Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 01:17

General

  • Target

    563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe

  • Size

    56KB

  • MD5

    31d7fcd3d8dc83f7db128907718fa638

  • SHA1

    e598453491a2f82d0daa0635187c5e2b2d87bc79

  • SHA256

    563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101

  • SHA512

    6a4f42a67bdf0984cd98843f6d710f730b80b8114140d5d12dd400a7c2e192437a2f8b0db397f27dec0d6b1fe5f545997088f4cbcfe8b9837720c980a484f1a4

  • SSDEEP

    1536:wsfgLdQAQfcfymNU/mMEjpOUuPvOk+hIjBPxw:wsftffjmNAmMEj8nOIRxw

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1400
      • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe
        "C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a95E9.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2484
          • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe
            "C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe"
            4⤵
            • Executes dropped EXE
            PID:2760
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3056
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2596
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2332

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              3663c1381766ef643154f7248cee081a

              SHA1

              d3391539358af56ef7ac65a5b87886e45e9bc42c

              SHA256

              0471b2b82fb08307f138b69649e69dd51864d5650e13d0dafe67d37d91288c29

              SHA512

              c3ed0a5d8b9eaa02efd030d4191849f5aa999e1585a47af66e8497ab494141488e97ca39289b412919f33faf78016c4e875522232c8f67bde995d968ecc7f6f7

            • C:\Users\Admin\AppData\Local\Temp\$$a95E9.bat

              Filesize

              722B

              MD5

              36e91885a4749f0ce96ebe212c0e07d8

              SHA1

              d92e6f8517dc891c784c40eba54074a93ce8d7a6

              SHA256

              e4f2f41d3f9bc907201fc5390f10994b843e4fa228be8b5f2e00b27ac29182b3

              SHA512

              07268221f5dd399fe550655d72ff868fac3f2f3feef952054089d7984f2fcb698a75d1e88494f7fb5d4d39ad32b29d651ed24b6bdb4bed1a58a9be786364c407

            • C:\Users\Admin\AppData\Local\Temp\$$a95E9.bat

              Filesize

              722B

              MD5

              36e91885a4749f0ce96ebe212c0e07d8

              SHA1

              d92e6f8517dc891c784c40eba54074a93ce8d7a6

              SHA256

              e4f2f41d3f9bc907201fc5390f10994b843e4fa228be8b5f2e00b27ac29182b3

              SHA512

              07268221f5dd399fe550655d72ff868fac3f2f3feef952054089d7984f2fcb698a75d1e88494f7fb5d4d39ad32b29d651ed24b6bdb4bed1a58a9be786364c407

            • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe

              Filesize

              30KB

              MD5

              0bc6aea4a6e5f575bc2da604905a8114

              SHA1

              8c162fc24a2b2f14489ced504b2d73190f46672a

              SHA256

              9eaa64e0cfd2c7362c3e4d60e681c3326688523f50cb3ef7c8e874a62dcf6328

              SHA512

              ce596aa90205d7230c51765bece29823fd9fede174312c788fe1a8c69b8f1876199785c1df59f140033204d9ee78e39180853a5f8c00105acd1c56155b56b928

            • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe.exe

              Filesize

              30KB

              MD5

              0bc6aea4a6e5f575bc2da604905a8114

              SHA1

              8c162fc24a2b2f14489ced504b2d73190f46672a

              SHA256

              9eaa64e0cfd2c7362c3e4d60e681c3326688523f50cb3ef7c8e874a62dcf6328

              SHA512

              ce596aa90205d7230c51765bece29823fd9fede174312c788fe1a8c69b8f1876199785c1df59f140033204d9ee78e39180853a5f8c00105acd1c56155b56b928

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              4f6b7b7dd1e90f9968e5197d34085d7c

              SHA1

              e49e73e61aede77f897b3be38716b22a9ed86e37

              SHA256

              c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

              SHA512

              4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              4f6b7b7dd1e90f9968e5197d34085d7c

              SHA1

              e49e73e61aede77f897b3be38716b22a9ed86e37

              SHA256

              c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

              SHA512

              4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              4f6b7b7dd1e90f9968e5197d34085d7c

              SHA1

              e49e73e61aede77f897b3be38716b22a9ed86e37

              SHA256

              c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

              SHA512

              4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              4f6b7b7dd1e90f9968e5197d34085d7c

              SHA1

              e49e73e61aede77f897b3be38716b22a9ed86e37

              SHA256

              c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

              SHA512

              4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

            • F:\$RECYCLE.BIN\S-1-5-21-86725733-3001458681-3405935542-1000\_desktop.ini

              Filesize

              10B

              MD5

              b00c1a89b15effd3d1fb2de4fdc7bee5

              SHA1

              0c3a4f06bcd397d1d3a63ab2ca05e64cc7ae554d

              SHA256

              0767fccea7e57d6427b0a9b440f28687f4b835409c5dcdeb337a479009222cd9

              SHA512

              b50a3c1df331ecd7dbbd88c202c7b7b8fe6ece8df96249d88f40138952fb3c523f6f133a2d12daa2fd892643b53e4c19b39bcb16ef810f789c996e00bad03bc0

            • \Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe

              Filesize

              30KB

              MD5

              0bc6aea4a6e5f575bc2da604905a8114

              SHA1

              8c162fc24a2b2f14489ced504b2d73190f46672a

              SHA256

              9eaa64e0cfd2c7362c3e4d60e681c3326688523f50cb3ef7c8e874a62dcf6328

              SHA512

              ce596aa90205d7230c51765bece29823fd9fede174312c788fe1a8c69b8f1876199785c1df59f140033204d9ee78e39180853a5f8c00105acd1c56155b56b928

            • memory/1400-29-0x0000000002210000-0x0000000002211000-memory.dmp

              Filesize

              4KB

            • memory/2984-17-0x0000000000270000-0x00000000002A4000-memory.dmp

              Filesize

              208KB

            • memory/2984-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2984-15-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3056-21-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3056-41-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3056-47-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3056-94-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3056-100-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3056-153-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3056-1852-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3056-33-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3056-3312-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB