Analysis

  • max time kernel
    151s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 01:57

General

  • Target

    646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe

  • Size

    2.7MB

  • MD5

    e2fe292a8e565e5cd70e0464cf4d448f

  • SHA1

    f1bce048971b051983fd2b19d12de642b72be3a0

  • SHA256

    646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714

  • SHA512

    413df4d0679467f47c2f366a792d09103476a92e2290141488d104055b01201754405ea9e30c21ba464a9700d965d08c817cf9532c4c645ad3fef528a4110d6b

  • SSDEEP

    49152:Ax0zsq3OZnoNGg8pmEdJBSfFc+cZh80ydKsagsd2bQmBBxzaCzwmM:rsqUcdQmBBNLz6

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
        "C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2112
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a5B1B.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2136
          • C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
            "C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2624
            • C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
              C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --no-rate-limit --no-upload-gzip "--database=C:\Users\Admin\AppData\Local\123Browser\User Data\Crashpad" --url=https://123llq.com/dump/upload/ --annotation=plat=Win64 --annotation=prod=123Browser --annotation=ver=2.1.28.3 --initial-client-data=0x12c,0x130,0x134,0x100,0x138,0x14000bbc0,0x14000bbd0,0x14000bbe0
              5⤵
              • Executes dropped EXE
              PID:2824
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2808
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2640
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2732

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\123Browser\User Data\Crashpad\settings.dat

        Filesize

        40B

        MD5

        46d257189456a843b95ce8e0495e4f46

        SHA1

        c195cf3eba6cc318095d32737d755dc75cc7c3de

        SHA256

        1f0e44c1d9bfd09a2f912cf5a5b14c4d0b2f937fd6b50c6b537bbd80e6e33a7d

        SHA512

        6e87388192bd314ab3acfd181a95fc1475ed4361bab98f143a6f157415cabfa579bd98c1fdff9a1c0d72c217461c7640b2ec1f09a920c6fd33e20db4c30a2b4a

      • C:\Users\Admin\AppData\Local\Temp\$$a5B1B.bat

        Filesize

        722B

        MD5

        d0f2ee98d6f64db15ff5d49d2ec6b00b

        SHA1

        84b1aaaf7cdfab67403e70e09f48a6baa5392a2f

        SHA256

        d6523ff93e904b8abf287fa0fb002ab2d60f2bf31543704d35ddecb140178b2e

        SHA512

        9530ef802550f051110bd353a04652936b1f9a56fda3050a24581bc9d9cd1b050fe46ec34210fefa774aad59ca982323f2e9c6a1a32b9999d2385e7cec555bbd

      • C:\Users\Admin\AppData\Local\Temp\$$a5B1B.bat

        Filesize

        722B

        MD5

        d0f2ee98d6f64db15ff5d49d2ec6b00b

        SHA1

        84b1aaaf7cdfab67403e70e09f48a6baa5392a2f

        SHA256

        d6523ff93e904b8abf287fa0fb002ab2d60f2bf31543704d35ddecb140178b2e

        SHA512

        9530ef802550f051110bd353a04652936b1f9a56fda3050a24581bc9d9cd1b050fe46ec34210fefa774aad59ca982323f2e9c6a1a32b9999d2385e7cec555bbd

      • C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe

        Filesize

        2.7MB

        MD5

        60ab0daed9d1aabc9dddbe1ff9ce19ca

        SHA1

        73eaf43a6a935feed8bf6a89471ff116c41e9688

        SHA256

        a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a

        SHA512

        0dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283

      • C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe

        Filesize

        2.7MB

        MD5

        60ab0daed9d1aabc9dddbe1ff9ce19ca

        SHA1

        73eaf43a6a935feed8bf6a89471ff116c41e9688

        SHA256

        a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a

        SHA512

        0dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283

      • C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe.exe

        Filesize

        2.7MB

        MD5

        60ab0daed9d1aabc9dddbe1ff9ce19ca

        SHA1

        73eaf43a6a935feed8bf6a89471ff116c41e9688

        SHA256

        a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a

        SHA512

        0dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        ef3256717d6b0edc9776e10d8a519313

        SHA1

        c7629324ead6c72e3aaec3c4715ecafb752e305c

        SHA256

        71fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5

        SHA512

        eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        ef3256717d6b0edc9776e10d8a519313

        SHA1

        c7629324ead6c72e3aaec3c4715ecafb752e305c

        SHA256

        71fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5

        SHA512

        eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        ef3256717d6b0edc9776e10d8a519313

        SHA1

        c7629324ead6c72e3aaec3c4715ecafb752e305c

        SHA256

        71fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5

        SHA512

        eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        ef3256717d6b0edc9776e10d8a519313

        SHA1

        c7629324ead6c72e3aaec3c4715ecafb752e305c

        SHA256

        71fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5

        SHA512

        eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77

      • F:\$RECYCLE.BIN\S-1-5-21-686452656-3203474025-4140627569-1000\_desktop.ini

        Filesize

        10B

        MD5

        3fa5f43b227b96d6334e4649982d21b7

        SHA1

        aaca225fe44f532099d2d7d7b00d80ebc3dd003b

        SHA256

        d8fdb800da5ad9cc8b64df32df8c6006127fb46c590ee39f84bfd8b4f8912358

        SHA512

        2bf18238a4b94cb61fdd22c61007bc5cbb7fc712b69685cc03efc548622dc365f07159a6599192b1aed0c2ffa9911fbeb321323f7bf24c8706d52adff07e432e

      • \Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe

        Filesize

        2.7MB

        MD5

        60ab0daed9d1aabc9dddbe1ff9ce19ca

        SHA1

        73eaf43a6a935feed8bf6a89471ff116c41e9688

        SHA256

        a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a

        SHA512

        0dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283

      • \Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe

        Filesize

        2.7MB

        MD5

        60ab0daed9d1aabc9dddbe1ff9ce19ca

        SHA1

        73eaf43a6a935feed8bf6a89471ff116c41e9688

        SHA256

        a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a

        SHA512

        0dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283

      • memory/1208-36-0x00000000022A0000-0x00000000022A1000-memory.dmp

        Filesize

        4KB

      • memory/2112-17-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2112-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2112-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2112-38-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2808-49-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2808-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2808-47-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2808-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2808-54-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2808-100-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2808-106-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2808-369-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2808-1859-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2808-1861-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB