Analysis

  • max time kernel
    153s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 19:22

General

  • Target

    e143abcba28b63bf1536a71bfe371a60bd684bf02403d416ca66ab1ec5c5446f.exe

  • Size

    29KB

  • MD5

    d6d78ef231d3a36987504f2bccc0bc73

  • SHA1

    a88cb4c3795f31cb927985b37729bc729f0eaa54

  • SHA256

    e143abcba28b63bf1536a71bfe371a60bd684bf02403d416ca66ab1ec5c5446f

  • SHA512

    d5f837b4528f7a1a871956d69f7c9e063adf83bad76f79ae90a95962add1753fbde49094531e6f84e3d7f3c73304d62f105be1bb9ea11109162411f94606d33d

  • SSDEEP

    384:z7nbbkHc7HAR1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfR9C5fy+:/bmc7+16GVRu1yK9fMnJG2V9dDClcx

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3216
      • C:\Users\Admin\AppData\Local\Temp\e143abcba28b63bf1536a71bfe371a60bd684bf02403d416ca66ab1ec5c5446f.exe
        "C:\Users\Admin\AppData\Local\Temp\e143abcba28b63bf1536a71bfe371a60bd684bf02403d416ca66ab1ec5c5446f.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4784
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1244
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1352

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Google\Chrome\Application\chrome.exe

        Filesize

        2.8MB

        MD5

        6eb53be252bc198b65174039f4759e93

        SHA1

        c07898ac7163591463550f33314aa81f24d9b37e

        SHA256

        0f3db7b9da2e888ff93236d8c91157b9fe4577600e87ed5f8d3659a97ec9c72e

        SHA512

        4380af6168381a06c3c5bc7356f9ff7183041a5ee345d60df98e1889b328b6af02f74f99587ee18b5ceebb6527cb39151134588105c0e1420eba2886f72d1046

      • F:\$RECYCLE.BIN\S-1-5-21-919254492-3979293997-764407192-1000\_desktop.ini

        Filesize

        10B

        MD5

        743754b59d55d26c081d8f839a3662c8

        SHA1

        8e88e3bda53f58b9122f6f9c9a5f23f80e7be6c7

        SHA256

        bbb0f1aae4572c821fac1d6b7890df67d9f4a7576af30e70925192dded063e8b

        SHA512

        1e8d9e5e1651bd2aaef969713d949cc4ddab58c53d0be31392d660aedeb621a0f968196e4938d2ba75e40ebdb7557cee23bf5587877268cb087fdd09a8abba1b

      • memory/4784-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4784-5-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4784-6-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4784-10-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4784-15-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4784-21-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4784-26-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4784-30-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4784-36-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4784-1267-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB