Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2023, 18:30

General

  • Target

    f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe

  • Size

    207KB

  • MD5

    0816c5fcff41e9523e003e400ad116f8

  • SHA1

    d8f38f6d6e1ed8ac2838a59d4367605154033ee1

  • SHA256

    f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75

  • SHA512

    7f093e9a7e850861320e28d8b7a906e14cec80175eda567fc066129f6e10d960980693011bb4e8b68e0285c661be4b6689317633b88fe1b88784fc59163bdd9c

  • SSDEEP

    6144:8VfjmNAni3F8QrBAmWt9h8QlLISZWVRohcq7d:+7+Gi35rBRy9hdFIdRoGU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3264
      • C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
        "C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3888
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8482.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:220
          • C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
            "C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe"
            4⤵
            • Executes dropped EXE
            PID:3452
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4712
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:536
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1996

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              484KB

              MD5

              19f338940fb0d223a19e76271653621f

              SHA1

              6ec7c0ead9051e02de5d30e85c042959da25447f

              SHA256

              967e34e22c679e09c56114a5107732bbb33576683c66615a2040e59402181c68

              SHA512

              5afcbf04d14ecbef4fcb8e505c69fe3447ebdf7de4005ce1f3fb0572201fe539d5aa001673c7d49fbc578c77bb57e3da592f06d62c25f75b63bf80f3aa22849a

            • C:\Users\Admin\AppData\Local\Temp\$$a8482.bat

              Filesize

              722B

              MD5

              c6d5ae12889e152e4573b3a149a2b132

              SHA1

              83217b19e19f20bb38e771bb068819e052447ad9

              SHA256

              14dbcaf0bca30bd0465738b536aeb21c1727b88a38ab6028fa993f792a46368b

              SHA512

              0d56c225f9aca6a728501d846ec0cdd7b706768fb44114ae98372fe6d02dc2e1150a91cb1c08f23879e9466ce13fb703da67d8360894d688e164663d8b83deeb

            • C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe

              Filesize

              181KB

              MD5

              be535d8b68dd064442f73211466e5987

              SHA1

              aa49313d9513fd9c2d2b25da09ea24d09cc03435

              SHA256

              c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59

              SHA512

              eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638

            • C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe.exe

              Filesize

              181KB

              MD5

              be535d8b68dd064442f73211466e5987

              SHA1

              aa49313d9513fd9c2d2b25da09ea24d09cc03435

              SHA256

              c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59

              SHA512

              eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              d375bd04f866e1b3276ba3b9779966ad

              SHA1

              1da9855e29a5384522563e0c4bdac786712d8b12

              SHA256

              a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be

              SHA512

              78aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              d375bd04f866e1b3276ba3b9779966ad

              SHA1

              1da9855e29a5384522563e0c4bdac786712d8b12

              SHA256

              a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be

              SHA512

              78aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              d375bd04f866e1b3276ba3b9779966ad

              SHA1

              1da9855e29a5384522563e0c4bdac786712d8b12

              SHA256

              a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be

              SHA512

              78aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10

            • F:\$RECYCLE.BIN\S-1-5-21-3350690463-3549324357-1323838019-1000\_desktop.ini

              Filesize

              10B

              MD5

              03d3ebeca3d19630e02fda3c0e9d35b3

              SHA1

              56283b1f54235b653d0224cca2e3bbf10a0f7ae1

              SHA256

              865a0d9b66a168264e3a3b734eb9b719a4e207988cb0880ed54c5d69e9af8163

              SHA512

              e6c9eb80b92a7840e6f2cb04e34403ac8abd3a3439f4998d9e11b26c2989b0dda11131a772fa7c54d9882f95d167d4b33e5e87035e9654033b75fff13efd7f3b

            • memory/3888-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3888-10-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4712-20-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4712-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4712-27-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4712-33-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4712-38-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4712-42-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4712-9-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4712-254-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4712-1085-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4712-1424-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB