Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 01:17

General

  • Target

    563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe

  • Size

    56KB

  • MD5

    31d7fcd3d8dc83f7db128907718fa638

  • SHA1

    e598453491a2f82d0daa0635187c5e2b2d87bc79

  • SHA256

    563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101

  • SHA512

    6a4f42a67bdf0984cd98843f6d710f730b80b8114140d5d12dd400a7c2e192437a2f8b0db397f27dec0d6b1fe5f545997088f4cbcfe8b9837720c980a484f1a4

  • SSDEEP

    1536:wsfgLdQAQfcfymNU/mMEjpOUuPvOk+hIjBPxw:wsftffjmNAmMEj8nOIRxw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3236
      • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe
        "C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3728
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9F9B.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe
            "C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe"
            4⤵
            • Executes dropped EXE
            PID:4676
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4344
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1032
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3764

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              484KB

              MD5

              26ad1955e49c77461922b8167b40178b

              SHA1

              edad5fd8dc1b6d7c5075e293764fea4297a2e3e6

              SHA256

              8e2ecb63e3e5c25092fa0bd05abae885774fdbb58b5ec0b9ace93fd11b81f79d

              SHA512

              48dd7a625fa33b8da6f41980c0d09395a4e4d3a89e64b9c3657ce46abb1417344d5132ac4963ed1cb0ddc31483d283e00f021029a4d4400287ce3f25e1656c5e

            • C:\Users\Admin\AppData\Local\Temp\$$a9F9B.bat

              Filesize

              722B

              MD5

              456d95dbd06d54d1c8a3132f0e619199

              SHA1

              cca3f844625ad39bb460a9b88d13ecaa7a34c652

              SHA256

              193d8ff922b76ebb027b8db2459406646853f8be92b7b6bbfb0640c541e8eae8

              SHA512

              1f9a233863bea9b8af4c9b8cab83fdb7bf2be40fa2aa64d345b01ecbc18d284d277efe8c0bf3ee865b79503ee467dfc12bf4004c55c5d74dfa6c1e774451d94c

            • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe

              Filesize

              30KB

              MD5

              0bc6aea4a6e5f575bc2da604905a8114

              SHA1

              8c162fc24a2b2f14489ced504b2d73190f46672a

              SHA256

              9eaa64e0cfd2c7362c3e4d60e681c3326688523f50cb3ef7c8e874a62dcf6328

              SHA512

              ce596aa90205d7230c51765bece29823fd9fede174312c788fe1a8c69b8f1876199785c1df59f140033204d9ee78e39180853a5f8c00105acd1c56155b56b928

            • C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe.exe

              Filesize

              30KB

              MD5

              0bc6aea4a6e5f575bc2da604905a8114

              SHA1

              8c162fc24a2b2f14489ced504b2d73190f46672a

              SHA256

              9eaa64e0cfd2c7362c3e4d60e681c3326688523f50cb3ef7c8e874a62dcf6328

              SHA512

              ce596aa90205d7230c51765bece29823fd9fede174312c788fe1a8c69b8f1876199785c1df59f140033204d9ee78e39180853a5f8c00105acd1c56155b56b928

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              4f6b7b7dd1e90f9968e5197d34085d7c

              SHA1

              e49e73e61aede77f897b3be38716b22a9ed86e37

              SHA256

              c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

              SHA512

              4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              4f6b7b7dd1e90f9968e5197d34085d7c

              SHA1

              e49e73e61aede77f897b3be38716b22a9ed86e37

              SHA256

              c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

              SHA512

              4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              4f6b7b7dd1e90f9968e5197d34085d7c

              SHA1

              e49e73e61aede77f897b3be38716b22a9ed86e37

              SHA256

              c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

              SHA512

              4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

            • F:\$RECYCLE.BIN\S-1-5-21-2344688013-2965468717-2034126-1000\_desktop.ini

              Filesize

              10B

              MD5

              b00c1a89b15effd3d1fb2de4fdc7bee5

              SHA1

              0c3a4f06bcd397d1d3a63ab2ca05e64cc7ae554d

              SHA256

              0767fccea7e57d6427b0a9b440f28687f4b835409c5dcdeb337a479009222cd9

              SHA512

              b50a3c1df331ecd7dbbd88c202c7b7b8fe6ece8df96249d88f40138952fb3c523f6f133a2d12daa2fd892643b53e4c19b39bcb16ef810f789c996e00bad03bc0

            • memory/3728-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3728-9-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4344-27-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4344-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4344-33-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4344-38-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4344-42-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4344-8-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4344-317-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4344-1279-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4344-1281-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB