Analysis

  • max time kernel
    149s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2023 09:11

General

  • Target

    6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe

  • Size

    86KB

  • MD5

    71d0fbddb88e9f834205a05bf4f70265

  • SHA1

    8abd11cc2735a90c6c411d9b411cf6c9bb8c3b76

  • SHA256

    6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026

  • SHA512

    f76bd916734684c17461aa4bfb61d485e7002de0b210ad5663c1b6dbd2876ffaa2bbcec0ab543dd9e59716e5d15c61af60de9cca08705975bd7e14b939662081

  • SSDEEP

    1536:DfgLdQAQfcfymNANrCllSKgUWbCD4psuLP8xTYjPkepWJZCm:DftffjmNJvgqUpsuLP8xTYjPkepWJMm

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1268
      • C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
        "C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2056
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2720
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a75AD.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2304
          • C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
            "C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe"
            4⤵
            • Executes dropped EXE
            PID:2852
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
        2⤵
          PID:2788

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        a03df97f734993bcc08b38862bf169f0

        SHA1

        e945faf4bf80062bb45dabe17d07ffd20a750709

        SHA256

        7943c4ce6eb9285b4f08653e63fe8302e39637ac7618ef5dd8ea61d95768c681

        SHA512

        29666fe4ba713b83efe66ebc57bf95bf4af0e14ea50ad44cb35642fbb8b903ad7dca2f04c5c56accf278bb8b49bd743a6f31b1565a8e215c8b013ef0d3c20d42

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a75AD.bat

        Filesize

        722B

        MD5

        12ae921ca128b17f73797aa958d59149

        SHA1

        0d265c8aeee325cc854dd65544ca36341df8dc5e

        SHA256

        fb3f68e88c905b6698cdf76398c7d86164df8afd00c8e426cce93b5c6c769873

        SHA512

        787adcccdbe6c79649a31fbf6d4cb1dec1376685a5d87e847d28bcc8d65e149596a0b297e851185a66b930c39def80362b1cf446696a10a99627647de5c23f51

      • C:\Users\Admin\AppData\Local\Temp\$$a75AD.bat

        Filesize

        722B

        MD5

        12ae921ca128b17f73797aa958d59149

        SHA1

        0d265c8aeee325cc854dd65544ca36341df8dc5e

        SHA256

        fb3f68e88c905b6698cdf76398c7d86164df8afd00c8e426cce93b5c6c769873

        SHA512

        787adcccdbe6c79649a31fbf6d4cb1dec1376685a5d87e847d28bcc8d65e149596a0b297e851185a66b930c39def80362b1cf446696a10a99627647de5c23f51

      • C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe

        Filesize

        60KB

        MD5

        89f0b7aa76594a5d30d04c24af5c5968

        SHA1

        5848d196944085ee1a8f24e6e3c699b19c4de474

        SHA256

        12c6fe8f5c28563f33485eaa750b27763ec2cfcc5ef55ddb56d755782fd676f4

        SHA512

        e05fcad7a8f8c7740d30b41e075cefea9ceca5dd63127311b629636ae8505e680dbfd1a3e93d56d7526bbe73808b257c2522ea16c6111119fc59dc7523dd3a6e

      • C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe.exe

        Filesize

        60KB

        MD5

        89f0b7aa76594a5d30d04c24af5c5968

        SHA1

        5848d196944085ee1a8f24e6e3c699b19c4de474

        SHA256

        12c6fe8f5c28563f33485eaa750b27763ec2cfcc5ef55ddb56d755782fd676f4

        SHA512

        e05fcad7a8f8c7740d30b41e075cefea9ceca5dd63127311b629636ae8505e680dbfd1a3e93d56d7526bbe73808b257c2522ea16c6111119fc59dc7523dd3a6e

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        9f8d43de4a935d654d72d0fe7fb50aaa

        SHA1

        e9ff31454ac3bfc9a310529f62aee1468d56bcc5

        SHA256

        d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288

        SHA512

        7506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        9f8d43de4a935d654d72d0fe7fb50aaa

        SHA1

        e9ff31454ac3bfc9a310529f62aee1468d56bcc5

        SHA256

        d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288

        SHA512

        7506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        9f8d43de4a935d654d72d0fe7fb50aaa

        SHA1

        e9ff31454ac3bfc9a310529f62aee1468d56bcc5

        SHA256

        d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288

        SHA512

        7506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        9f8d43de4a935d654d72d0fe7fb50aaa

        SHA1

        e9ff31454ac3bfc9a310529f62aee1468d56bcc5

        SHA256

        d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288

        SHA512

        7506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f

      • F:\$RECYCLE.BIN\S-1-5-21-3986878123-1347213090-2173403696-1000\_desktop.ini

        Filesize

        10B

        MD5

        d3c36a72fc1c8bd61b57107d5d012a29

        SHA1

        2a13da90a3c63c88dd43ae9c670876f0dd0fc03e

        SHA256

        a2f94b462f3497d26399b1f5eda449b87e3ded10e09de07369f6a984eff5383d

        SHA512

        4c08a9bdba23ece3ba391c1cd3696b046892c028f94e04e955fbee3a13dc181f1073c8f6e686529dd613bd468297d6b21a7de318ae61b88a2d642f3215c20232

      • \Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe

        Filesize

        60KB

        MD5

        89f0b7aa76594a5d30d04c24af5c5968

        SHA1

        5848d196944085ee1a8f24e6e3c699b19c4de474

        SHA256

        12c6fe8f5c28563f33485eaa750b27763ec2cfcc5ef55ddb56d755782fd676f4

        SHA512

        e05fcad7a8f8c7740d30b41e075cefea9ceca5dd63127311b629636ae8505e680dbfd1a3e93d56d7526bbe73808b257c2522ea16c6111119fc59dc7523dd3a6e

      • \Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe

        Filesize

        60KB

        MD5

        89f0b7aa76594a5d30d04c24af5c5968

        SHA1

        5848d196944085ee1a8f24e6e3c699b19c4de474

        SHA256

        12c6fe8f5c28563f33485eaa750b27763ec2cfcc5ef55ddb56d755782fd676f4

        SHA512

        e05fcad7a8f8c7740d30b41e075cefea9ceca5dd63127311b629636ae8505e680dbfd1a3e93d56d7526bbe73808b257c2522ea16c6111119fc59dc7523dd3a6e

      • memory/1268-30-0x0000000002CA0000-0x0000000002CA1000-memory.dmp

        Filesize

        4KB

      • memory/2056-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2056-34-0x0000000000280000-0x00000000002B4000-memory.dmp

        Filesize

        208KB

      • memory/2056-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2056-16-0x0000000000280000-0x00000000002B4000-memory.dmp

        Filesize

        208KB

      • memory/2720-48-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-42-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-94-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-101-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-168-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-1853-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-3313-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-35-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB