Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2023 07:36

General

  • Target

    2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe

  • Size

    29KB

  • MD5

    05771d2315d1662c1c55d48de74a19bf

  • SHA1

    92d33507369f46b18e4284b063184045ce25fbcb

  • SHA256

    2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb

  • SHA512

    cc2c79837a1391fb7520c1548564dc712eeeccc31b1348d4a3f6dce612f554a6ad316367a9c44bb4f35750d7d5c94330d7aac8a15f0eef132e85c635ee2ae2e9

  • SSDEEP

    384:NbbyG9LPv1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:pXlH16GVRu1yK9fMnJG2V9dHS8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe
        "C:\Users\Admin\AppData\Local\Temp\2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2952
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1280

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        ab16a418161e1e14a194192a48bf7cae

        SHA1

        524f08ef7d9325ff38fa853db790807d9738c961

        SHA256

        44e9ec401cc7a3a17b36db3432fb444af0f37bdd8e20b6d16417b7a6645c1b8d

        SHA512

        eb9e520a3436475a0abb16d658cd5381de2f251fa9c537b517cb9762a1794d3220556c393488b897544d6a11fb95e8af0bc36c7f443645d853d462f708f00b2e

      • C:\Program Files\7-Zip\7zFM.exe

        Filesize

        876KB

        MD5

        e354f52e014b20fc333ffab46f362af3

        SHA1

        ee79007e400f4fb2013b962fd1dafea0ad1764c7

        SHA256

        b33bed10b72d72a82a34cb3cb7d87e2bd1b2cbc68e9c11d8607d20d97b066e62

        SHA512

        04b92cc603278d42c3fd3aa68bb811e8687be49e6285fc5647345d938944095969ca71aafa976380bcde7ee4c178c9f8cdd9da6dd0048382a822242294a44322

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        474KB

        MD5

        683b92ed9a7815ba566ea5750f489c6e

        SHA1

        489e66c67780380506f54f7fda32a7b9e98d5d70

        SHA256

        87f7a6e091d82bc6f773b756acf5f239100db9f6b931f29c6847480fa3365b5e

        SHA512

        86346fe0faffdfc6af5f4bcdc4bda683c65fb7f8879976a87767f0a26efdeb8e656c0577124f9259a3b21faa74b29fc73ea0a005d7425fc9822e00eca4e8f679

      • F:\$RECYCLE.BIN\S-1-5-21-1154728922-3261336865-3456416385-1000\_desktop.ini

        Filesize

        10B

        MD5

        66a297bdfb8bca17fc70dc7aade38f80

        SHA1

        c131517df089bd22d314c2ad490b391e599e409c

        SHA256

        20b72f923ff58cec359f33b5443b5bc5f5c638b719b6df50a73313c23a434ff7

        SHA512

        c329a6351d692301d88ed2e94afde11919aa2b11b851ae662eed9a8468a61e4e14d1cf0487baf4424047f76bfc1c66b7402794f787638e0bd0da01d03cc25509

      • memory/1212-5-0x00000000029F0000-0x00000000029F1000-memory.dmp

        Filesize

        4KB

      • memory/2040-66-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2040-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2040-73-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2040-20-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2040-114-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2040-1825-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2040-14-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2040-3285-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2040-7-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB