Analysis

  • max time kernel
    163s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2023 11:05

General

  • Target

    f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe

  • Size

    281KB

  • MD5

    ba6ebbc5806c4d9a37e37a58f73bca71

  • SHA1

    b9d0a987f5590dde50fa701f08f5eeddd3c140ea

  • SHA256

    f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595

  • SHA512

    8418b73aba15a5cefe1b4ca21ab46cf3c7205c5918454847e1ab9bee1b37b5ce8ad71c6b6f073f27c940f0dc77d665bab3c27742ea83c4c528c7111fdba3ff1c

  • SSDEEP

    6144:hVfjmNZ4R9FEh4bBza+C+dDa62TdIGI1:X7+Z4RnbBzap+dDRwdg1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe
        "C:\Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aAD5F.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2052
          • C:\Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe
            "C:\Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe"
            4⤵
            • Executes dropped EXE
            PID:2732
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2700
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2724

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        a5f841108cb82612ac7a5201c62b4a45

        SHA1

        2ae3a4fdd575978234f7b8f61b7fae72a4dd47ce

        SHA256

        664355bb29bebcba02552eafee35fb26f9c8cadb6f71c42b8e16ed719b8e7ea8

        SHA512

        dbe142d37e109eb972d6f59647a877760b29b2b26d5f992525a9617ef51d0010ec97ca508db7a306b604919211320922c317a3cd52faeacbc3e1a61269af251f

      • C:\Users\Admin\AppData\Local\Temp\$$aAD5F.bat

        Filesize

        722B

        MD5

        a4d7da6c9c6da99a3c3c0657455d602f

        SHA1

        b34e387da3a999122362bc5141d21cad715e402d

        SHA256

        03c5c364452b3eb44d643a1df1541478fd981521fa93b08df3e7aee71419382d

        SHA512

        ac55ecb47581581d28958df43a92a95583861ecb8ebd73069611142747eef0a0bec0b0e6a86e087722861d094c90ac55bd5ba9960fb5ea1284b5936cb352742f

      • C:\Users\Admin\AppData\Local\Temp\$$aAD5F.bat

        Filesize

        722B

        MD5

        a4d7da6c9c6da99a3c3c0657455d602f

        SHA1

        b34e387da3a999122362bc5141d21cad715e402d

        SHA256

        03c5c364452b3eb44d643a1df1541478fd981521fa93b08df3e7aee71419382d

        SHA512

        ac55ecb47581581d28958df43a92a95583861ecb8ebd73069611142747eef0a0bec0b0e6a86e087722861d094c90ac55bd5ba9960fb5ea1284b5936cb352742f

      • C:\Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe

        Filesize

        255KB

        MD5

        f5f28237064364217dce18618786f0b5

        SHA1

        1862cb54429347651cd52d555a56e240d11ab14c

        SHA256

        ff01a872a745adb9228d93cc32f54680b9bf3fe9f4382edf1d5ccbfe3d75390d

        SHA512

        d7e17bf52441a0e65461c35d06a84d3fd1f4c80a9a21164529e5742df4f7a1e02e086b3e4c0e3467c15bddb2385c609f70f39d67296f9848b401bcf6f50f742f

      • C:\Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe.exe

        Filesize

        255KB

        MD5

        f5f28237064364217dce18618786f0b5

        SHA1

        1862cb54429347651cd52d555a56e240d11ab14c

        SHA256

        ff01a872a745adb9228d93cc32f54680b9bf3fe9f4382edf1d5ccbfe3d75390d

        SHA512

        d7e17bf52441a0e65461c35d06a84d3fd1f4c80a9a21164529e5742df4f7a1e02e086b3e4c0e3467c15bddb2385c609f70f39d67296f9848b401bcf6f50f742f

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b029778f3ac823d7c0b7150399fb9da1

        SHA1

        f3f4b3615f75b7ff4992e41e62f7ceac37d06e11

        SHA256

        34ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29

        SHA512

        af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b029778f3ac823d7c0b7150399fb9da1

        SHA1

        f3f4b3615f75b7ff4992e41e62f7ceac37d06e11

        SHA256

        34ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29

        SHA512

        af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b029778f3ac823d7c0b7150399fb9da1

        SHA1

        f3f4b3615f75b7ff4992e41e62f7ceac37d06e11

        SHA256

        34ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29

        SHA512

        af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        b029778f3ac823d7c0b7150399fb9da1

        SHA1

        f3f4b3615f75b7ff4992e41e62f7ceac37d06e11

        SHA256

        34ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29

        SHA512

        af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0

      • F:\$RECYCLE.BIN\S-1-5-21-686452656-3203474025-4140627569-1000\_desktop.ini

        Filesize

        10B

        MD5

        3fa5f43b227b96d6334e4649982d21b7

        SHA1

        aaca225fe44f532099d2d7d7b00d80ebc3dd003b

        SHA256

        d8fdb800da5ad9cc8b64df32df8c6006127fb46c590ee39f84bfd8b4f8912358

        SHA512

        2bf18238a4b94cb61fdd22c61007bc5cbb7fc712b69685cc03efc548622dc365f07159a6599192b1aed0c2ffa9911fbeb321323f7bf24c8706d52adff07e432e

      • \Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe

        Filesize

        255KB

        MD5

        f5f28237064364217dce18618786f0b5

        SHA1

        1862cb54429347651cd52d555a56e240d11ab14c

        SHA256

        ff01a872a745adb9228d93cc32f54680b9bf3fe9f4382edf1d5ccbfe3d75390d

        SHA512

        d7e17bf52441a0e65461c35d06a84d3fd1f4c80a9a21164529e5742df4f7a1e02e086b3e4c0e3467c15bddb2385c609f70f39d67296f9848b401bcf6f50f742f

      • memory/1216-29-0x0000000002AE0000-0x0000000002AE1000-memory.dmp

        Filesize

        4KB

      • memory/2392-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2392-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2392-12-0x0000000000440000-0x0000000000474000-memory.dmp

        Filesize

        208KB

      • memory/2560-40-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2560-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2560-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2560-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2560-91-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2560-97-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2560-1339-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2560-1648-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2560-1851-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2560-31-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB