Analysis

  • max time kernel
    160s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 12:38

General

  • Target

    1bdb80742c8681822df0355155826fd50aebdf83c9a8f17ecc895b5c7aec3ec5.exe

  • Size

    316KB

  • MD5

    7da6d7f75a140a1c16cb7b8cc8cf27fe

  • SHA1

    347e569f06d8b5c797ae8a7c33ff1c0c56f5afeb

  • SHA256

    1bdb80742c8681822df0355155826fd50aebdf83c9a8f17ecc895b5c7aec3ec5

  • SHA512

    583c133d0a29e62b5dbf3e58cb719132ecd927543473f2c64246998218b1b2f6fc31022937e4dec9e26e974c0ed22096ecacada4a57a65953668de8ddd69602a

  • SSDEEP

    6144:KdVfjmNIgsm6/SJB2VzS+p5kHcLnZ5RT2vYW4F1MVhsoo04Se2RRp:K7+I3RSJB2lS+4UT1FS3ZLn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3140
      • C:\Users\Admin\AppData\Local\Temp\1bdb80742c8681822df0355155826fd50aebdf83c9a8f17ecc895b5c7aec3ec5.exe
        "C:\Users\Admin\AppData\Local\Temp\1bdb80742c8681822df0355155826fd50aebdf83c9a8f17ecc895b5c7aec3ec5.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1464
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA19F.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2776
          • C:\Users\Admin\AppData\Local\Temp\1bdb80742c8681822df0355155826fd50aebdf83c9a8f17ecc895b5c7aec3ec5.exe
            "C:\Users\Admin\AppData\Local\Temp\1bdb80742c8681822df0355155826fd50aebdf83c9a8f17ecc895b5c7aec3ec5.exe"
            4⤵
            • Executes dropped EXE
            PID:2576
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4632
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4184
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:376

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        823531bbd70233476ca605959cb8d2cc

        SHA1

        74d878fd6828e77407da2f3c7a4085df4a6911ab

        SHA256

        9a10abcfd9877c51a6a4bfd5f81681f59537171b37f398571d9ba9cbde784c16

        SHA512

        08bb43ac1d17d35709a4beafe60fd5074d9ee0c30398e0e934ff3bef0577a19f20be821dbf5d02fcaa0fb1f48fa2defec4b41d6ca99bfb2b7d51f5290f622632

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        6a7f204fa4ffd417ccd83928b35482b6

        SHA1

        c9b8d6c232b0584326938e67703c0a3f1ca839ef

        SHA256

        0898d285d5ec1843485b7380bcbc3f665cfbe759a426b525007a76ad77940917

        SHA512

        2c13e6ff5ee26a25d4e5be491fc5ad526aa6dfb34fb2c4b8a5f1a7c8286e0e911985dc3a70cfc82924137d70e361382c2fe15be9ceecebb6a5787c770477d677

      • C:\Users\Admin\AppData\Local\Temp\$$aA19F.bat

        Filesize

        722B

        MD5

        1590cd77326ca666a84cecc9c66c9197

        SHA1

        451c4cce1a48fdf5184dc15dd88306944e02a4c1

        SHA256

        efe89bbaa97b1259a3ffc74c8abde08c3224b7a8444a3eadba96e6cbe780f394

        SHA512

        f3dfff7fc1cf2c4043cd82affa7d6595ef1532967fde47d6cb09c78a0c6773b08c382191e5e4f2300b52cf797d2f7c4013720d868bbda18e210ed05d8bdeed13

      • C:\Users\Admin\AppData\Local\Temp\1bdb80742c8681822df0355155826fd50aebdf83c9a8f17ecc895b5c7aec3ec5.exe

        Filesize

        289KB

        MD5

        2e0a4e779b0bc3249632a2ee142abea1

        SHA1

        49396629e30100ad2a29cc46ca738cf4165e4aa2

        SHA256

        34464f94ae95d0be898172f344565f4f5220d10a921a9c9098a1f65b6234dd03

        SHA512

        3e58456b4f8bccf1b9807e3e2202deae17f6a7ad78415fbc2013a4fe437cd729624c101da0d24637d6c5a09e5aa3be64ee84cd718d70bb84c826c37ad777c265

      • C:\Users\Admin\AppData\Local\Temp\1bdb80742c8681822df0355155826fd50aebdf83c9a8f17ecc895b5c7aec3ec5.exe.exe

        Filesize

        289KB

        MD5

        2e0a4e779b0bc3249632a2ee142abea1

        SHA1

        49396629e30100ad2a29cc46ca738cf4165e4aa2

        SHA256

        34464f94ae95d0be898172f344565f4f5220d10a921a9c9098a1f65b6234dd03

        SHA512

        3e58456b4f8bccf1b9807e3e2202deae17f6a7ad78415fbc2013a4fe437cd729624c101da0d24637d6c5a09e5aa3be64ee84cd718d70bb84c826c37ad777c265

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b16f445581f1c84748e3ef64f127b97d

        SHA1

        b5eee38ce13635f35a781926f8434a07ca295872

        SHA256

        b3fe889ff71155b7882670d7a2197a75cc11601a7a1003eb1948be8a87f916f8

        SHA512

        de97b113bed31ba85a533a4f8bc6a6f25df09403299e45a23cd908cbd6dded5b033fc0dbd800f143045871f57dff198036bc1a539b1d44527fca2cb7cb195e54

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b16f445581f1c84748e3ef64f127b97d

        SHA1

        b5eee38ce13635f35a781926f8434a07ca295872

        SHA256

        b3fe889ff71155b7882670d7a2197a75cc11601a7a1003eb1948be8a87f916f8

        SHA512

        de97b113bed31ba85a533a4f8bc6a6f25df09403299e45a23cd908cbd6dded5b033fc0dbd800f143045871f57dff198036bc1a539b1d44527fca2cb7cb195e54

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        b16f445581f1c84748e3ef64f127b97d

        SHA1

        b5eee38ce13635f35a781926f8434a07ca295872

        SHA256

        b3fe889ff71155b7882670d7a2197a75cc11601a7a1003eb1948be8a87f916f8

        SHA512

        de97b113bed31ba85a533a4f8bc6a6f25df09403299e45a23cd908cbd6dded5b033fc0dbd800f143045871f57dff198036bc1a539b1d44527fca2cb7cb195e54

      • F:\$RECYCLE.BIN\S-1-5-21-919254492-3979293997-764407192-1000\_desktop.ini

        Filesize

        10B

        MD5

        a2f55d4dd0965430ceab2e112f7ee0a8

        SHA1

        d5e114f97985141a73b1e325728e5fd21e432f60

        SHA256

        f905d8a1cc369898067bdb4538843b91eb17d0d84032e2b5766ef438e25f807f

        SHA512

        8bce44ff59da58c0f9a3fdec7edb997a6781cd8f6aa4bc8ef0945c0a4dcde1db93092b88d2e114cd29d58931265b2aa1055dab677716cf75f1482faaa4c9bcdc

      • memory/1464-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1464-10-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-208-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-1278-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-3775-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4632-4820-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB