Analysis

  • max time kernel
    145s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2023 07:19

General

  • Target

    5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe

  • Size

    122KB

  • MD5

    37d6524eb4963e9e3599a7b7c987d265

  • SHA1

    56e9e18af67a456d0e37b5ca285062c28ccba3be

  • SHA256

    5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750

  • SHA512

    89ce74ab2abf831a81971bd84ac99b671c0d3714305cd851cf1e44c23bbb1ddd5fcba6a86b19a3ccd4c4280d292eb9a54c6306acc4a6d02ab32204ffdbf64fda

  • SSDEEP

    3072:BftffjmN9oFHzg2I0PpPNX6RLXWertCQyyNU:JVfjmNeZzhPpPNq6QyH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3236
      • C:\Users\Admin\AppData\Local\Temp\5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe
        "C:\Users\Admin\AppData\Local\Temp\5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1136
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8220.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1120
          • C:\Users\Admin\AppData\Local\Temp\5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe
            "C:\Users\Admin\AppData\Local\Temp\5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe"
            4⤵
            • Executes dropped EXE
            PID:2688
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:784
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4880
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:624

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        dd7289d41bdd1d4e797fb59ec03c9ced

        SHA1

        d42c057bcd13b424abe11adfef721a10d2609288

        SHA256

        29bc1fa38ad291825d1e2d43db6bca71124243251b52df5b31922ff0f377684e

        SHA512

        bb2585c9bf1a9e8ab0f393b6e2e24eeea430c4a610ff5912b22b6ac860ba97b05dba5179159343a935bdecccaf1cdc3de03e437f86a0ea988d6e73ce4f832c14

      • C:\Users\Admin\AppData\Local\Temp\$$a8220.bat

        Filesize

        722B

        MD5

        bfa6fe76ccbff182cbda6ac820149580

        SHA1

        d03e0d2aca0e02cc361acde43f982ffa8b189bf6

        SHA256

        c0339fe00e7202972e8f536d53809cece8870caf18fff1bf2a20c7e3fa962c15

        SHA512

        09b325ad8dcb9e7ce9c7d6631f05b0df0bd4b3dea105b13ec15d9f669dd8cd500b8854314bcccce7cd538ae59a903b42a00db934246f79df1e28e271b5d6ca28

      • C:\Users\Admin\AppData\Local\Temp\5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe

        Filesize

        96KB

        MD5

        4f777a9f156035ab4670da6cdcbd651c

        SHA1

        78b6f97056e6d5674bbcb94f13c4bf5527319c02

        SHA256

        77a8efbcc5e81e9534ad80aa2836105491f015d8a7355d0ba960f8fe5df3d0c8

        SHA512

        244dae23bcabfe4f7bcd10af02f24f88840fd91defd989cd39ad8a7ea4cb2829f9101e966a8d8ff95099269461afef587c7f8008437d8c23a91fee08acd33437

      • C:\Users\Admin\AppData\Local\Temp\5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe.exe

        Filesize

        96KB

        MD5

        4f777a9f156035ab4670da6cdcbd651c

        SHA1

        78b6f97056e6d5674bbcb94f13c4bf5527319c02

        SHA256

        77a8efbcc5e81e9534ad80aa2836105491f015d8a7355d0ba960f8fe5df3d0c8

        SHA512

        244dae23bcabfe4f7bcd10af02f24f88840fd91defd989cd39ad8a7ea4cb2829f9101e966a8d8ff95099269461afef587c7f8008437d8c23a91fee08acd33437

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        2001b3d40d05330d0c289354fd39c442

        SHA1

        31c0c109110e336da3bdfee62d6986e50be0affd

        SHA256

        ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815

        SHA512

        92847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        2001b3d40d05330d0c289354fd39c442

        SHA1

        31c0c109110e336da3bdfee62d6986e50be0affd

        SHA256

        ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815

        SHA512

        92847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        2001b3d40d05330d0c289354fd39c442

        SHA1

        31c0c109110e336da3bdfee62d6986e50be0affd

        SHA256

        ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815

        SHA512

        92847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69

      • C:\_desktop.ini

        Filesize

        9B

        MD5

        872506f1dadcc0cedd1e9dee11f54da4

        SHA1

        d1e87145ed1d918f10ae4e93ccdbb994bc906ed5

        SHA256

        a0049e98811438481e150df54f7b555026746c943cb03106677bf75b4e412104

        SHA512

        6cf3aeeed18e66a16ed653a5c33133ec8d5fb58cf42aab9e712cf473233e506d4f14692dff04b7c20847718e5c344ec2651e57d2ae7a034610b07679b786344c

      • memory/784-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/784-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/784-11-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/784-27-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/784-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/784-36-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/784-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/784-42-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/784-1278-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/784-2213-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1136-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1136-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB