Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2023 01:57

General

  • Target

    646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe

  • Size

    2.7MB

  • MD5

    e2fe292a8e565e5cd70e0464cf4d448f

  • SHA1

    f1bce048971b051983fd2b19d12de642b72be3a0

  • SHA256

    646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714

  • SHA512

    413df4d0679467f47c2f366a792d09103476a92e2290141488d104055b01201754405ea9e30c21ba464a9700d965d08c817cf9532c4c645ad3fef528a4110d6b

  • SSDEEP

    49152:Ax0zsq3OZnoNGg8pmEdJBSfFc+cZh80ydKsagsd2bQmBBxzaCzwmM:rsqUcdQmBBNLz6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3176
      • C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
        "C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7407.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
            "C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4700
            • C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
              C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --no-rate-limit --no-upload-gzip "--database=C:\Users\Admin\AppData\Local\123Browser\User Data\Crashpad" --url=https://123llq.com/dump/upload/ --annotation=plat=Win64 --annotation=prod=123Browser --annotation=ver=2.1.28.3 --initial-client-data=0x25c,0x260,0x264,0x238,0x268,0x7ff69f24bbc0,0x7ff69f24bbd0,0x7ff69f24bbe0
              5⤵
              • Executes dropped EXE
              PID:3368
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4284
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4108
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2624

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        3eb5d61205d59f189d836085f29d6cce

        SHA1

        db4833e42aff151aeffd16692b89d7bb8ce9f4c1

        SHA256

        449ce629cada08f8bbaf26748133ccac218a3363696da6ce3b065e1795b0f79b

        SHA512

        d90d6f70583e883466524be82b75d23679859a88f1d7215200483b8e07247848160a03a75f3078df18eb35416fbc3430fb4b219ee6b144027cb3b1a7cc2fdb1e

      • C:\Users\Admin\AppData\Local\123Browser\User Data\Crashpad\settings.dat

        Filesize

        40B

        MD5

        dc5a89282eff3c866c34a11509b061df

        SHA1

        648f6b35615dbf04d806b2749f91f00087931a3f

        SHA256

        44f731a1e315fe18f277cb96e0a7f195714123a8099c460ef02f76ce431f45f0

        SHA512

        77b83bd81a53c6fa9cd47c85822ce8c11a2f581727e4d16c202e1acf7afd21e67690410a31eefe4fe16a20c08b07a402b333fabb316187b99c2005e2507892ec

      • C:\Users\Admin\AppData\Local\Temp\$$a7407.bat

        Filesize

        722B

        MD5

        bd3456329d160bebc50a0966f3151456

        SHA1

        ebacaf609760c9ab1cab7310589a0d11294b65ff

        SHA256

        e9db9d4861f9a4b6e61bf07d057e96f32dac9e58f099c64c7855ea2524e5e0f3

        SHA512

        8902c6c14c9128cc2bf95179914782cf48479322e71d6ecc6f74e871766e9923c348d7924b2f139aaef9175e48b02c696bbafdb2507cc27c50f80910ffe3d688

      • C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe

        Filesize

        2.7MB

        MD5

        60ab0daed9d1aabc9dddbe1ff9ce19ca

        SHA1

        73eaf43a6a935feed8bf6a89471ff116c41e9688

        SHA256

        a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a

        SHA512

        0dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283

      • C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe

        Filesize

        2.7MB

        MD5

        60ab0daed9d1aabc9dddbe1ff9ce19ca

        SHA1

        73eaf43a6a935feed8bf6a89471ff116c41e9688

        SHA256

        a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a

        SHA512

        0dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283

      • C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe.exe

        Filesize

        2.7MB

        MD5

        60ab0daed9d1aabc9dddbe1ff9ce19ca

        SHA1

        73eaf43a6a935feed8bf6a89471ff116c41e9688

        SHA256

        a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a

        SHA512

        0dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        ef3256717d6b0edc9776e10d8a519313

        SHA1

        c7629324ead6c72e3aaec3c4715ecafb752e305c

        SHA256

        71fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5

        SHA512

        eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        ef3256717d6b0edc9776e10d8a519313

        SHA1

        c7629324ead6c72e3aaec3c4715ecafb752e305c

        SHA256

        71fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5

        SHA512

        eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        ef3256717d6b0edc9776e10d8a519313

        SHA1

        c7629324ead6c72e3aaec3c4715ecafb752e305c

        SHA256

        71fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5

        SHA512

        eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77

      • F:\$RECYCLE.BIN\S-1-5-21-919254492-3979293997-764407192-1000\_desktop.ini

        Filesize

        10B

        MD5

        3fa5f43b227b96d6334e4649982d21b7

        SHA1

        aaca225fe44f532099d2d7d7b00d80ebc3dd003b

        SHA256

        d8fdb800da5ad9cc8b64df32df8c6006127fb46c590ee39f84bfd8b4f8912358

        SHA512

        2bf18238a4b94cb61fdd22c61007bc5cbb7fc712b69685cc03efc548622dc365f07159a6599192b1aed0c2ffa9911fbeb321323f7bf24c8706d52adff07e432e

      • memory/1688-10-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1688-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4284-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4284-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4284-36-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4284-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4284-44-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4284-48-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4284-25-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4284-1122-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4284-1285-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4284-1289-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB