Analysis

  • max time kernel
    195s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 05:26

General

  • Target

    4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe

  • Size

    806KB

  • MD5

    4db322ec9cefd0b37e9d26b4b21f9b46

  • SHA1

    a68df7c5e0dfc0a3d4fecba1aab62e18962942dd

  • SHA256

    4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83

  • SHA512

    9fbdc1a68afb33fd10c003ee3e08d12209214bdd0af94fbea714eaea033df280cea6a4a481fc029a818fe3ca3a1d90e54df7c96335e0a41e949cabc81288fedc

  • SSDEEP

    12288:e7+XtJt5nIj79qVZMv2nKF3kVI2bovMYl7Vtq5c:e7IXnIf9oxKnEYlJtqa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3192
      • C:\Users\Admin\AppData\Local\Temp\4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe
        "C:\Users\Admin\AppData\Local\Temp\4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3488
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a1E31.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4684
          • C:\Users\Admin\AppData\Local\Temp\4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe
            "C:\Users\Admin\AppData\Local\Temp\4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe"
            4⤵
            • Executes dropped EXE
            PID:984
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3728
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:700
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3164

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        9da0e84d01bbccdc07e6e9a99c86e67f

        SHA1

        191abcc8acd15d0ced4af89079de05cae5fc886c

        SHA256

        0a170ac38745b4e049e30e3a45af2fbf1dab0df153af9d216d213a526591bbe5

        SHA512

        0216028f4feab7bb8f2ee4062544a3eba98781021e0bcce320bad3ab06b7831fbcdedffb1a24154e60643ece33ee1c33894eeca7733e10edfb3245045ff93b03

      • C:\Users\Admin\AppData\Local\Temp\$$a1E31.bat

        Filesize

        722B

        MD5

        4227c5002d9b0225572da80ce6f6487a

        SHA1

        3775053900ae78f8d61435e114e36a3a0119796b

        SHA256

        edde195ac83ccd6d7915aaceb876f93ed638f47aae24116214c8b23cdf7089b2

        SHA512

        510f0b98c8d42c4a2f576a5fb2eb0ddd01fc4f0f2c802928297b261a8f2f902a3abe2de8fd52819f1451cc1dab3ae759ff7a02cdc9c52f6f86a5bcc573527a45

      • C:\Users\Admin\AppData\Local\Temp\4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe

        Filesize

        780KB

        MD5

        6475283568ad278b0e4f0ac03dd85a72

        SHA1

        5ef270214d6617389c02dbf0869350e76a40e857

        SHA256

        cc1c3a68c4bc9739a1ea6b832633e409920005c6c7fa933249d5e4f3ad4d9553

        SHA512

        afc528f8e435a2de4cece460d80311c2b40ae07d3178fdb3fa8a08c60355a8058ffe94f5aeadab84e1a108e01b00e1cf8fd0b09af6c377b611754a7196fe35ee

      • C:\Users\Admin\AppData\Local\Temp\4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe.exe

        Filesize

        780KB

        MD5

        6475283568ad278b0e4f0ac03dd85a72

        SHA1

        5ef270214d6617389c02dbf0869350e76a40e857

        SHA256

        cc1c3a68c4bc9739a1ea6b832633e409920005c6c7fa933249d5e4f3ad4d9553

        SHA512

        afc528f8e435a2de4cece460d80311c2b40ae07d3178fdb3fa8a08c60355a8058ffe94f5aeadab84e1a108e01b00e1cf8fd0b09af6c377b611754a7196fe35ee

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        9ad92124bbe38e2706efcedebb82bd08

        SHA1

        ea1478dc19d256bcaa2926c0908534e9750815f5

        SHA256

        c8bca955a769c0b6a83bb24db3f4bf97514ab3a27cd1b7da7891b5755a822126

        SHA512

        d41fcbab676e089bacfb249294f0fe6b04f93ff9bebfdd97a5f9ab8a2e5ba487fa8f6c36b3477a36ba22110343a7decbef061003c4b03ef48963350c85819ab7

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        9ad92124bbe38e2706efcedebb82bd08

        SHA1

        ea1478dc19d256bcaa2926c0908534e9750815f5

        SHA256

        c8bca955a769c0b6a83bb24db3f4bf97514ab3a27cd1b7da7891b5755a822126

        SHA512

        d41fcbab676e089bacfb249294f0fe6b04f93ff9bebfdd97a5f9ab8a2e5ba487fa8f6c36b3477a36ba22110343a7decbef061003c4b03ef48963350c85819ab7

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        9ad92124bbe38e2706efcedebb82bd08

        SHA1

        ea1478dc19d256bcaa2926c0908534e9750815f5

        SHA256

        c8bca955a769c0b6a83bb24db3f4bf97514ab3a27cd1b7da7891b5755a822126

        SHA512

        d41fcbab676e089bacfb249294f0fe6b04f93ff9bebfdd97a5f9ab8a2e5ba487fa8f6c36b3477a36ba22110343a7decbef061003c4b03ef48963350c85819ab7

      • F:\$RECYCLE.BIN\S-1-5-21-1926387074-3400613176-3566796709-1000\_desktop.ini

        Filesize

        10B

        MD5

        a592e6708558f3dc0ad1608608da69c5

        SHA1

        69a1224ba3b2f2ab2f2ce8b8287809f3282d20d0

        SHA256

        24c83924da516d8acac4cdc96680306f1e34a8a54696bf5bf24106eeb562195a

        SHA512

        38724fff525de3d5b413bb962c2f81369068403f761f69d00f25cd03b5d8cb83603cd6d23c87faf458f157acf585ca4db031fe6640704a4158cb5ead56ce79f1

      • memory/984-19-0x0000000000650000-0x0000000000651000-memory.dmp

        Filesize

        4KB

      • memory/984-21-0x0000000000400000-0x00000000004CA000-memory.dmp

        Filesize

        808KB

      • memory/984-22-0x0000000000650000-0x0000000000651000-memory.dmp

        Filesize

        4KB

      • memory/3488-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3488-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-31-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-46-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-52-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-62-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-75-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-1132-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-1134-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB