Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 04:51

General

  • Target

    6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe

  • Size

    219KB

  • MD5

    362bff72d4a1d8d1b52e6dec620272f2

  • SHA1

    f41957154db4efc1949717b9d1a0d784df47b038

  • SHA256

    6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f

  • SHA512

    6a85807d8b772ce2f70813ebdb285976dec8a9be5684345db9b95b3b7a72184c920872c316a07ceedfa6c8ed0c6c97d4eaad1933acf671949a4acb00194bd87a

  • SSDEEP

    3072:pykuJVLjZ5/v+1oOAFJ1LQjoT9T+WE+CHxTEnAdL/frrcJ+Q5S75nzU6DER:5uJN9OIJ1MoTpLCHxTEnAdrcJun/ER

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1348
      • C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe
        "C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a6BCD.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe
            "C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe"
            4⤵
            • Executes dropped EXE
            PID:2576
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2996
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2684
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2660

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        d3f033c2d6204b7a3003dca36688228d

        SHA1

        c14a1585f4c982230458a7edf94d70ff79f0e53e

        SHA256

        9519d629f5db5a1efa77ba49048aacd24040f4d3373af44975dd25e61ea57cdd

        SHA512

        762cce8bb2dfd19851bb725dddf29ffbcaba6f309362f4366202efd69e397c727cb3e0f8895dce3f2dd3bf7546ba2b168ecce1b2fe11606d4d545586c1ed3b6a

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        474KB

        MD5

        b64f00ca47092ef22416f70d5aa78fa6

        SHA1

        838f6038dabbb6936679e562133e96756c78bf2c

        SHA256

        d5c7eca76122a2ac5c42cc8d48ff5644e8c2d72282c6dc3c30e33d69d4a788cf

        SHA512

        b395f15a545d84a77f526f019dc69b03582f26fa6d2ff222b3cc0c5633f3e3aa722d477eefdb830a672650ebf628a0b897288793fc583cbb7f01485619a77c4e

      • C:\Users\Admin\AppData\Local\Temp\$$a6BCD.bat

        Filesize

        722B

        MD5

        5fe1be9cb57925ce0cacb3112693250f

        SHA1

        e1b4cb69f47f21bdcea4acb23d95e6cdad46e997

        SHA256

        c4d12407ad2981083c6d2a841338109d17492c5abf803792f26bf96eb53b0487

        SHA512

        686a2e067544e280201ee23d1d11dc062544baa1206dced9c799851146ae07b6a89110d2772fb40e18d5a28e1e746696f0839dd63781a2643fd0b9e28f324a00

      • C:\Users\Admin\AppData\Local\Temp\$$a6BCD.bat

        Filesize

        722B

        MD5

        5fe1be9cb57925ce0cacb3112693250f

        SHA1

        e1b4cb69f47f21bdcea4acb23d95e6cdad46e997

        SHA256

        c4d12407ad2981083c6d2a841338109d17492c5abf803792f26bf96eb53b0487

        SHA512

        686a2e067544e280201ee23d1d11dc062544baa1206dced9c799851146ae07b6a89110d2772fb40e18d5a28e1e746696f0839dd63781a2643fd0b9e28f324a00

      • C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe

        Filesize

        190KB

        MD5

        22f7ac91c7ffe88a17eaf9224182ebe0

        SHA1

        f459180230fe61638339876450328581c93f41f0

        SHA256

        1c3ca06fa431bdf123f8bab5e71a691078fe694886002382e52ecf9da7165b7e

        SHA512

        07d988d6df58fbf7a260a8a7c1155a999f50cf162950232b68e63fb38e28c25b35781f5a6f4ffbec9f3c60e266c41fb98bcb182ab7a6b71203f8476d94251d02

      • C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe.exe

        Filesize

        190KB

        MD5

        22f7ac91c7ffe88a17eaf9224182ebe0

        SHA1

        f459180230fe61638339876450328581c93f41f0

        SHA256

        1c3ca06fa431bdf123f8bab5e71a691078fe694886002382e52ecf9da7165b7e

        SHA512

        07d988d6df58fbf7a260a8a7c1155a999f50cf162950232b68e63fb38e28c25b35781f5a6f4ffbec9f3c60e266c41fb98bcb182ab7a6b71203f8476d94251d02

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        cf88808bf1a7bb211e559a06b88bcb9d

        SHA1

        494e46d62930a122e416356c9d2cec58d7fd7e45

        SHA256

        4bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4

        SHA512

        e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        cf88808bf1a7bb211e559a06b88bcb9d

        SHA1

        494e46d62930a122e416356c9d2cec58d7fd7e45

        SHA256

        4bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4

        SHA512

        e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        cf88808bf1a7bb211e559a06b88bcb9d

        SHA1

        494e46d62930a122e416356c9d2cec58d7fd7e45

        SHA256

        4bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4

        SHA512

        e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        cf88808bf1a7bb211e559a06b88bcb9d

        SHA1

        494e46d62930a122e416356c9d2cec58d7fd7e45

        SHA256

        4bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4

        SHA512

        e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65

      • F:\$RECYCLE.BIN\S-1-5-21-86725733-3001458681-3405935542-1000\_desktop.ini

        Filesize

        10B

        MD5

        a592e6708558f3dc0ad1608608da69c5

        SHA1

        69a1224ba3b2f2ab2f2ce8b8287809f3282d20d0

        SHA256

        24c83924da516d8acac4cdc96680306f1e34a8a54696bf5bf24106eeb562195a

        SHA512

        38724fff525de3d5b413bb962c2f81369068403f761f69d00f25cd03b5d8cb83603cd6d23c87faf458f157acf585ca4db031fe6640704a4158cb5ead56ce79f1

      • \Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe

        Filesize

        190KB

        MD5

        22f7ac91c7ffe88a17eaf9224182ebe0

        SHA1

        f459180230fe61638339876450328581c93f41f0

        SHA256

        1c3ca06fa431bdf123f8bab5e71a691078fe694886002382e52ecf9da7165b7e

        SHA512

        07d988d6df58fbf7a260a8a7c1155a999f50cf162950232b68e63fb38e28c25b35781f5a6f4ffbec9f3c60e266c41fb98bcb182ab7a6b71203f8476d94251d02

      • memory/1348-29-0x00000000021F0000-0x00000000021F1000-memory.dmp

        Filesize

        4KB

      • memory/1888-16-0x0000000000220000-0x0000000000256000-memory.dmp

        Filesize

        216KB

      • memory/1888-15-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1888-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2996-31-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2996-38-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2996-44-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2996-91-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2996-97-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2996-170-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2996-1849-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2996-3309-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2996-21-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB