Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    23-10-2023 07:47

General

  • Target

    201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe

  • Size

    116KB

  • MD5

    a625bffbcc9f310a3998ca5ade8f14f4

  • SHA1

    a76829a264359eccc14f4d30db97102234be49e8

  • SHA256

    201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d

  • SHA512

    1585c30d9b5ae16988c6b1c9ca924bf69b86b2b8b73bc6f235fd7c474db30c5f3628197bae95e22154c8ceaa2a615d950eddd0c580732a2dead218c4572811ec

  • SSDEEP

    3072:BftffjmN3Jo/FQXy+uc//korlDFtNel3kaIFH/B0CyPvO3c0gCajNCg:JVfjmN3Jo/qi+k

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1296
      • C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe
        "C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3060
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a36C9.bat
          3⤵
          • Deletes itself
          PID:2056
          • C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe
            "C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe"
            4⤵
            • Executes dropped EXE
            PID:2760
          • C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe
            "C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe"
            4⤵
            • Executes dropped EXE
            PID:2660
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2728
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2212

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        bd68d43c687d28dd7a767928ee356a04

        SHA1

        683eeecef7f75194de1fc21296a31742351ec07f

        SHA256

        f50e651f61f0b43219f84425b96bb29d04067158c9a2090824501c128eb322f5

        SHA512

        d5d8bbc180782a5c648a44003622105904ac4d39018083631d3f56eb9b3ccb2990f7b295670e2920d7420d8ca785311b245ae46cc15d93c18f91fd74d028ddd4

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        31fc359d4ea62ce24909fc81dcc765b8

        SHA1

        18443edc555880d35e1ec8d067bfa3bf917388ad

        SHA256

        898a77b72fb4c2668812447fa4177fb6d7bc3548b58e243f503b1feb8dd1568c

        SHA512

        3709286616b02e3c4089922251fb2b71a64587bd247922b28abae9391970439a37ef32799e3d196b7a5ce5a9a818a930ce8404ed120a8fe5c2cd636d2d44caab

      • C:\Users\Admin\AppData\Local\Temp\$$a36C9.bat

        Filesize

        722B

        MD5

        3bd60e0c7dead5cc0f76d85e95e9688e

        SHA1

        8d63c17ed79b1990c78d9b5fa98709b1003f7393

        SHA256

        6c3facb2fc980c8a41c7d0e0e7b6c5a8e9c9cc94367b2313b5c7923b2d3f1d3e

        SHA512

        b8c462ab7cc2c423a92199f0e7f22affeea024a6c40f6d0d152cd574c6792fe8df3870bc556dce9d12770b93aa3e1fdbde71b7c5e6a5d9b64aee3fc9c3bcf938

      • C:\Users\Admin\AppData\Local\Temp\$$a36C9.bat

        Filesize

        722B

        MD5

        3bd60e0c7dead5cc0f76d85e95e9688e

        SHA1

        8d63c17ed79b1990c78d9b5fa98709b1003f7393

        SHA256

        6c3facb2fc980c8a41c7d0e0e7b6c5a8e9c9cc94367b2313b5c7923b2d3f1d3e

        SHA512

        b8c462ab7cc2c423a92199f0e7f22affeea024a6c40f6d0d152cd574c6792fe8df3870bc556dce9d12770b93aa3e1fdbde71b7c5e6a5d9b64aee3fc9c3bcf938

      • C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe

        Filesize

        90KB

        MD5

        c8c3b8fb878ce29b75a69219abff4ccf

        SHA1

        e2e5d4feb0dff20ad1d83f72062f5816d365bc37

        SHA256

        4656a73e3e8ae7ab4dc9bcdcda922f18787978c758871c9bd51e4340d46e5113

        SHA512

        70c68e1c770cc806b2d2edf5d40cc86dd1781d8a01849cffc08a511133c1efcf892bd8a56dd4a7f8e307c46b038fff3a309ce9c1d78feb6190347ae6d77d6ad1

      • C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe

        Filesize

        90KB

        MD5

        c8c3b8fb878ce29b75a69219abff4ccf

        SHA1

        e2e5d4feb0dff20ad1d83f72062f5816d365bc37

        SHA256

        4656a73e3e8ae7ab4dc9bcdcda922f18787978c758871c9bd51e4340d46e5113

        SHA512

        70c68e1c770cc806b2d2edf5d40cc86dd1781d8a01849cffc08a511133c1efcf892bd8a56dd4a7f8e307c46b038fff3a309ce9c1d78feb6190347ae6d77d6ad1

      • C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe.exe

        Filesize

        90KB

        MD5

        c8c3b8fb878ce29b75a69219abff4ccf

        SHA1

        e2e5d4feb0dff20ad1d83f72062f5816d365bc37

        SHA256

        4656a73e3e8ae7ab4dc9bcdcda922f18787978c758871c9bd51e4340d46e5113

        SHA512

        70c68e1c770cc806b2d2edf5d40cc86dd1781d8a01849cffc08a511133c1efcf892bd8a56dd4a7f8e307c46b038fff3a309ce9c1d78feb6190347ae6d77d6ad1

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        2001b3d40d05330d0c289354fd39c442

        SHA1

        31c0c109110e336da3bdfee62d6986e50be0affd

        SHA256

        ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815

        SHA512

        92847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        2001b3d40d05330d0c289354fd39c442

        SHA1

        31c0c109110e336da3bdfee62d6986e50be0affd

        SHA256

        ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815

        SHA512

        92847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        2001b3d40d05330d0c289354fd39c442

        SHA1

        31c0c109110e336da3bdfee62d6986e50be0affd

        SHA256

        ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815

        SHA512

        92847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        2001b3d40d05330d0c289354fd39c442

        SHA1

        31c0c109110e336da3bdfee62d6986e50be0affd

        SHA256

        ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815

        SHA512

        92847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69

      • F:\$RECYCLE.BIN\S-1-5-21-2084844033-2744876406-2053742436-1000\_desktop.ini

        Filesize

        10B

        MD5

        e0b221b9338753deceb4d4e7a6bf13e8

        SHA1

        56521251ff5aab737b3617dd82eb07df74ad588f

        SHA256

        3e46e7e2c6c9cf629a9230a5b1c5b196f727959b334cbb517641244ec5c4b065

        SHA512

        391e4ed4ed44dc677fd663677cb7e69e4c23e4a3629940e46cf757d812395a7876a93c3568d12e5dd99e06b7068e22397694cf54723efa3f0f5789b9687b5810

      • memory/1296-65-0x0000000002B50000-0x0000000002B51000-memory.dmp

        Filesize

        4KB

      • memory/2056-59-0x0000000002520000-0x0000000002521000-memory.dmp

        Filesize

        4KB

      • memory/2716-83-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2716-70-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2716-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2716-77-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2716-129-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2716-136-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2716-137-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2716-1888-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2716-3348-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3060-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3060-17-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3060-11-0x00000000002B0000-0x00000000002E4000-memory.dmp

        Filesize

        208KB