Analysis

  • max time kernel
    151s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2023, 13:33

General

  • Target

    14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe

  • Size

    203KB

  • MD5

    85ce23a719b1df2b5157077120bff3e5

  • SHA1

    ec9c49ea391d35fe87c8579dfd85763aacc062db

  • SHA256

    14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638

  • SHA512

    694edfaea36896e575799513ea0ffc61ffd7a16b044e738feede1944900a142826d15c67962cbc891092e5cfb26ea913821da7fd9226014763abb99dd730ca11

  • SSDEEP

    6144:DVfjmNh/zUPNXJnz1hfjnKgTAhduXIGpsZxkTE:Z7+h/MXJnz1hfjnKg0uXIGwkTE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3296
      • C:\Users\Admin\AppData\Local\Temp\14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe
        "C:\Users\Admin\AppData\Local\Temp\14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3952
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB892.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3776
          • C:\Users\Admin\AppData\Local\Temp\14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe
            "C:\Users\Admin\AppData\Local\Temp\14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe"
            4⤵
            • Executes dropped EXE
            PID:1608
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4520
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1288
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4392

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        a4be970114fde7b4347a171ef559737b

        SHA1

        9ff5a5c55eca69d00aa5cf88a86831f2954ee214

        SHA256

        54f93dd3fd4b973502236e7372591290aef4913ed31ab38fa17c4b0e52b86e21

        SHA512

        e4fb957ac171ac1bbca431fbfbb8c9142b5493e3b875db7f61182c91adce87d29b410c766d5043b8bee276f9024b7b14ee636106a037db8f35d545b20ec635ce

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        819687f1cf2bf54b4cbd2f2d7d103c22

        SHA1

        5ce3e2c3ef8ad6be6281c1a260e08b9e6916fdb7

        SHA256

        d098c31153c841455a20653fa4bde12eaa778548af01fc5bc8da622440d8fc03

        SHA512

        cbfef2fb90fc9f8cc4146edddac2688506ed04a1eed08e55950ac74c4714f6145964020cad7b572ab8f05f015e8857ca825e4a1a7bda2e7e247376d223986d22

      • C:\Users\Admin\AppData\Local\Temp\$$aB892.bat

        Filesize

        722B

        MD5

        223a309a724a24775fd56383594a6800

        SHA1

        5cd493a33dd4fabbf236afaf6e168fadce3a2d05

        SHA256

        b10d38515307abbaa8c04b5350555f41c1da45d97efc3067e24872249e6f2917

        SHA512

        517fd0eadf06f909bf0db5a822159effb580f660f87d9f05282781e69d85071c5f0d1e7d36a5a83b1315c406d932e1d62063b890132d22c3bb2f1b127d464ee2

      • C:\Users\Admin\AppData\Local\Temp\14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe

        Filesize

        176KB

        MD5

        1f78791f2b1d155c95f40d381ae7cd4d

        SHA1

        fb44f4f698be81aa921e396ef46c6cdf0bae2276

        SHA256

        b4c7dc2ed03d718d00f7f23d691331a14e58ef5d79da5bea67c770aee4205a3a

        SHA512

        1846c4a3d9471ee13db6530d1726ba9789bd11d1447f9413aabdebc8ff33a0fcdbabaf20f32c28916277b523b38d7c78cc645f8304bb3ba894f94847383e479d

      • C:\Users\Admin\AppData\Local\Temp\14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe.exe

        Filesize

        176KB

        MD5

        1f78791f2b1d155c95f40d381ae7cd4d

        SHA1

        fb44f4f698be81aa921e396ef46c6cdf0bae2276

        SHA256

        b4c7dc2ed03d718d00f7f23d691331a14e58ef5d79da5bea67c770aee4205a3a

        SHA512

        1846c4a3d9471ee13db6530d1726ba9789bd11d1447f9413aabdebc8ff33a0fcdbabaf20f32c28916277b523b38d7c78cc645f8304bb3ba894f94847383e479d

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        86f9430d4925c4f45151eea124081d83

        SHA1

        52df34b47184ed2700bbd92b68874c73592b6d1d

        SHA256

        41b9e2bf3ce43d681d6dde91ffff8a23adcc4da2076516de2bf2631708b74350

        SHA512

        910bce524874bbe43de4e9309b1e7aa6a547a6592e3cdcff1f992c156142dc4bf493d23218f635bb6f6366bc1616d96d6ca885d651c0b4be87ab845901f4e3e8

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        86f9430d4925c4f45151eea124081d83

        SHA1

        52df34b47184ed2700bbd92b68874c73592b6d1d

        SHA256

        41b9e2bf3ce43d681d6dde91ffff8a23adcc4da2076516de2bf2631708b74350

        SHA512

        910bce524874bbe43de4e9309b1e7aa6a547a6592e3cdcff1f992c156142dc4bf493d23218f635bb6f6366bc1616d96d6ca885d651c0b4be87ab845901f4e3e8

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        86f9430d4925c4f45151eea124081d83

        SHA1

        52df34b47184ed2700bbd92b68874c73592b6d1d

        SHA256

        41b9e2bf3ce43d681d6dde91ffff8a23adcc4da2076516de2bf2631708b74350

        SHA512

        910bce524874bbe43de4e9309b1e7aa6a547a6592e3cdcff1f992c156142dc4bf493d23218f635bb6f6366bc1616d96d6ca885d651c0b4be87ab845901f4e3e8

      • F:\$RECYCLE.BIN\S-1-5-21-568313063-1441237985-1542345083-1000\_desktop.ini

        Filesize

        10B

        MD5

        d3c36a72fc1c8bd61b57107d5d012a29

        SHA1

        2a13da90a3c63c88dd43ae9c670876f0dd0fc03e

        SHA256

        a2f94b462f3497d26399b1f5eda449b87e3ded10e09de07369f6a984eff5383d

        SHA512

        4c08a9bdba23ece3ba391c1cd3696b046892c028f94e04e955fbee3a13dc181f1073c8f6e686529dd613bd468297d6b21a7de318ae61b88a2d642f3215c20232

      • memory/3952-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3952-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4520-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4520-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4520-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4520-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4520-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4520-42-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4520-1084-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4520-1088-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4520-2384-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4520-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB