Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 15:06

General

  • Target

    57780d93c601dab0af2262315048d2f4338e2fd4673b27431aad2994df235e64.exe

  • Size

    29KB

  • MD5

    058e737598a723c5ee233a21dea44bfa

  • SHA1

    6ac91238ab02d5c905988b79631e4a4fb66c25c7

  • SHA256

    57780d93c601dab0af2262315048d2f4338e2fd4673b27431aad2994df235e64

  • SHA512

    499b0a7204465ac3fd15156375a7bc980b3e4603891420489107f7308c1ac2a3834c3fe3247934bbcca10e3eafbd3a0aa32bc6bfbfdad412a5a3319261195e54

  • SSDEEP

    384:NbbXh21Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:pT416GVRu1yK9fMnJG2V9dHS8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\57780d93c601dab0af2262315048d2f4338e2fd4673b27431aad2994df235e64.exe
        "C:\Users\Admin\AppData\Local\Temp\57780d93c601dab0af2262315048d2f4338e2fd4673b27431aad2994df235e64.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2044
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2620

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        a063fcec3d12e4b574ff0fcebb94d8ee

        SHA1

        5276dc1a49587121f61a1c413d2d680c2f2c800a

        SHA256

        3e36b16fa5f7f0056288c949d5679d0efba5b5aeea9ea229d7dec524b3e30832

        SHA512

        a4f98d9c2227723c7df7a1bc03fe9d3503218e8fc1bb5765bb0f326386d8d2c5c998260b55553033812a077dbccac9601206343057abf8018c9cfb24b56b8c6c

      • C:\Program Files\7-Zip\7zFM.exe

        Filesize

        876KB

        MD5

        3ae698e003be987820f94f71e432caa2

        SHA1

        9e1af1c6b8560b452088604bac45e5328d1cc3df

        SHA256

        b8fe11638c4372251ff458a9f7ae0f67ad548f7ec4b658cb22b9ad57587917aa

        SHA512

        1939623bda2494af02eafb6b8fd80e8bb7ba54efee79072a599dadd64340e535d817f4efb2abaa1e792102d6f867417259665fc8e129101072f30b102cab3f9e

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        474KB

        MD5

        d31877eef7e561fbb55a7fb91d6d6d05

        SHA1

        a631ce13116e5a4854d17b9b9615cb38f0c62b21

        SHA256

        424bbd6dee004b2ac4592123e35297c3e03745c9e9f76c1a102686f7b2f630a0

        SHA512

        0efb6acb91de8b8d26e453856a3b80a61b2e9be79abc1af0073ad3f4dd57302251da9307ff4556351ac4b0e050bace38078081ac9d885b07fbdb055e541846da

      • F:\$RECYCLE.BIN\S-1-5-21-3849525425-30183055-657688904-1000\_desktop.ini

        Filesize

        10B

        MD5

        a2f55d4dd0965430ceab2e112f7ee0a8

        SHA1

        d5e114f97985141a73b1e325728e5fd21e432f60

        SHA256

        f905d8a1cc369898067bdb4538843b91eb17d0d84032e2b5766ef438e25f807f

        SHA512

        8bce44ff59da58c0f9a3fdec7edb997a6781cd8f6aa4bc8ef0945c0a4dcde1db93092b88d2e114cd29d58931265b2aa1055dab677716cf75f1482faaa4c9bcdc

      • memory/1204-5-0x0000000002200000-0x0000000002201000-memory.dmp

        Filesize

        4KB

      • memory/2452-68-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2452-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2452-75-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2452-22-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2452-1827-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2452-17-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2452-3287-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2452-9-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB