Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2023 02:26

General

  • Target

    fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe

  • Size

    1.0MB

  • MD5

    4bedd105b7b2b91cd234c412f55f8490

  • SHA1

    e65a83024a86c95972be36fc2cc1f77dfcd842b1

  • SHA256

    fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba

  • SHA512

    4513a80611d5b7ccccdfb87ff28cf7b44990fbd6730d09268a64466aa0bd351f329a9209443d5f0118daa671c361f17eca08eacc473f45167d4fe2633da7d5d2

  • SSDEEP

    12288:k7+ftHgiN8ZVaModCtN95MArOsAgCRm1LNoeQ1kbWccMEzoi6bkE8a8SK:k74VVNUVaMfJAgAeZYkbWNtkF8SK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3316
      • C:\Users\Admin\AppData\Local\Temp\fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe
        "C:\Users\Admin\AppData\Local\Temp\fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4700
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE30D.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3920
          • C:\Users\Admin\AppData\Local\Temp\fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe
            "C:\Users\Admin\AppData\Local\Temp\fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:560
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4304
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1292
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2104

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        10e927db6aae50e89fcb4d441d9e27e1

        SHA1

        6a2250c03aba8fe7a9c388742db5ac4e473fa178

        SHA256

        a68e60f5bc35fdb50525110f44ad636498278629d38a3854369e9a93ed70ee19

        SHA512

        1d6c8b2d48403d037fc31ffeee690ca956ed8595671e1400c8dad69347ac0749d94498b00feec325575d98d300c0694d0083ca7e2e72a124ff45e9f74dd09227

      • C:\Program Files\BackupPing.exe

        Filesize

        409KB

        MD5

        9782bb09db44802e056cba6815492ad2

        SHA1

        9c6521c90d706c4d96b183bb48586e9afa68cacc

        SHA256

        18c3bdac4adbd0d4772a46a8856c23ccf43d627262b4974a8495afaa0106a834

        SHA512

        4694df7478d325abe43adc7e74b090bc46e254af1e0e83bd4bb48787a467a03868a1653eebf45145ae8aa114e6ea9ceb2de735308efc5c348a8f3799b9fc71f0

      • C:\Users\Admin\AppData\Local\Temp\$$aE30D.bat

        Filesize

        722B

        MD5

        70a397d581edf9d69d7631cba5df4a8b

        SHA1

        a03d80a75297c563859d1c5ba6916fb250698aca

        SHA256

        07ab799aa42406b19b7d90bd2cbf013f7262c0ba95b65cda9ba3bef94f0e5fad

        SHA512

        c959ae5b501f7c5b231da4f2038eb5037a5b1f28e57f765ee7579322b768a8bddc4a32badd8d9bdbb34d443f8c0046ceec3e37dcd7a84d0427dbceb7538a1857

      • C:\Users\Admin\AppData\Local\Temp\fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe

        Filesize

        1.0MB

        MD5

        a1152007a0ba63384cc9d39fdeb892f8

        SHA1

        e7eab1a2763334e359f7d496a3e6bc1001daec9b

        SHA256

        3ff29a3a41b1a314c4a244ae5d6deb1373254632240a1a674be1e39097d3f29c

        SHA512

        053c139d661bc3eae7dc8b6d476fea6c5cc5d7533d73a7dbc2b6091c177d51dea5735c9693ef749559d0db8fc96101c6b9471e383e7178cfe42afee2a6a28f31

      • C:\Users\Admin\AppData\Local\Temp\fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe.exe

        Filesize

        1.0MB

        MD5

        a1152007a0ba63384cc9d39fdeb892f8

        SHA1

        e7eab1a2763334e359f7d496a3e6bc1001daec9b

        SHA256

        3ff29a3a41b1a314c4a244ae5d6deb1373254632240a1a674be1e39097d3f29c

        SHA512

        053c139d661bc3eae7dc8b6d476fea6c5cc5d7533d73a7dbc2b6091c177d51dea5735c9693ef749559d0db8fc96101c6b9471e383e7178cfe42afee2a6a28f31

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        e7093a12cfd837f03fc2aa86eaa886ba

        SHA1

        bfeb2bd83d5d07adb9e0df6d23177660982f884d

        SHA256

        9ce4f790a3ad9cb93ba0b875d0888db7e560fbbbceb022a1624252a26dde4db2

        SHA512

        8ff9f31ff0e19431aec46a5ba04387ea145f42d4480911f5ea07deb9e8e48b6ce631d919746fa7446568a3a5e56c23a92f1e632379580cd286e7bdcc04350f55

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        e7093a12cfd837f03fc2aa86eaa886ba

        SHA1

        bfeb2bd83d5d07adb9e0df6d23177660982f884d

        SHA256

        9ce4f790a3ad9cb93ba0b875d0888db7e560fbbbceb022a1624252a26dde4db2

        SHA512

        8ff9f31ff0e19431aec46a5ba04387ea145f42d4480911f5ea07deb9e8e48b6ce631d919746fa7446568a3a5e56c23a92f1e632379580cd286e7bdcc04350f55

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        e7093a12cfd837f03fc2aa86eaa886ba

        SHA1

        bfeb2bd83d5d07adb9e0df6d23177660982f884d

        SHA256

        9ce4f790a3ad9cb93ba0b875d0888db7e560fbbbceb022a1624252a26dde4db2

        SHA512

        8ff9f31ff0e19431aec46a5ba04387ea145f42d4480911f5ea07deb9e8e48b6ce631d919746fa7446568a3a5e56c23a92f1e632379580cd286e7bdcc04350f55

      • F:\$RECYCLE.BIN\S-1-5-21-2231940048-779848787-2990559741-1000\_desktop.ini

        Filesize

        10B

        MD5

        17de2acd7b02442c9cb0e8c0fccf8e96

        SHA1

        e062bd3af8ffe48988392987af8cbbddddffb804

        SHA256

        af7f402fe1458d28f48714376dd0e26175e667690e61b41c8bd0e61d818822d3

        SHA512

        e04d6d828edc3ef3443dfd40f72f76351bf981a16566cf0f31e60015f588440764461b52be088f549e8a2a6fa41370129e60d36b63b66f9a63c6df89f44fdbd8

      • memory/4304-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4304-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4304-35-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4304-40-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4304-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4304-1089-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4304-3658-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4304-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4304-4641-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4700-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4700-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB