Analysis

  • max time kernel
    151s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 01:37

General

  • Target

    3de38a0ffc7b368fffd7ff69e311f0155859ce092b57a9f704521c2ef6043f53.exe

  • Size

    631KB

  • MD5

    d8caf645182782061ac4d15d67e67b8f

  • SHA1

    4e03ed5bee7b9d153e24ed6833562ebbc3b9071d

  • SHA256

    3de38a0ffc7b368fffd7ff69e311f0155859ce092b57a9f704521c2ef6043f53

  • SHA512

    c4c97226b99938471137086cea1eef2a8bcc422870f94751a36ffe439f1014e31c0e81f3532da374befae8d66f479f916a5f8d158232f131dcdbb3c419a80155

  • SSDEEP

    12288:w7+gx51llsmpM0HOgcbT3QIRvv+oH8iVdpUY7z3kk+U65QgQx/F2:w7t5PpM0HrwTgIRX+oH8iuszkk+1QNt2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2572
      • C:\Users\Admin\AppData\Local\Temp\3de38a0ffc7b368fffd7ff69e311f0155859ce092b57a9f704521c2ef6043f53.exe
        "C:\Users\Admin\AppData\Local\Temp\3de38a0ffc7b368fffd7ff69e311f0155859ce092b57a9f704521c2ef6043f53.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aC0CF.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Users\Admin\AppData\Local\Temp\3de38a0ffc7b368fffd7ff69e311f0155859ce092b57a9f704521c2ef6043f53.exe
            "C:\Users\Admin\AppData\Local\Temp\3de38a0ffc7b368fffd7ff69e311f0155859ce092b57a9f704521c2ef6043f53.exe"
            4⤵
            • Executes dropped EXE
            PID:3516
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:960
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
        2⤵
          PID:4720

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        9401276c0e9186114cd3e571fe031d4e

        SHA1

        0f2a73bf7aedc9aebee4244b0eab49ff8f61d2d7

        SHA256

        6bd72ff55538749ca17d70c51cfdf9f87cae0465da43a06c005d659172e7b5f8

        SHA512

        999523b0d62094539182eba21ad6baf220a493f5d2f466107ed188bb9f74d4fc77070848d49f51931d2dbd79c043be82674ada15e9e0bc3a3d0df404c9e42c83

      • C:\Users\Admin\AppData\Local\Temp\$$aC0CF.bat

        Filesize

        722B

        MD5

        aac2cb1c62fb9c2465c9a334f3bc6e55

        SHA1

        1a930266b337a805e800d81ce2dd84564f037f16

        SHA256

        3461298a4deae69d7699ff34ea8d421bc04fc565c4db66d20dafe49c299fce1b

        SHA512

        48e92e4c2187485ece9f8801e702ff7b5c4fc0725913137e3345250a08e611d4b4aa4c8d01b12d0b50de5de5cfe123ab1a56ead764a459447a0c26e3419d40da

      • C:\Users\Admin\AppData\Local\Temp\3de38a0ffc7b368fffd7ff69e311f0155859ce092b57a9f704521c2ef6043f53.exe

        Filesize

        604KB

        MD5

        cff5df9c111d056a4f113ad0a7a71509

        SHA1

        9c02a4ac6193391efef707fe6c278bf7a6d40a53

        SHA256

        dd532e5981ef12c8831bb9116014f397bec115d113f9ea065215aa6ec9e8d9ae

        SHA512

        f7139c1c1f588680c8b458b50669895e7d7f6d75b53c5821c51b9212da64e2639059434fc020ccb4b51b5019fbfdbbcd3eb305c4418bf61ecc46f28aa8bad393

      • C:\Users\Admin\AppData\Local\Temp\3de38a0ffc7b368fffd7ff69e311f0155859ce092b57a9f704521c2ef6043f53.exe.exe

        Filesize

        604KB

        MD5

        cff5df9c111d056a4f113ad0a7a71509

        SHA1

        9c02a4ac6193391efef707fe6c278bf7a6d40a53

        SHA256

        dd532e5981ef12c8831bb9116014f397bec115d113f9ea065215aa6ec9e8d9ae

        SHA512

        f7139c1c1f588680c8b458b50669895e7d7f6d75b53c5821c51b9212da64e2639059434fc020ccb4b51b5019fbfdbbcd3eb305c4418bf61ecc46f28aa8bad393

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        5128e7fe9ab673fb178f784bd8e33e26

        SHA1

        76a623b600839a75146b4f36f58c60d3647ace5e

        SHA256

        ebd0863585b4cd4d8078ed464df33cffbc4c770543c928741759b17f2a5a5f3f

        SHA512

        c7cdc200b632c6ac2b6b78d19afbbd458314053cb43d6b717fba6025571f6a1c255426f66bdc137a0b3e330124e061d62dadc20b5f98f30638a30f6937732f7e

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        5128e7fe9ab673fb178f784bd8e33e26

        SHA1

        76a623b600839a75146b4f36f58c60d3647ace5e

        SHA256

        ebd0863585b4cd4d8078ed464df33cffbc4c770543c928741759b17f2a5a5f3f

        SHA512

        c7cdc200b632c6ac2b6b78d19afbbd458314053cb43d6b717fba6025571f6a1c255426f66bdc137a0b3e330124e061d62dadc20b5f98f30638a30f6937732f7e

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        5128e7fe9ab673fb178f784bd8e33e26

        SHA1

        76a623b600839a75146b4f36f58c60d3647ace5e

        SHA256

        ebd0863585b4cd4d8078ed464df33cffbc4c770543c928741759b17f2a5a5f3f

        SHA512

        c7cdc200b632c6ac2b6b78d19afbbd458314053cb43d6b717fba6025571f6a1c255426f66bdc137a0b3e330124e061d62dadc20b5f98f30638a30f6937732f7e

      • F:\$RECYCLE.BIN\S-1-5-21-3027552071-446050021-1254071215-1000\_desktop.ini

        Filesize

        10B

        MD5

        743754b59d55d26c081d8f839a3662c8

        SHA1

        8e88e3bda53f58b9122f6f9c9a5f23f80e7be6c7

        SHA256

        bbb0f1aae4572c821fac1d6b7890df67d9f4a7576af30e70925192dded063e8b

        SHA512

        1e8d9e5e1651bd2aaef969713d949cc4ddab58c53d0be31392d660aedeb621a0f968196e4938d2ba75e40ebdb7557cee23bf5587877268cb087fdd09a8abba1b

      • memory/960-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/960-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/960-27-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/960-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/960-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/960-42-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/960-44-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/960-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/960-1279-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/960-1303-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2564-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2564-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB