Analysis

  • max time kernel
    151s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 19:22

General

  • Target

    e143abcba28b63bf1536a71bfe371a60bd684bf02403d416ca66ab1ec5c5446f.exe

  • Size

    29KB

  • MD5

    d6d78ef231d3a36987504f2bccc0bc73

  • SHA1

    a88cb4c3795f31cb927985b37729bc729f0eaa54

  • SHA256

    e143abcba28b63bf1536a71bfe371a60bd684bf02403d416ca66ab1ec5c5446f

  • SHA512

    d5f837b4528f7a1a871956d69f7c9e063adf83bad76f79ae90a95962add1753fbde49094531e6f84e3d7f3c73304d62f105be1bb9ea11109162411f94606d33d

  • SSDEEP

    384:z7nbbkHc7HAR1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfR9C5fy+:/bmc7+16GVRu1yK9fMnJG2V9dDClcx

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\e143abcba28b63bf1536a71bfe371a60bd684bf02403d416ca66ab1ec5c5446f.exe
        "C:\Users\Admin\AppData\Local\Temp\e143abcba28b63bf1536a71bfe371a60bd684bf02403d416ca66ab1ec5c5446f.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2132

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7zFM.exe

        Filesize

        876KB

        MD5

        cd84a5754c5800fb138717f805c78d21

        SHA1

        52df0726995b806207e70a17683a96d45f76375b

        SHA256

        d81cbe75ca48d48afcc0ec4fa07b2186ffc5622f7a09309b65fcc2bdd42138bf

        SHA512

        c5b06dcb2c43f74182e81921c2469381354fd15e2cee471d7f4de4e4eca22950a7c6c2ddc10ec4bbddf142cd58753064dd2ea682d42370069810f5eb2c979858

      • F:\$RECYCLE.BIN\S-1-5-21-686452656-3203474025-4140627569-1000\_desktop.ini

        Filesize

        10B

        MD5

        743754b59d55d26c081d8f839a3662c8

        SHA1

        8e88e3bda53f58b9122f6f9c9a5f23f80e7be6c7

        SHA256

        bbb0f1aae4572c821fac1d6b7890df67d9f4a7576af30e70925192dded063e8b

        SHA512

        1e8d9e5e1651bd2aaef969713d949cc4ddab58c53d0be31392d660aedeb621a0f968196e4938d2ba75e40ebdb7557cee23bf5587877268cb087fdd09a8abba1b

      • memory/1232-5-0x0000000002B60000-0x0000000002B61000-memory.dmp

        Filesize

        4KB

      • memory/2184-9-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2184-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2184-16-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2184-22-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2184-24-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2184-69-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2184-75-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2184-87-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2184-166-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2184-184-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2184-1830-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB