Analysis

  • max time kernel
    158s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2023, 20:46

General

  • Target

    ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe

  • Size

    409KB

  • MD5

    34fc0ae3f1e749d1f4df77c9c0558449

  • SHA1

    c3834a34187e509b4072e0c7cf2091577ff22542

  • SHA256

    ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960

  • SHA512

    fd7982dfa8bb289cc5d256f053a461cd7dedc302d4409e9fbc2c10e2c76abbc24a5950b851d7e7423c0da4b6561a250cc9ae026c5593d028b62d293a1f008c89

  • SSDEEP

    12288:27+Qq66c7dFWoGkXjEi356po1g0IyQhxBS:27xq66boRXj53Ko+0VQhxBS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3232
      • C:\Users\Admin\AppData\Local\Temp\ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe
        "C:\Users\Admin\AppData\Local\Temp\ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5D6D.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4008
          • C:\Users\Admin\AppData\Local\Temp\ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe
            "C:\Users\Admin\AppData\Local\Temp\ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe"
            4⤵
            • Executes dropped EXE
            PID:1264
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4696
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4428
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4800

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              484KB

              MD5

              c262c061be539fcc09d92671af719194

              SHA1

              0b8bcde0a8baf94871b5bedb6bde235f3083d9b1

              SHA256

              5ff5c17948967c953360f3bae836e6234b3696c4334a5426928cb0b7d177474a

              SHA512

              d46e14b7bb15453e0c8e1ae98004ce570903ea15a8ccc3c1a7bfa9c94b98e2b807b64b00e7d65faa32b2f7c98ce8480715157312e329a046bd591261dc4ba22b

            • C:\Users\Admin\AppData\Local\Temp\$$a5D6D.bat

              Filesize

              722B

              MD5

              045f28fa1d6f15b5156dbf27d1e909d5

              SHA1

              dc710dc825770415beba6e79c8dd9f44e2e672ac

              SHA256

              d6fb0496d48a23f9784559eb3a5307047862d4dab57cc378ed1af90153701517

              SHA512

              c1b83edd370dc49540e1d7c97f8b746e53ec6e03f0149feda68e9a8c66a3042bc0c5ecd39ad8ffd813742e1016a0021729d3019260c96f5e7af3e9c946a5b81b

            • C:\Users\Admin\AppData\Local\Temp\ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe

              Filesize

              383KB

              MD5

              8f6b97b4cbea59c5636520f2e85e745b

              SHA1

              c6fe033113de1d973b74d2a8460cae0be3fe128c

              SHA256

              8f28975a831164b273311144e5e3430be5418089b88c488b1791937fd7975f49

              SHA512

              3d226460c11523d4f73da7b9fc05e8e7f660dceadebddf97d11a1ce7426fd5f5db5119c35becd4c7bf95966f84a0e7de125930d62a486c3ae2aa8efad0e0355e

            • C:\Users\Admin\AppData\Local\Temp\ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe.exe

              Filesize

              383KB

              MD5

              8f6b97b4cbea59c5636520f2e85e745b

              SHA1

              c6fe033113de1d973b74d2a8460cae0be3fe128c

              SHA256

              8f28975a831164b273311144e5e3430be5418089b88c488b1791937fd7975f49

              SHA512

              3d226460c11523d4f73da7b9fc05e8e7f660dceadebddf97d11a1ce7426fd5f5db5119c35becd4c7bf95966f84a0e7de125930d62a486c3ae2aa8efad0e0355e

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              71dd1e3988fda59f7add057ee3332f56

              SHA1

              562b2d92947ec6e8555862f9f72439f3456dda57

              SHA256

              bd01533974f5c0e33db4535fa5cedbb2e6be6e6ec7045be915765ed1706d760d

              SHA512

              d2d4233ef6cdd8cdef77c475fe35f60b74bebce71dda7707876ba29a9c282f7d8a88c4baf85726fbf352af500f83e4acb521cb0fec5042ef4066bb688a0f8cca

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              71dd1e3988fda59f7add057ee3332f56

              SHA1

              562b2d92947ec6e8555862f9f72439f3456dda57

              SHA256

              bd01533974f5c0e33db4535fa5cedbb2e6be6e6ec7045be915765ed1706d760d

              SHA512

              d2d4233ef6cdd8cdef77c475fe35f60b74bebce71dda7707876ba29a9c282f7d8a88c4baf85726fbf352af500f83e4acb521cb0fec5042ef4066bb688a0f8cca

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              71dd1e3988fda59f7add057ee3332f56

              SHA1

              562b2d92947ec6e8555862f9f72439f3456dda57

              SHA256

              bd01533974f5c0e33db4535fa5cedbb2e6be6e6ec7045be915765ed1706d760d

              SHA512

              d2d4233ef6cdd8cdef77c475fe35f60b74bebce71dda7707876ba29a9c282f7d8a88c4baf85726fbf352af500f83e4acb521cb0fec5042ef4066bb688a0f8cca

            • F:\$RECYCLE.BIN\S-1-5-21-3125601242-331447593-1512828465-1000\_desktop.ini

              Filesize

              10B

              MD5

              03d3ebeca3d19630e02fda3c0e9d35b3

              SHA1

              56283b1f54235b653d0224cca2e3bbf10a0f7ae1

              SHA256

              865a0d9b66a168264e3a3b734eb9b719a4e207988cb0880ed54c5d69e9af8163

              SHA512

              e6c9eb80b92a7840e6f2cb04e34403ac8abd3a3439f4998d9e11b26c2989b0dda11131a772fa7c54d9882f95d167d4b33e5e87035e9654033b75fff13efd7f3b

            • memory/2864-12-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2864-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2864-5-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2864-1-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4696-11-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4696-21-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4696-29-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4696-35-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4696-40-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4696-44-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4696-164-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4696-303-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4696-868-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB