Analysis

  • max time kernel
    152s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 04:40

General

  • Target

    e6f2778a3931e4ae5ba120a399ee4ff4e76fd8befb0d2686148fac1fb864955a.exe

  • Size

    46KB

  • MD5

    df85a193391af5a8109126d3498f431e

  • SHA1

    1650dd00ed72c445df5121c92206cce488fb866e

  • SHA256

    e6f2778a3931e4ae5ba120a399ee4ff4e76fd8befb0d2686148fac1fb864955a

  • SHA512

    7231e282c72c98ce875b69020279e08965c856de78b64c9a294591cf8c6cf285b2472dcf821e8842b2d30ae0f1ce1fb5a09d8bcd64cc6bef250c79559d694a5d

  • SSDEEP

    768:T1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL1nV9P8AGB2FZZfRDG74Uf2hLhM:JfgLdQAQfcfymNpV97Zfa4UfP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3084
      • C:\Users\Admin\AppData\Local\Temp\e6f2778a3931e4ae5ba120a399ee4ff4e76fd8befb0d2686148fac1fb864955a.exe
        "C:\Users\Admin\AppData\Local\Temp\e6f2778a3931e4ae5ba120a399ee4ff4e76fd8befb0d2686148fac1fb864955a.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2448
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aCDA0.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1656
          • C:\Users\Admin\AppData\Local\Temp\e6f2778a3931e4ae5ba120a399ee4ff4e76fd8befb0d2686148fac1fb864955a.exe
            "C:\Users\Admin\AppData\Local\Temp\e6f2778a3931e4ae5ba120a399ee4ff4e76fd8befb0d2686148fac1fb864955a.exe"
            4⤵
            • Executes dropped EXE
            PID:4360
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:228
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4828
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:5108

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\InvokeAdd.exe

        Filesize

        371KB

        MD5

        f06e290a4aeb5f84d2236fa8c9432d6b

        SHA1

        4033de036e2347970002cf410b4e0938e0b0f8e0

        SHA256

        170f28511c7b0c687509228b04e592f596a921973337ce62fafa96d3ec04cd72

        SHA512

        df2f90a1fb3aba8e18bb24e35504bc661f39e824b3c020f62579fa1c3666193e0eb22846692f2419d80c931fc80046bff99126020ab2a61d351a4ecb28fcf5c9

      • C:\Users\Admin\AppData\Local\Temp\$$aCDA0.bat

        Filesize

        722B

        MD5

        8b677916aa43fd3643e48fc03789b691

        SHA1

        83c8624031da332f2e31b533f942e3b0c9ee984f

        SHA256

        34b6b37781fb6fa324e242ca485b48cf428fa4237f18e050ac5860ad867acbb9

        SHA512

        ed1a929f55794bee1fd797634b5c3be1e509ad7545b218fc106d7156e5259d968b06fd6c8d1ce140211ebc286cc21ce86decc2aaff19dc34250841f23ea28099

      • C:\Users\Admin\AppData\Local\Temp\e6f2778a3931e4ae5ba120a399ee4ff4e76fd8befb0d2686148fac1fb864955a.exe

        Filesize

        20KB

        MD5

        fd5810b26ebdf2dbe069d80da8fd516d

        SHA1

        4bc0dd41a1ea87c34e5064bdaf28ab2ee063971a

        SHA256

        9ba18aa5e07ebd262d74412cca6e78bbd3c627d88f55555ad91e4038661f9fd1

        SHA512

        4f36deee6cfd5411b57aa5496de4d11eed020470142dee1543aef61279f8b36fe97ec5074fa3c104d977f7402a3a89a0faabc8b6b4aa485890d8a45bcc1b11e4

      • C:\Users\Admin\AppData\Local\Temp\e6f2778a3931e4ae5ba120a399ee4ff4e76fd8befb0d2686148fac1fb864955a.exe.exe

        Filesize

        20KB

        MD5

        fd5810b26ebdf2dbe069d80da8fd516d

        SHA1

        4bc0dd41a1ea87c34e5064bdaf28ab2ee063971a

        SHA256

        9ba18aa5e07ebd262d74412cca6e78bbd3c627d88f55555ad91e4038661f9fd1

        SHA512

        4f36deee6cfd5411b57aa5496de4d11eed020470142dee1543aef61279f8b36fe97ec5074fa3c104d977f7402a3a89a0faabc8b6b4aa485890d8a45bcc1b11e4

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c4f76c9eda83b93db5b8a64720cdc172

        SHA1

        84eddd03d7bb3586dde4ed85e59ce23a8a2bad9a

        SHA256

        f143b0bce17d7d8085692349cfb5427e4d51a89b93adacbd8305fa33fe208d09

        SHA512

        09169199ddade2f2a35496497ad882cf6350057e47cb21145f6a33e3270f7f844ca8592cf585970b00087bcc76e3784283f0bb4c4dc42fdada534f8043ceafa2

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c4f76c9eda83b93db5b8a64720cdc172

        SHA1

        84eddd03d7bb3586dde4ed85e59ce23a8a2bad9a

        SHA256

        f143b0bce17d7d8085692349cfb5427e4d51a89b93adacbd8305fa33fe208d09

        SHA512

        09169199ddade2f2a35496497ad882cf6350057e47cb21145f6a33e3270f7f844ca8592cf585970b00087bcc76e3784283f0bb4c4dc42fdada534f8043ceafa2

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        c4f76c9eda83b93db5b8a64720cdc172

        SHA1

        84eddd03d7bb3586dde4ed85e59ce23a8a2bad9a

        SHA256

        f143b0bce17d7d8085692349cfb5427e4d51a89b93adacbd8305fa33fe208d09

        SHA512

        09169199ddade2f2a35496497ad882cf6350057e47cb21145f6a33e3270f7f844ca8592cf585970b00087bcc76e3784283f0bb4c4dc42fdada534f8043ceafa2

      • C:\_desktop.ini

        Filesize

        9B

        MD5

        872506f1dadcc0cedd1e9dee11f54da4

        SHA1

        d1e87145ed1d918f10ae4e93ccdbb994bc906ed5

        SHA256

        a0049e98811438481e150df54f7b555026746c943cb03106677bf75b4e412104

        SHA512

        6cf3aeeed18e66a16ed653a5c33133ec8d5fb58cf42aab9e712cf473233e506d4f14692dff04b7c20847718e5c344ec2651e57d2ae7a034610b07679b786344c

      • memory/228-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/228-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/228-27-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/228-30-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/228-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/228-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/228-42-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/228-11-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/228-1279-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/228-1540-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/228-2595-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2448-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2448-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB