Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2023, 08:09

General

  • Target

    057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe

  • Size

    29KB

  • MD5

    0a4ec07af6ee0de7e8639ccfc1e0a98b

  • SHA1

    c3f8a375dc91e1436f5da51fc529535ff616103c

  • SHA256

    057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477

  • SHA512

    dcb37d95aae4c7541058ef68ac0c3931b67a3fe61bbe569a6ff0ab87754760b5720c3df6d2dad6c5e627eaa50e268c066a20bbdb11123d3965c17cc650f45ae0

  • SSDEEP

    384:NbbNMWe1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:pZne16GVRu1yK9fMnJG2V9dHS8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2564
      • C:\Users\Admin\AppData\Local\Temp\057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe
        "C:\Users\Admin\AppData\Local\Temp\057b872ff99ac74d06c69d68bc60cfe8c3842d858e79fa7aaf6e52b62e945477.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1452
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1720
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:4052

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        81b366cea7b26125940709a0f5e7d254

        SHA1

        6e03a61b1a9486e275754a58f5927ee2168d12aa

        SHA256

        790683ff65c5feabb356270eb6df40bf11d1f9d077383695d2beefefc925a0ad

        SHA512

        a48c74c21e439233ab92bf16c6a1207bb76aeaa0d1e89a939e2539f44902fde3d39a1b3589982566b5f2713a250493e10e0a2ccc74ead91f6a86e6106f8b472f

      • C:\Program Files\Google\Chrome\Application\chrome.exe

        Filesize

        2.8MB

        MD5

        fcd5fa32831d2ad12b38c397964f1d76

        SHA1

        a8ded95fd14fc774ccecaa349bafae2fe1104845

        SHA256

        52589a563c6c2ea296d87d7051baab3715669c06b694e80aa136543ade71aacb

        SHA512

        56f8e85f13090bbb6a6cf41f7e7a3cb3370ef7e7cec97e0a2f81edf059527ae06467bf55b4de821fa6c527f25ea01049ecda7a969d671e0d32f84b8e05ecef1f

      • C:\_desktop.ini

        Filesize

        9B

        MD5

        872506f1dadcc0cedd1e9dee11f54da4

        SHA1

        d1e87145ed1d918f10ae4e93ccdbb994bc906ed5

        SHA256

        a0049e98811438481e150df54f7b555026746c943cb03106677bf75b4e412104

        SHA512

        6cf3aeeed18e66a16ed653a5c33133ec8d5fb58cf42aab9e712cf473233e506d4f14692dff04b7c20847718e5c344ec2651e57d2ae7a034610b07679b786344c

      • memory/1452-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1452-5-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1452-13-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1452-19-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1452-24-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1452-28-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1452-1264-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1452-1268-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1452-4018-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB