Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 00:08

General

  • Target

    5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe

  • Size

    131KB

  • MD5

    797a54b56d8d9259eb282b2447f6f9c5

  • SHA1

    185f7f1cae1b12a106783b7755be3e26c8ed25ff

  • SHA256

    5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3

  • SHA512

    6d6a6a82a0791c4b1208f380f589de38983d8e7632ab761a44a6fdb9ef93287d0ea24abb95fc85d343a057d8271b22ac55d3c9ccd933fcb3ae0f357751052ac0

  • SSDEEP

    1536:LfgLdQAQfwt7FZJ92Bs+GJUEA4aze/uYYdI4UkHiairSazBZDx5XBNEfvDHDtzLD:LftffepVPJUBzqubdIiqVB32THDtzL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe
        "C:\Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a57D0.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2200
          • C:\Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe
            "C:\Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe"
            4⤵
            • Executes dropped EXE
            PID:2664
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3036
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2748
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2768

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        98b49ee17c42dcde2553273bf9f0a878

        SHA1

        dca15a51e33f07f3f1e65bec5e5cd4f2da94f8f7

        SHA256

        02593a0102581257e3cc8deaa3fc6ed89435708e272476aa59fd530ccf1634b9

        SHA512

        cd890dd5440a79c56ef31acd9818e97f0e2423defd353b056eb57ae2c8efeb0a97aeb1ace053a980452af30d3df1c4cb9eae25022e8aeafff15a9df74bc02297

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        1a0dbecba0dbb963c2f3b0448796d47a

        SHA1

        5c0b5d378d3614fe984ce2915b5720886992da0c

        SHA256

        1ea2fb84177a921bc3df4763c3da53a970e192f93f6175d09696ded019e50cf8

        SHA512

        8e25dc08fa6f280a6bc1ccacb1ce665ab055b5d539f8915915fc7536c90185a221cb0c50a02d34b521b871b8487a155b9c40a5f25df87306e1df24ca7e96da25

      • C:\Users\Admin\AppData\Local\Temp\$$a57D0.bat

        Filesize

        722B

        MD5

        61228341de4a6029230fb258ab6658b6

        SHA1

        931219e3c1f5045e320c04d0e41c9b4ea522eb3e

        SHA256

        03192e9947de5e74a6b5d758840a2ab94f17194a63050e73a3d0400101777f84

        SHA512

        e10e4b6607013fc62ef7d4b429f021133b1227af7eea7dc31a12117fac2610001eddcf8320480718bd884cf459a9b66b6ee6d60797e1c1732bf8c5c52cb776f9

      • C:\Users\Admin\AppData\Local\Temp\$$a57D0.bat

        Filesize

        722B

        MD5

        61228341de4a6029230fb258ab6658b6

        SHA1

        931219e3c1f5045e320c04d0e41c9b4ea522eb3e

        SHA256

        03192e9947de5e74a6b5d758840a2ab94f17194a63050e73a3d0400101777f84

        SHA512

        e10e4b6607013fc62ef7d4b429f021133b1227af7eea7dc31a12117fac2610001eddcf8320480718bd884cf459a9b66b6ee6d60797e1c1732bf8c5c52cb776f9

      • C:\Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe

        Filesize

        105KB

        MD5

        44b5c4f2fe8096f7e765e4a01abaf0b6

        SHA1

        b5a4be1a39fb907fa19721d941e1d282a3287455

        SHA256

        5460e930ba771c605f4aab4a801877952039b3258ebdca8c0ae0a1a4e262c82b

        SHA512

        39c58b5665158d42b91a6ea15e3939795cca0b415aff46e7db21ed5c98cb8025ba4835d59745d813e7fc63ae2658ab636960fb877eef233a688b14de89a6c1e2

      • C:\Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe.exe

        Filesize

        105KB

        MD5

        44b5c4f2fe8096f7e765e4a01abaf0b6

        SHA1

        b5a4be1a39fb907fa19721d941e1d282a3287455

        SHA256

        5460e930ba771c605f4aab4a801877952039b3258ebdca8c0ae0a1a4e262c82b

        SHA512

        39c58b5665158d42b91a6ea15e3939795cca0b415aff46e7db21ed5c98cb8025ba4835d59745d813e7fc63ae2658ab636960fb877eef233a688b14de89a6c1e2

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        4f89b2193307d4542523bda8155e02f3

        SHA1

        45ca5157b6ca2b043d65e4d34754a9be7aa83ef5

        SHA256

        fdd0a26d61eb13743d2f7bf5c8b16760ab3ceb9748bdaa57d33ce682961d1f8b

        SHA512

        9110a3f2f29cd14872d0ee96a772fb48d4ca26e09298b5a5337dac163f472f3500c1c46936366a08225dc956209807823ecd0ecee041cc10ae135b3abac8586d

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        4f89b2193307d4542523bda8155e02f3

        SHA1

        45ca5157b6ca2b043d65e4d34754a9be7aa83ef5

        SHA256

        fdd0a26d61eb13743d2f7bf5c8b16760ab3ceb9748bdaa57d33ce682961d1f8b

        SHA512

        9110a3f2f29cd14872d0ee96a772fb48d4ca26e09298b5a5337dac163f472f3500c1c46936366a08225dc956209807823ecd0ecee041cc10ae135b3abac8586d

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        4f89b2193307d4542523bda8155e02f3

        SHA1

        45ca5157b6ca2b043d65e4d34754a9be7aa83ef5

        SHA256

        fdd0a26d61eb13743d2f7bf5c8b16760ab3ceb9748bdaa57d33ce682961d1f8b

        SHA512

        9110a3f2f29cd14872d0ee96a772fb48d4ca26e09298b5a5337dac163f472f3500c1c46936366a08225dc956209807823ecd0ecee041cc10ae135b3abac8586d

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        4f89b2193307d4542523bda8155e02f3

        SHA1

        45ca5157b6ca2b043d65e4d34754a9be7aa83ef5

        SHA256

        fdd0a26d61eb13743d2f7bf5c8b16760ab3ceb9748bdaa57d33ce682961d1f8b

        SHA512

        9110a3f2f29cd14872d0ee96a772fb48d4ca26e09298b5a5337dac163f472f3500c1c46936366a08225dc956209807823ecd0ecee041cc10ae135b3abac8586d

      • F:\$RECYCLE.BIN\S-1-5-21-686452656-3203474025-4140627569-1000\_desktop.ini

        Filesize

        10B

        MD5

        3fa5f43b227b96d6334e4649982d21b7

        SHA1

        aaca225fe44f532099d2d7d7b00d80ebc3dd003b

        SHA256

        d8fdb800da5ad9cc8b64df32df8c6006127fb46c590ee39f84bfd8b4f8912358

        SHA512

        2bf18238a4b94cb61fdd22c61007bc5cbb7fc712b69685cc03efc548622dc365f07159a6599192b1aed0c2ffa9911fbeb321323f7bf24c8706d52adff07e432e

      • \Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe

        Filesize

        105KB

        MD5

        44b5c4f2fe8096f7e765e4a01abaf0b6

        SHA1

        b5a4be1a39fb907fa19721d941e1d282a3287455

        SHA256

        5460e930ba771c605f4aab4a801877952039b3258ebdca8c0ae0a1a4e262c82b

        SHA512

        39c58b5665158d42b91a6ea15e3939795cca0b415aff46e7db21ed5c98cb8025ba4835d59745d813e7fc63ae2658ab636960fb877eef233a688b14de89a6c1e2

      • memory/1192-28-0x0000000002B70000-0x0000000002B71000-memory.dmp

        Filesize

        4KB

      • memory/2332-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2332-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-42-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-47-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-92-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-99-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-1851-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-40-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-3311-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB