Analysis

  • max time kernel
    162s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2023 09:11

General

  • Target

    6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe

  • Size

    86KB

  • MD5

    71d0fbddb88e9f834205a05bf4f70265

  • SHA1

    8abd11cc2735a90c6c411d9b411cf6c9bb8c3b76

  • SHA256

    6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026

  • SHA512

    f76bd916734684c17461aa4bfb61d485e7002de0b210ad5663c1b6dbd2876ffaa2bbcec0ab543dd9e59716e5d15c61af60de9cca08705975bd7e14b939662081

  • SSDEEP

    1536:DfgLdQAQfcfymNANrCllSKgUWbCD4psuLP8xTYjPkepWJZCm:DftffjmNJvgqUpsuLP8xTYjPkepWJMm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3240
      • C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
        "C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aD30F.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4408
          • C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
            "C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe"
            4⤵
            • Executes dropped EXE
            PID:1776
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1804
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3120
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4480

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        a03df97f734993bcc08b38862bf169f0

        SHA1

        e945faf4bf80062bb45dabe17d07ffd20a750709

        SHA256

        7943c4ce6eb9285b4f08653e63fe8302e39637ac7618ef5dd8ea61d95768c681

        SHA512

        29666fe4ba713b83efe66ebc57bf95bf4af0e14ea50ad44cb35642fbb8b903ad7dca2f04c5c56accf278bb8b49bd743a6f31b1565a8e215c8b013ef0d3c20d42

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        999c73abd53f9ce3289c15116bccf46a

        SHA1

        85a1779dfb956bc41ce39208d18bda9c4d960069

        SHA256

        13a46acb6c8e8b3bf85f9f91c17891eca9aca34aff44da178c178c2e9a42534a

        SHA512

        bb5eb382072935e71f90f1fe2ebf55820b16104ef584d4f564a82528680b27bc72fc5f425c88a9359a2d6b48739269be4f981a09fe7d3420ad88129f05683899

      • C:\Users\Admin\AppData\Local\Temp\$$aD30F.bat

        Filesize

        722B

        MD5

        8394ef34c06c666646eba82680e26f4c

        SHA1

        7adeac650280157d90d5c29b2ffb1325f023010c

        SHA256

        2641fd57f5f0e01653e02089a823ddb3cbfa128273c0cb1e46740ca812d9f93f

        SHA512

        73e736b019e53b0fecaca4dd5509649f26726b8d1a57b57cb395730e2a6fe4f4670dbe79448b57bc3b575e6490b9e8055fd24528a99d4eba36c75a5c4c15cc13

      • C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe

        Filesize

        60KB

        MD5

        89f0b7aa76594a5d30d04c24af5c5968

        SHA1

        5848d196944085ee1a8f24e6e3c699b19c4de474

        SHA256

        12c6fe8f5c28563f33485eaa750b27763ec2cfcc5ef55ddb56d755782fd676f4

        SHA512

        e05fcad7a8f8c7740d30b41e075cefea9ceca5dd63127311b629636ae8505e680dbfd1a3e93d56d7526bbe73808b257c2522ea16c6111119fc59dc7523dd3a6e

      • C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe.exe

        Filesize

        60KB

        MD5

        89f0b7aa76594a5d30d04c24af5c5968

        SHA1

        5848d196944085ee1a8f24e6e3c699b19c4de474

        SHA256

        12c6fe8f5c28563f33485eaa750b27763ec2cfcc5ef55ddb56d755782fd676f4

        SHA512

        e05fcad7a8f8c7740d30b41e075cefea9ceca5dd63127311b629636ae8505e680dbfd1a3e93d56d7526bbe73808b257c2522ea16c6111119fc59dc7523dd3a6e

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        9f8d43de4a935d654d72d0fe7fb50aaa

        SHA1

        e9ff31454ac3bfc9a310529f62aee1468d56bcc5

        SHA256

        d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288

        SHA512

        7506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        9f8d43de4a935d654d72d0fe7fb50aaa

        SHA1

        e9ff31454ac3bfc9a310529f62aee1468d56bcc5

        SHA256

        d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288

        SHA512

        7506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        9f8d43de4a935d654d72d0fe7fb50aaa

        SHA1

        e9ff31454ac3bfc9a310529f62aee1468d56bcc5

        SHA256

        d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288

        SHA512

        7506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f

      • F:\$RECYCLE.BIN\S-1-5-21-1511405631-3522522280-778892991-1000\_desktop.ini

        Filesize

        10B

        MD5

        d3c36a72fc1c8bd61b57107d5d012a29

        SHA1

        2a13da90a3c63c88dd43ae9c670876f0dd0fc03e

        SHA256

        a2f94b462f3497d26399b1f5eda449b87e3ded10e09de07369f6a984eff5383d

        SHA512

        4c08a9bdba23ece3ba391c1cd3696b046892c028f94e04e955fbee3a13dc181f1073c8f6e686529dd613bd468297d6b21a7de318ae61b88a2d642f3215c20232

      • memory/1484-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1484-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1804-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1804-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1804-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1804-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1804-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1804-249-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1804-1084-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1804-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1804-4637-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB