Analysis

  • max time kernel
    151s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2023 19:49

General

  • Target

    b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe

  • Size

    114KB

  • MD5

    604a150cbd370b5e0522cd7cc663199b

  • SHA1

    f0ee36c1d02ac37283f4b931ac6aae219fe25a79

  • SHA256

    b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4

  • SHA512

    dd8a8795c7d359d381b499c295ce525d8bf84d95e1f14629fe4678209d6bbeff55ac4ac669b8acd018fd8f489ac014f69c13a5de138754fbfd654ab3515bb361

  • SSDEEP

    1536:4PrPr+fgLdQAQfcfymNUssn3wuZEJOkn+h/wo6t7qXof1F4O7Wv:bftffjmNUsNOjwXeXofXRWv

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1372
      • C:\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe
        "C:\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2172
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a7DA8.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2680
          • C:\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe
            "C:\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe"
            4⤵
            • Executes dropped EXE
            PID:2804
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2696
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2860

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\$$a7DA8.bat

        Filesize

        722B

        MD5

        864ec8c320de03d8fef6eab23a465698

        SHA1

        f7eb396aed78d62fc24e58d0e76e9a62182b1ef9

        SHA256

        71fe5b51182a2b16db5daa98017f6d2b5de1d13de8c89f3dd9f611079029f7ee

        SHA512

        87bdf9b5d196d3d615804ac8b170cde0e60c48917fe2a458145ad805ea72656c7b25e889870274a1676b1a5c8cc3edc6689b8abc216b5057b84d7937aaef941b

      • C:\Users\Admin\AppData\Local\Temp\$$a7DA8.bat

        Filesize

        722B

        MD5

        864ec8c320de03d8fef6eab23a465698

        SHA1

        f7eb396aed78d62fc24e58d0e76e9a62182b1ef9

        SHA256

        71fe5b51182a2b16db5daa98017f6d2b5de1d13de8c89f3dd9f611079029f7ee

        SHA512

        87bdf9b5d196d3d615804ac8b170cde0e60c48917fe2a458145ad805ea72656c7b25e889870274a1676b1a5c8cc3edc6689b8abc216b5057b84d7937aaef941b

      • C:\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe

        Filesize

        88KB

        MD5

        55f91028015f6b1a9d7b78ae35b002c2

        SHA1

        972a97c29122c230d8b1d9edca39048ce486dca4

        SHA256

        9eb065c70ced8980c33e06cf64ba6f78e5cacea1263f97eefaf6d323d7964f41

        SHA512

        ae7eb11d9e0fc8249fd2973d203f5ce7c6da30e1ddd82d279648b6db192c53bed1b412ad151be6401b30f10b34801e47e1168b93c362d116766d71da804a8155

      • C:\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe.exe

        Filesize

        88KB

        MD5

        55f91028015f6b1a9d7b78ae35b002c2

        SHA1

        972a97c29122c230d8b1d9edca39048ce486dca4

        SHA256

        9eb065c70ced8980c33e06cf64ba6f78e5cacea1263f97eefaf6d323d7964f41

        SHA512

        ae7eb11d9e0fc8249fd2973d203f5ce7c6da30e1ddd82d279648b6db192c53bed1b412ad151be6401b30f10b34801e47e1168b93c362d116766d71da804a8155

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        89a826a222d8a17bbfce712fc174a3d5

        SHA1

        43b9d54880723fd3881969a392314fa4518132e7

        SHA256

        593e047cef4bfc3e6b21ac31921a4d59d190ed4e6e1538c0a2f4240764c47e3b

        SHA512

        dcda5b853a2988e4823cc48a29ee3ed370f25dd2715adb5c9541aba74814063b043326a009956f299b7fabeb9d7d5d2a103130da7a7566167c516255cf6e15ab

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        89a826a222d8a17bbfce712fc174a3d5

        SHA1

        43b9d54880723fd3881969a392314fa4518132e7

        SHA256

        593e047cef4bfc3e6b21ac31921a4d59d190ed4e6e1538c0a2f4240764c47e3b

        SHA512

        dcda5b853a2988e4823cc48a29ee3ed370f25dd2715adb5c9541aba74814063b043326a009956f299b7fabeb9d7d5d2a103130da7a7566167c516255cf6e15ab

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        89a826a222d8a17bbfce712fc174a3d5

        SHA1

        43b9d54880723fd3881969a392314fa4518132e7

        SHA256

        593e047cef4bfc3e6b21ac31921a4d59d190ed4e6e1538c0a2f4240764c47e3b

        SHA512

        dcda5b853a2988e4823cc48a29ee3ed370f25dd2715adb5c9541aba74814063b043326a009956f299b7fabeb9d7d5d2a103130da7a7566167c516255cf6e15ab

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        89a826a222d8a17bbfce712fc174a3d5

        SHA1

        43b9d54880723fd3881969a392314fa4518132e7

        SHA256

        593e047cef4bfc3e6b21ac31921a4d59d190ed4e6e1538c0a2f4240764c47e3b

        SHA512

        dcda5b853a2988e4823cc48a29ee3ed370f25dd2715adb5c9541aba74814063b043326a009956f299b7fabeb9d7d5d2a103130da7a7566167c516255cf6e15ab

      • F:\$RECYCLE.BIN\S-1-5-21-2084844033-2744876406-2053742436-1000\_desktop.ini

        Filesize

        10B

        MD5

        03d3ebeca3d19630e02fda3c0e9d35b3

        SHA1

        56283b1f54235b653d0224cca2e3bbf10a0f7ae1

        SHA256

        865a0d9b66a168264e3a3b734eb9b719a4e207988cb0880ed54c5d69e9af8163

        SHA512

        e6c9eb80b92a7840e6f2cb04e34403ac8abd3a3439f4998d9e11b26c2989b0dda11131a772fa7c54d9882f95d167d4b33e5e87035e9654033b75fff13efd7f3b

      • \Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe

        Filesize

        88KB

        MD5

        55f91028015f6b1a9d7b78ae35b002c2

        SHA1

        972a97c29122c230d8b1d9edca39048ce486dca4

        SHA256

        9eb065c70ced8980c33e06cf64ba6f78e5cacea1263f97eefaf6d323d7964f41

        SHA512

        ae7eb11d9e0fc8249fd2973d203f5ce7c6da30e1ddd82d279648b6db192c53bed1b412ad151be6401b30f10b34801e47e1168b93c362d116766d71da804a8155

      • \Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe

        Filesize

        88KB

        MD5

        55f91028015f6b1a9d7b78ae35b002c2

        SHA1

        972a97c29122c230d8b1d9edca39048ce486dca4

        SHA256

        9eb065c70ced8980c33e06cf64ba6f78e5cacea1263f97eefaf6d323d7964f41

        SHA512

        ae7eb11d9e0fc8249fd2973d203f5ce7c6da30e1ddd82d279648b6db192c53bed1b412ad151be6401b30f10b34801e47e1168b93c362d116766d71da804a8155

      • memory/1372-30-0x0000000002AD0000-0x0000000002AD1000-memory.dmp

        Filesize

        4KB

      • memory/2172-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2172-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2172-12-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2172-18-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2172-34-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2720-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-47-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-93-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-100-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-101-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-587-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-1853-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2720-1857-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB