Analysis

  • max time kernel
    152s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 03:12

General

  • Target

    67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe

  • Size

    2.2MB

  • MD5

    2eecb82127b8616ae0daa0fe790a5c33

  • SHA1

    052dff3e2d6a1570ee3d87cce27f565ca1d2f2fb

  • SHA256

    67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428

  • SHA512

    90173c0580d6df225fddbd5c4fcff720322d5ffb5f5168675ed9aba66f0a5dbc4e95fb2992b2145d3381022ff90da2c00c620e8126fcb4bda3087cdad5357000

  • SSDEEP

    49152:M7Oo/h+moA0LVE2VU5zbJ49DzdIc/YYRCBTcJC:XO1NJYDTYYHJC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2500
      • C:\Users\Admin\AppData\Local\Temp\67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe
        "C:\Users\Admin\AppData\Local\Temp\67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4776
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE35B.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Users\Admin\AppData\Local\Temp\67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe
            "C:\Users\Admin\AppData\Local\Temp\67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe"
            4⤵
            • Executes dropped EXE
            PID:1240
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3372
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4248
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1820

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        0552771f528638131f55a9e6490f3326

        SHA1

        1b901e2f055ea532434011108711c630bd2810b0

        SHA256

        7f3d847976f1ece3c062dd97d4d027f427aaf8a96169098eaf2dab2854107730

        SHA512

        20a90b4778da24b1706bafb626ad032440197a3403b46ce8c1a2b115d662efb9ea91da2f14dc8e3b29475730cea703ac35bd49e545415410935b80653b9331a6

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        d6ef5a13e561dd400cab71c780ee2f47

        SHA1

        4c11e8de79732a6313da0f7783659734995d2793

        SHA256

        18d9a8c03b1360c768cb5b7a2072bb31608c4049079ee292a466bf91ff236e8c

        SHA512

        0bb2941c9df7209a89dab34174ff6e5609ffebcb3479c11d686b3ba3abad20ddf13cb9462a722ddd3c11eb6b84785ffa56fc504a7127db9c89439775697719dc

      • C:\Users\Admin\AppData\Local\Temp\$$aE35B.bat

        Filesize

        722B

        MD5

        529d45ae7322da3366237aff0c684780

        SHA1

        46eb7b4840b0d62c66436bd13cdd914431ff9dbe

        SHA256

        1fad96a914a19a58dc76f2cf421e3f62871b92f84f393d24206985980e4d2b13

        SHA512

        b0ad4445c58ee5ac5430383bcc26ef4ee78a4148660fe2d4076ba93216c7143bd6c8bdd548ecc679e91d471abf844fb59b748996fdb72b4858d5e6e303265fde

      • C:\Users\Admin\AppData\Local\Temp\67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe

        Filesize

        2.1MB

        MD5

        af3363329baffc22d26621413dd3b27e

        SHA1

        3186306c73d0f15db59d12c1d65265763d1ab7ac

        SHA256

        8ed8d9304aa5778b4eeddbd64981d14db5d87e78481c2584e1d521cbeed078f8

        SHA512

        6bedd460e20b6720b30fa63fdaed5ec041eebfdcd34901c9a52068a3acf1c8de2b03563b47e49a2eb944c29d54d6fc662f402aeb52c1fd9054234e0e35ed2aad

      • C:\Users\Admin\AppData\Local\Temp\67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe.exe

        Filesize

        2.1MB

        MD5

        af3363329baffc22d26621413dd3b27e

        SHA1

        3186306c73d0f15db59d12c1d65265763d1ab7ac

        SHA256

        8ed8d9304aa5778b4eeddbd64981d14db5d87e78481c2584e1d521cbeed078f8

        SHA512

        6bedd460e20b6720b30fa63fdaed5ec041eebfdcd34901c9a52068a3acf1c8de2b03563b47e49a2eb944c29d54d6fc662f402aeb52c1fd9054234e0e35ed2aad

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        fa7187d52031d8ed051bd81b2ec67b99

        SHA1

        7a5f07ec0f06d37b3c98ba31b515b61edc7a8e85

        SHA256

        0490247e51fceaf8c554e75c84a43cb4f6efc9655b5a8a87591c5609a1d6ac49

        SHA512

        dfb27bdb65be8d9c8071144205948d91d8dcb9d2f9dbee4f6e9387e8355c9c78ce835f63b96932cdfdc66038a95dff1f9e719d80522d783400b7f7fd19af5009

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        fa7187d52031d8ed051bd81b2ec67b99

        SHA1

        7a5f07ec0f06d37b3c98ba31b515b61edc7a8e85

        SHA256

        0490247e51fceaf8c554e75c84a43cb4f6efc9655b5a8a87591c5609a1d6ac49

        SHA512

        dfb27bdb65be8d9c8071144205948d91d8dcb9d2f9dbee4f6e9387e8355c9c78ce835f63b96932cdfdc66038a95dff1f9e719d80522d783400b7f7fd19af5009

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        fa7187d52031d8ed051bd81b2ec67b99

        SHA1

        7a5f07ec0f06d37b3c98ba31b515b61edc7a8e85

        SHA256

        0490247e51fceaf8c554e75c84a43cb4f6efc9655b5a8a87591c5609a1d6ac49

        SHA512

        dfb27bdb65be8d9c8071144205948d91d8dcb9d2f9dbee4f6e9387e8355c9c78ce835f63b96932cdfdc66038a95dff1f9e719d80522d783400b7f7fd19af5009

      • F:\$RECYCLE.BIN\S-1-5-21-1141987721-3945596982-3297311814-1000\_desktop.ini

        Filesize

        10B

        MD5

        64a8745f77935c35c66f3aeeddf5d47d

        SHA1

        1214a584f661cb008b494ce6278289f8cf406810

        SHA256

        7841de37b0bf8c995d0b903bef18bd4159f94d9c2a35c91b06dabe8198c6c63a

        SHA512

        807b8f5512f868d0a2b1a10889164f787aa07b4309511326f4755d1121e666ec30dfb444a0565a5a7426cbd45b41d49d6429c9baf63a0bd3948b85b57841af3b

      • memory/3372-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3372-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3372-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3372-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3372-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3372-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3372-242-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3372-1278-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3372-2255-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3372-4977-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4776-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4776-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB