Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 00:44

General

  • Target

    19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe

  • Size

    51KB

  • MD5

    e77b8b86174901216266223b515f1189

  • SHA1

    fb3ca379e2bec24b4cd0286d7058776537b9e030

  • SHA256

    19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8

  • SHA512

    3d474788009edda095b4ad81e621172f3a772eb7ff54ba450c16b8128f8192c5493cbc612ab183c636fdab701e6a0f0c98baa10742e199b9c7c78b704060e0d2

  • SSDEEP

    768:qS1ODKAaDMG8H92RwZNQSw+JnbmQj3FZJ9Vs9XnsD3Fqvota93nPYB1BW2qXMu:3fgLdQAQfwt7FZJ92BsDFqgtE3nioH

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe
        "C:\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3020
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2180
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a75CC.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3040
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
        2⤵
          PID:2280
      • C:\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe
        "C:\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe"
        1⤵
        • Executes dropped EXE
        PID:2776

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              ac5f1057a35624d0bf3b989e038e314e

              SHA1

              e5f90508df87123099bddfee06287a66d3ab35e1

              SHA256

              f92c14b9ef9c0cdad7786d745a8b93eb2a484d049f07671b5051fa81f56499fd

              SHA512

              b13a3cddc9c74a53a45d5ca1024811d0817f1ce181e2bf870a0be3d399130eded69b6110b86fcd91d8b11cd909fb89e0e9c57a61e05152711f12f52ae1abb5af

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              1a0dbecba0dbb963c2f3b0448796d47a

              SHA1

              5c0b5d378d3614fe984ce2915b5720886992da0c

              SHA256

              1ea2fb84177a921bc3df4763c3da53a970e192f93f6175d09696ded019e50cf8

              SHA512

              8e25dc08fa6f280a6bc1ccacb1ce665ab055b5d539f8915915fc7536c90185a221cb0c50a02d34b521b871b8487a155b9c40a5f25df87306e1df24ca7e96da25

            • C:\Users\Admin\AppData\Local\Temp\$$a75CC.bat

              Filesize

              722B

              MD5

              a5ef25ca30f718726670797ec3ae7149

              SHA1

              0e8fb576ebd28b01fed7b22faca8a566aa2d3e55

              SHA256

              c2f54503d58976ba7afef817b09d2234ce6c1f77526b8335209ac00c50ed2f5f

              SHA512

              0296a52563f4df4c8458ace76ab8be2571a5a294a1ea4277d589d9a7aeeb1c3e288116dc373c15e081cc5bef651e89101474117d0be127e87a32732438860d5f

            • C:\Users\Admin\AppData\Local\Temp\$$a75CC.bat

              Filesize

              722B

              MD5

              a5ef25ca30f718726670797ec3ae7149

              SHA1

              0e8fb576ebd28b01fed7b22faca8a566aa2d3e55

              SHA256

              c2f54503d58976ba7afef817b09d2234ce6c1f77526b8335209ac00c50ed2f5f

              SHA512

              0296a52563f4df4c8458ace76ab8be2571a5a294a1ea4277d589d9a7aeeb1c3e288116dc373c15e081cc5bef651e89101474117d0be127e87a32732438860d5f

            • C:\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe

              Filesize

              25KB

              MD5

              0c2963076517a9d8846455fcb0387dff

              SHA1

              8f003a0faec1747549a428dd0cb5d0448d07e0ce

              SHA256

              9078d58d891638c3648b5a0f240a447b94e200c87be4795a4406552038659331

              SHA512

              ca93928a27264a6b5556a89388820d1bc4da0615b79714c4ec06e8d90c8974debef3dc0ecd3cec092649686c1831f145bb357542034c8a1986f7e108faa85df8

            • C:\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe.exe

              Filesize

              25KB

              MD5

              0c2963076517a9d8846455fcb0387dff

              SHA1

              8f003a0faec1747549a428dd0cb5d0448d07e0ce

              SHA256

              9078d58d891638c3648b5a0f240a447b94e200c87be4795a4406552038659331

              SHA512

              ca93928a27264a6b5556a89388820d1bc4da0615b79714c4ec06e8d90c8974debef3dc0ecd3cec092649686c1831f145bb357542034c8a1986f7e108faa85df8

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              f0299e92ce90cf3d86d8e1efb0096a22

              SHA1

              3c9547a206d732425f900eac3c75171defbbe45c

              SHA256

              30e729cc3182e1812604c9aed941332efc4d720dba341a06e67fbdb387587b17

              SHA512

              effd2663012174d5dfef919a6f808a281c08076479dce2ff6a2e5f52b6c387b2ec90e499cf341d1d664560b7c702ef25753fdff508e76b01ef96de1828d0ac39

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              f0299e92ce90cf3d86d8e1efb0096a22

              SHA1

              3c9547a206d732425f900eac3c75171defbbe45c

              SHA256

              30e729cc3182e1812604c9aed941332efc4d720dba341a06e67fbdb387587b17

              SHA512

              effd2663012174d5dfef919a6f808a281c08076479dce2ff6a2e5f52b6c387b2ec90e499cf341d1d664560b7c702ef25753fdff508e76b01ef96de1828d0ac39

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              f0299e92ce90cf3d86d8e1efb0096a22

              SHA1

              3c9547a206d732425f900eac3c75171defbbe45c

              SHA256

              30e729cc3182e1812604c9aed941332efc4d720dba341a06e67fbdb387587b17

              SHA512

              effd2663012174d5dfef919a6f808a281c08076479dce2ff6a2e5f52b6c387b2ec90e499cf341d1d664560b7c702ef25753fdff508e76b01ef96de1828d0ac39

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              f0299e92ce90cf3d86d8e1efb0096a22

              SHA1

              3c9547a206d732425f900eac3c75171defbbe45c

              SHA256

              30e729cc3182e1812604c9aed941332efc4d720dba341a06e67fbdb387587b17

              SHA512

              effd2663012174d5dfef919a6f808a281c08076479dce2ff6a2e5f52b6c387b2ec90e499cf341d1d664560b7c702ef25753fdff508e76b01ef96de1828d0ac39

            • F:\$RECYCLE.BIN\S-1-5-21-86725733-3001458681-3405935542-1000\_desktop.ini

              Filesize

              10B

              MD5

              dbf19ca54500e964528b156763234c1d

              SHA1

              05376f86423aec8badf0adbc47887234ac83ef5a

              SHA256

              bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae

              SHA512

              fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0

            • \Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe

              Filesize

              25KB

              MD5

              0c2963076517a9d8846455fcb0387dff

              SHA1

              8f003a0faec1747549a428dd0cb5d0448d07e0ce

              SHA256

              9078d58d891638c3648b5a0f240a447b94e200c87be4795a4406552038659331

              SHA512

              ca93928a27264a6b5556a89388820d1bc4da0615b79714c4ec06e8d90c8974debef3dc0ecd3cec092649686c1831f145bb357542034c8a1986f7e108faa85df8

            • \Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe

              Filesize

              25KB

              MD5

              0c2963076517a9d8846455fcb0387dff

              SHA1

              8f003a0faec1747549a428dd0cb5d0448d07e0ce

              SHA256

              9078d58d891638c3648b5a0f240a447b94e200c87be4795a4406552038659331

              SHA512

              ca93928a27264a6b5556a89388820d1bc4da0615b79714c4ec06e8d90c8974debef3dc0ecd3cec092649686c1831f145bb357542034c8a1986f7e108faa85df8

            • memory/1204-30-0x0000000001CE0000-0x0000000001CE1000-memory.dmp

              Filesize

              4KB

            • memory/2180-42-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2180-33-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2180-37-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2180-47-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2180-94-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2180-100-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2180-1853-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2180-21-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2180-3313-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3020-32-0x00000000005D0000-0x0000000000604000-memory.dmp

              Filesize

              208KB

            • memory/3020-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3020-15-0x00000000005D0000-0x0000000000604000-memory.dmp

              Filesize

              208KB

            • memory/3020-16-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB