Analysis

  • max time kernel
    6s
  • max time network
    76s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 08:06

General

  • Target

    5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe

  • Size

    91KB

  • MD5

    c699455b19fc2de1a483b9b4e376acc7

  • SHA1

    afdb7f33050a882135407d962479318453c7c2aa

  • SHA256

    5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c

  • SHA512

    e93a9fa4554c09674b37682c7ac41f980ccaaa0e27065218998264aecd2337889ae2ed943d0c49d28d2b5046879ceada21ff43bf4fa50cdeb2058d207023476d

  • SSDEEP

    1536:zHgfgLdQAQfcfymNEq7pt9h0kwz9jE4pwqyo8Cy/:bgftffjmNE8pPhnwpwELyo8Cy/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 20 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe
        "C:\Users\Admin\AppData\Local\Temp\5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3392
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9952.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2616
          • C:\Users\Admin\AppData\Local\Temp\5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe
            "C:\Users\Admin\AppData\Local\Temp\5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe"
            4⤵
            • Executes dropped EXE
            PID:4900
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3588
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4744
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4640

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\$$a9952.bat

              Filesize

              722B

              MD5

              1d8d85496dcdba529c63337e30ca73b1

              SHA1

              16df9ee16bb94ddd6f5a1793df13985028894763

              SHA256

              f79d301339ff32a16449e488f27ab6be167a11f5fc635040256d6cbce72004d1

              SHA512

              7b89e911849ce3d3e71469b3d2c91edefd2f55d54780bf43478e570f124fdcc08f105e3257c6926f12ca75bb71ec7b9373a8566d25cb2e766f1f00c14edf8700

            • C:\Users\Admin\AppData\Local\Temp\5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe

              Filesize

              65KB

              MD5

              a2c35c9d3309970ebc36177455538f0c

              SHA1

              7ff8f15b5fde2eae6802bba1fe1c74e344ff1b21

              SHA256

              4c5766790d6abf25a17ee9776b0f996f7f1e41adda5abd617e8f31d9edc106ee

              SHA512

              9432b7f5e7abe7cb1bd5bb9bc268f6f318d6b9d2658856174a898cb96895048ef1bf5e09db663cbfb5eb3ec340b11c995acc3c8e26e2f8288dbdfe1d3f052628

            • C:\Users\Admin\AppData\Local\Temp\5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe.exe

              Filesize

              65KB

              MD5

              a2c35c9d3309970ebc36177455538f0c

              SHA1

              7ff8f15b5fde2eae6802bba1fe1c74e344ff1b21

              SHA256

              4c5766790d6abf25a17ee9776b0f996f7f1e41adda5abd617e8f31d9edc106ee

              SHA512

              9432b7f5e7abe7cb1bd5bb9bc268f6f318d6b9d2658856174a898cb96895048ef1bf5e09db663cbfb5eb3ec340b11c995acc3c8e26e2f8288dbdfe1d3f052628

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              adbda036baea601655cfb79bf4de55c8

              SHA1

              3ce1f014f615ff65f8e9b2499104d26078a9264c

              SHA256

              eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0

              SHA512

              1784f2999256fa043ae247b6b677b9065bbb0259229e04ab8afd92433817c18c141f6a58a3052f6f5b6772b620f64ddb55b17eeb9069785dbf0017af1b3368ea

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              adbda036baea601655cfb79bf4de55c8

              SHA1

              3ce1f014f615ff65f8e9b2499104d26078a9264c

              SHA256

              eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0

              SHA512

              1784f2999256fa043ae247b6b677b9065bbb0259229e04ab8afd92433817c18c141f6a58a3052f6f5b6772b620f64ddb55b17eeb9069785dbf0017af1b3368ea

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              adbda036baea601655cfb79bf4de55c8

              SHA1

              3ce1f014f615ff65f8e9b2499104d26078a9264c

              SHA256

              eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0

              SHA512

              1784f2999256fa043ae247b6b677b9065bbb0259229e04ab8afd92433817c18c141f6a58a3052f6f5b6772b620f64ddb55b17eeb9069785dbf0017af1b3368ea

            • memory/3392-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3392-9-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3588-10-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4900-18-0x0000000075200000-0x00000000757B1000-memory.dmp

              Filesize

              5.7MB