Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 16:44

General

  • Target

    6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe

  • Size

    239KB

  • MD5

    d15e762f5c2a945e4d80ff6402c7ec7a

  • SHA1

    71de57c98c2294c8ead277af7f394073495e7834

  • SHA256

    6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07

  • SHA512

    141bc5d03ed90a7d01decfaa4256f56e4f4ce4ff552ba95d1670e362eb53283ddc621ebc24e25bb0e65c72314d0c066bae23a06d8ddb2f0008ed84d45f1d6465

  • SSDEEP

    3072:6ftffjmNbqcVz5fzsTl4dsOc6v2vTzwU+Pho86meq+FaSoB2+vSHrX:6VfjmNecT93PiY+Fa7BdvGX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3184
      • C:\Users\Admin\AppData\Local\Temp\6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe
        "C:\Users\Admin\AppData\Local\Temp\6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:436
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aDBE9.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5032
          • C:\Users\Admin\AppData\Local\Temp\6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe
            "C:\Users\Admin\AppData\Local\Temp\6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe"
            4⤵
            • Executes dropped EXE
            PID:3180
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:5068
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1408
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1076

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\RestartPing.exe

        Filesize

        231KB

        MD5

        a061339d4e7835889bd9c009b1ad6c89

        SHA1

        44ff6b0354d956a7409ffeb55e93878aa19b3fb6

        SHA256

        f8aca0e6079e6e5c5e36f02b6a9f388feac3a6a68145bb258cc97872c2de7877

        SHA512

        bc4a5c7b2bf9ab7e505e827d42309fe95d86fc1355d6c8b804435b5ac7ef79d0a4cc6c3d45fe2e64cac11df1efc6bfa77fefc954a83fde3443185edcb8725f99

      • C:\Users\Admin\AppData\Local\Temp\$$aDBE9.bat

        Filesize

        722B

        MD5

        c1041311ba25da7a4128a059d53ffee8

        SHA1

        291e3b7d5bcee89625c070894a51e97b76070fe5

        SHA256

        e0f7b97a98086bfbafdad762f191ab8404a448f1d8c40bee42243c8bd772b34c

        SHA512

        352940b168f919e947c1a33df4af6824d90afd49f5d86b348656861a657ab4d1081f6dadf15d223c37c916245583d20402705dcec46d3717c0883a1a388dadab

      • C:\Users\Admin\AppData\Local\Temp\6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe

        Filesize

        213KB

        MD5

        20d89d1781cde87db3a8b59da816efcc

        SHA1

        4f6670c4dcd8d978b21d1db91e081e609f5abcd0

        SHA256

        4653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983

        SHA512

        7b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e

      • C:\Users\Admin\AppData\Local\Temp\6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe.exe

        Filesize

        213KB

        MD5

        20d89d1781cde87db3a8b59da816efcc

        SHA1

        4f6670c4dcd8d978b21d1db91e081e609f5abcd0

        SHA256

        4653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983

        SHA512

        7b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c3165d40a734c60853b7ce8536f86b1f

        SHA1

        41c122c44d36d2e6004b2a513e97c8f8351f75c2

        SHA256

        424cc4d8c565f8c8f4061ca15be00408194a8ab2abc5b5d49eb1bf175aa566cd

        SHA512

        6b077839e54043bcbb2edbc54a620d058a8264b0e373183a0696bfb81bc045ad1218c17bc35da2fdff9cb635597a8096c9a614c7a36308b268438fb4e324c698

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c3165d40a734c60853b7ce8536f86b1f

        SHA1

        41c122c44d36d2e6004b2a513e97c8f8351f75c2

        SHA256

        424cc4d8c565f8c8f4061ca15be00408194a8ab2abc5b5d49eb1bf175aa566cd

        SHA512

        6b077839e54043bcbb2edbc54a620d058a8264b0e373183a0696bfb81bc045ad1218c17bc35da2fdff9cb635597a8096c9a614c7a36308b268438fb4e324c698

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        c3165d40a734c60853b7ce8536f86b1f

        SHA1

        41c122c44d36d2e6004b2a513e97c8f8351f75c2

        SHA256

        424cc4d8c565f8c8f4061ca15be00408194a8ab2abc5b5d49eb1bf175aa566cd

        SHA512

        6b077839e54043bcbb2edbc54a620d058a8264b0e373183a0696bfb81bc045ad1218c17bc35da2fdff9cb635597a8096c9a614c7a36308b268438fb4e324c698

      • F:\$RECYCLE.BIN\S-1-5-21-1574508946-349927670-1185736483-1000\_desktop.ini

        Filesize

        10B

        MD5

        743754b59d55d26c081d8f839a3662c8

        SHA1

        8e88e3bda53f58b9122f6f9c9a5f23f80e7be6c7

        SHA256

        bbb0f1aae4572c821fac1d6b7890df67d9f4a7576af30e70925192dded063e8b

        SHA512

        1e8d9e5e1651bd2aaef969713d949cc4ddab58c53d0be31392d660aedeb621a0f968196e4938d2ba75e40ebdb7557cee23bf5587877268cb087fdd09a8abba1b

      • memory/436-10-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/436-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5068-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5068-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5068-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5068-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5068-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5068-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5068-73-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5068-354-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5068-1118-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5068-1119-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5068-1120-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB