0b0224c5e

  • SHA1

    57c3820867dc9ef6f0709a224263e0ec0a201481

  • SHA256

    baf0a98ea4328d906b97d2ae6ed932ba0562a0740589e50f821cce7cbe79a356

  • SHA512

    8cad2ab4d72263cfc35106140a5c23963febd322f2ff9e11fdb67098cb5444796b1ba116ce0bff6ddd4690b6390e90da13206f4160619f06d8998f5c6f889d7e

  • SSDEEP

    24576:r+OuioBBCnx+QJ529+RipvL1SXk1QE1RGOTnIEQc4au9NgxnHNnu:qA4uxw9+ApwXk1QE1RzsEQPaxHNu

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1244
      • C:\Users\Admin\AppData\Local\Temp\baf0a98ea4328d906b97d2ae6ed932ba0562a0740589e50f821cce7cbe79a356.exe
        "C:\Users\Admin\AppData\Local\Temp\baf0a98ea4328d906b97d2ae6ed932ba0562a0740589e50f821cce7cbe79a356.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a6567.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1304
          • C:\Users\Admin\AppData\Local\Temp\baf0a98ea4328d906b97d2ae6ed932ba0562a0740589e50f821cce7cbe79a356.exe
            "C:\Users\Admin\AppData\Local\Temp\baf0a98ea4328d906b97d2ae6ed932ba0562a0740589e50f821cce7cbe79a356.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            PID:2812
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2652
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2720
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2816

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\$$a6567.bat

              Filesize

              722B

              MD5

              7d5a0a7d2d082a82931fe3d36b935221

              SHA1

              83cf4cb70e2ad1e8ff2069e44e117a6a58b8ba3c

              SHA256

              ed571e13e9fde31209e28517d2024b18125e0f6e6d86d0477a935e51c59c8125

              SHA512

              0dd5ef86ccec4dcd0eaef111b6375fc4f7c47c856cbe611fde6680add61b1b5362c746f1f8cca94738ff2afbecb8cdd9d57a5d1acf6e5a69b6fe807e5cafaa56

            • C:\Users\Admin\AppData\Local\Temp\$$a6567.bat

              Filesize

              722B

              MD5

              7d5a0a7d2d082a82931fe3d36b935221

              SHA1

              83cf4cb70e2ad1e8ff2069e44e117a6a58b8ba3c

              SHA256

              ed571e13e9fde31209e28517d2024b18125e0f6e6d86d0477a935e51c59c8125

              SHA512

              0dd5ef86ccec4dcd0eaef111b6375fc4f7c47c856cbe611fde6680add61b1b5362c746f1f8cca94738ff2afbecb8cdd9d57a5d1acf6e5a69b6fe807e5cafaa56

            • C:\Users\Admin\AppData\Local\Temp\baf0a98ea4328d906b97d2ae6ed932ba0562a0740589e50f821cce7cbe79a356.exe

              Filesize

              1.3MB

              MD5

              b0f3d3d6dae61602d60085e896c2436f

              SHA1

              bf8a1a2792b0fb142e50bd8ce0674359783c9f03

              SHA256

              b9c6a21f8355ced2b0ee48c5e0b6cce05c9222a32cdec12b26c18adbb8cbb1fd

              SHA512

              e8b7bf2d8e3c9587add0fa3e09a8331b80f3fb55343c76555fde33b511b2be6ecbe8b1e35cfaa2910ee4a0ee2d36fe740b1a0c228f702e17da6ccf55cdfce8ad

            • C:\Users\Admin\AppData\Local\Temp\baf0a98ea4328d906b97d2ae6ed932ba0562a0740589e50f821cce7cbe79a356.exe.exe

              Filesize

              1.3MB

              MD5

              b0f3d3d6dae61602d60085e896c2436f

              SHA1

              bf8a1a2792b0fb142e50bd8ce0674359783c9f03

              SHA256

              b9c6a21f8355ced2b0ee48c5e0b6cce05c9222a32cdec12b26c18adbb8cbb1fd

              SHA512

              e8b7bf2d8e3c9587add0fa3e09a8331b80f3fb55343c76555fde33b511b2be6ecbe8b1e35cfaa2910ee4a0ee2d36fe740b1a0c228f702e17da6ccf55cdfce8ad

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              e53cd9bcc223ddc11f2a4c527c1a5ecd

              SHA1

              df56e8e6fb98b9d6d4998aee434a504a24e3f852

              SHA256

              2e95a11da2c4c4ffdbf65aa4b4fa8a3a2abf10722f6f61546f4cde1350c23570

              SHA512

              33aa1d7ae4df066729945e88763d7ec8b5ba9f8eb099b0b5dfad14fe49f41b8eb79f675a1eb4933c691405805fa85196156997e1871780a75589e7135ee07d01

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              e53cd9bcc223ddc11f2a4c527c1a5ecd

              SHA1

              df56e8e6fb98b9d6d4998aee434a504a24e3f852

              SHA256

              2e95a11da2c4c4ffdbf65aa4b4fa8a3a2abf10722f6f61546f4cde1350c23570

              SHA512

              33aa1d7ae4df066729945e88763d7ec8b5ba9f8eb099b0b5dfad14fe49f41b8eb79f675a1eb4933c691405805fa85196156997e1871780a75589e7135ee07d01

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              e53cd9bcc223ddc11f2a4c527c1a5ecd

              SHA1

              df56e8e6fb98b9d6d4998aee434a504a24e3f852

              SHA256

              2e95a11da2c4c4ffdbf65aa4b4fa8a3a2abf10722f6f61546f4cde1350c23570

              SHA512

              33aa1d7ae4df066729945e88763d7ec8b5ba9f8eb099b0b5dfad14fe49f41b8eb79f675a1eb4933c691405805fa85196156997e1871780a75589e7135ee07d01

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              e53cd9bcc223ddc11f2a4c527c1a5ecd

              SHA1

              df56e8e6fb98b9d6d4998aee434a504a24e3f852

              SHA256

              2e95a11da2c4c4ffdbf65aa4b4fa8a3a2abf10722f6f61546f4cde1350c23570

              SHA512

              33aa1d7ae4df066729945e88763d7ec8b5ba9f8eb099b0b5dfad14fe49f41b8eb79f675a1eb4933c691405805fa85196156997e1871780a75589e7135ee07d01

            • F:\$RECYCLE.BIN\S-1-5-21-607259312-1573743425-2763420908-1000\_desktop.ini

              Filesize

              10B

              MD5

              dbf19ca54500e964528b156763234c1d

              SHA1

              05376f86423aec8badf0adbc47887234ac83ef5a

              SHA256

              bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae

              SHA512

              fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0

            • \Users\Admin\AppData\Local\Temp\baf0a98ea4328d906b97d2ae6ed932ba0562a0740589e50f821cce7cbe79a356.exe

              Filesize

              1.3MB

              MD5

              b0f3d3d6dae61602d60085e896c2436f

              SHA1

              bf8a1a2792b0fb142e50bd8ce0674359783c9f03

              SHA256

              b9c6a21f8355ced2b0ee48c5e0b6cce05c9222a32cdec12b26c18adbb8cbb1fd

              SHA512

              e8b7bf2d8e3c9587add0fa3e09a8331b80f3fb55343c76555fde33b511b2be6ecbe8b1e35cfaa2910ee4a0ee2d36fe740b1a0c228f702e17da6ccf55cdfce8ad

            • memory/1244-29-0x0000000002A40000-0x0000000002A41000-memory.dmp

              Filesize

              4KB

            • memory/1728-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1728-16-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1728-12-0x0000000000220000-0x0000000000254000-memory.dmp

              Filesize

              208KB

            • memory/2652-21-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-32-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-31-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-39-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-45-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-91-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-97-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-111-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-1826-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-1851-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB