Analysis

  • max time kernel
    150s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 15:06

General

  • Target

    44763758a59df66e5caeb781422b099d0f6d95fe2474374e72f97971600c52b0.exe

  • Size

    26KB

  • MD5

    7a482907f08a313b3a8234671e27f94d

  • SHA1

    28624eb10e097f677652fc08cc86222f248bd90a

  • SHA256

    44763758a59df66e5caeb781422b099d0f6d95fe2474374e72f97971600c52b0

  • SHA512

    bcd095e0771b697e45d4a93c0e150a48b6c48d9c43a90c60311157548865c4aef7a2602abe0167c41f0d628d57f53ba9d5116edf3aa4ab6060d38549a91058f0

  • SSDEEP

    768:qBUO1ODKAaDMG8H92RwZNQSw+JnbmQj3FZJ9Vs9XnsD:aUIfgLdQAQfwt7FZJ92Bs

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44763758a59df66e5caeb781422b099d0f6d95fe2474374e72f97971600c52b0.exe
    "C:\Users\Admin\AppData\Local\Temp\44763758a59df66e5caeb781422b099d0f6d95fe2474374e72f97971600c52b0.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
        3⤵
          PID:3700
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:2720

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              debfed7b6c846e69928b94bb92158f3d

              SHA1

              b1c4b120751317ebc85af930a7878a3afe4ee0f0

              SHA256

              c1ee965d8ad445be2436bc0fe6453c894ff31974ea0eb87a0744e4b5fae2ae05

              SHA512

              49d47c5fd6371b250b85b333b7311bd4688d8a00f6a1a5287de5f610e2a9aed24d03507f9ff4bc052b79e4ade40081b10aa431f29863241389922580a156660e

            • C:\Program Files\Google\Chrome\Application\chrome.exe

              Filesize

              2.8MB

              MD5

              e3c412d6e31f4dfb95dcdd5bb7e5e884

              SHA1

              e13b44bff90b17ebbacde7959b1930b037d467dd

              SHA256

              76929eb727258f14547da82bed74f187a12797ec1004f71f81a108694d87afa5

              SHA512

              f6eb1d4a4146fbe4ad406c3bc62b87167fb3be6a1a3eb89666f86701077d4357f975fa8fd16b44036dbae3ea3ed349afdac87681573f80ae2f97c221cf8bd7e6

            • F:\$RECYCLE.BIN\S-1-5-21-2890696111-2332180956-3312704074-1000\_desktop.ini

              Filesize

              10B

              MD5

              a592e6708558f3dc0ad1608608da69c5

              SHA1

              69a1224ba3b2f2ab2f2ce8b8287809f3282d20d0

              SHA256

              24c83924da516d8acac4cdc96680306f1e34a8a54696bf5bf24106eeb562195a

              SHA512

              38724fff525de3d5b413bb962c2f81369068403f761f69d00f25cd03b5d8cb83603cd6d23c87faf458f157acf585ca4db031fe6640704a4158cb5ead56ce79f1

            • memory/4132-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4132-5-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4132-13-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4132-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4132-24-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4132-28-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4132-1264-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4132-2339-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4132-4806-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB