Analysis

  • max time kernel
    151s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2023, 18:30

General

  • Target

    f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe

  • Size

    207KB

  • MD5

    0816c5fcff41e9523e003e400ad116f8

  • SHA1

    d8f38f6d6e1ed8ac2838a59d4367605154033ee1

  • SHA256

    f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75

  • SHA512

    7f093e9a7e850861320e28d8b7a906e14cec80175eda567fc066129f6e10d960980693011bb4e8b68e0285c661be4b6689317633b88fe1b88784fc59163bdd9c

  • SSDEEP

    6144:8VfjmNAni3F8QrBAmWt9h8QlLISZWVRohcq7d:+7+Gi35rBRy9hdFIdRoGU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1240
      • C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
        "C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a7484.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:752
          • C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
            "C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe"
            4⤵
            • Executes dropped EXE
            PID:2700
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2412
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2376
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2668

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\$$a7484.bat

              Filesize

              722B

              MD5

              ba1ae91f649513f63c700a79403d82fb

              SHA1

              8f0e5ea9268ec7c8ac573b5260ef849e87576a13

              SHA256

              310dbdd8343d5110a05dc247ec7ef6568f388eb0fba7269516c408d36326681c

              SHA512

              8fbbe569de9256e50289ae5fa1b7ba94a34f528494d81dc900e96fc9546907d6fae7cd32b72d4d6fdc9b364aa63924d18b23dbd11106043d6e7f0c75d7b99c72

            • C:\Users\Admin\AppData\Local\Temp\$$a7484.bat

              Filesize

              722B

              MD5

              ba1ae91f649513f63c700a79403d82fb

              SHA1

              8f0e5ea9268ec7c8ac573b5260ef849e87576a13

              SHA256

              310dbdd8343d5110a05dc247ec7ef6568f388eb0fba7269516c408d36326681c

              SHA512

              8fbbe569de9256e50289ae5fa1b7ba94a34f528494d81dc900e96fc9546907d6fae7cd32b72d4d6fdc9b364aa63924d18b23dbd11106043d6e7f0c75d7b99c72

            • C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe

              Filesize

              181KB

              MD5

              be535d8b68dd064442f73211466e5987

              SHA1

              aa49313d9513fd9c2d2b25da09ea24d09cc03435

              SHA256

              c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59

              SHA512

              eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638

            • C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe.exe

              Filesize

              181KB

              MD5

              be535d8b68dd064442f73211466e5987

              SHA1

              aa49313d9513fd9c2d2b25da09ea24d09cc03435

              SHA256

              c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59

              SHA512

              eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              d375bd04f866e1b3276ba3b9779966ad

              SHA1

              1da9855e29a5384522563e0c4bdac786712d8b12

              SHA256

              a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be

              SHA512

              78aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              d375bd04f866e1b3276ba3b9779966ad

              SHA1

              1da9855e29a5384522563e0c4bdac786712d8b12

              SHA256

              a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be

              SHA512

              78aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              d375bd04f866e1b3276ba3b9779966ad

              SHA1

              1da9855e29a5384522563e0c4bdac786712d8b12

              SHA256

              a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be

              SHA512

              78aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              d375bd04f866e1b3276ba3b9779966ad

              SHA1

              1da9855e29a5384522563e0c4bdac786712d8b12

              SHA256

              a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be

              SHA512

              78aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10

            • F:\$RECYCLE.BIN\S-1-5-21-1154728922-3261336865-3456416385-1000\_desktop.ini

              Filesize

              10B

              MD5

              03d3ebeca3d19630e02fda3c0e9d35b3

              SHA1

              56283b1f54235b653d0224cca2e3bbf10a0f7ae1

              SHA256

              865a0d9b66a168264e3a3b734eb9b719a4e207988cb0880ed54c5d69e9af8163

              SHA512

              e6c9eb80b92a7840e6f2cb04e34403ac8abd3a3439f4998d9e11b26c2989b0dda11131a772fa7c54d9882f95d167d4b33e5e87035e9654033b75fff13efd7f3b

            • \Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe

              Filesize

              181KB

              MD5

              be535d8b68dd064442f73211466e5987

              SHA1

              aa49313d9513fd9c2d2b25da09ea24d09cc03435

              SHA256

              c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59

              SHA512

              eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638

            • \Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe

              Filesize

              181KB

              MD5

              be535d8b68dd064442f73211466e5987

              SHA1

              aa49313d9513fd9c2d2b25da09ea24d09cc03435

              SHA256

              c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59

              SHA512

              eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638

            • memory/1240-30-0x00000000029D0000-0x00000000029D1000-memory.dmp

              Filesize

              4KB

            • memory/2412-93-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2412-21-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2412-32-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2412-34-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2412-41-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2412-47-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2412-99-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2412-858-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2412-1853-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2412-1855-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2880-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2880-15-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2880-16-0x0000000000220000-0x0000000000254000-memory.dmp

              Filesize

              208KB