Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
30-10-2023 07:36
Static task
static1
Behavioral task
behavioral1
Sample
2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe
Resource
win10v2004-20231020-en
General
-
Target
2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe
-
Size
29KB
-
MD5
05771d2315d1662c1c55d48de74a19bf
-
SHA1
92d33507369f46b18e4284b063184045ce25fbcb
-
SHA256
2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb
-
SHA512
cc2c79837a1391fb7520c1548564dc712eeeccc31b1348d4a3f6dce612f554a6ad316367a9c44bb4f35750d7d5c94330d7aac8a15f0eef132e85c635ee2ae2e9
-
SSDEEP
384:NbbyG9LPv1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:pXlH16GVRu1yK9fMnJG2V9dHS8
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\L: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\K: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\G: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\Z: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\S: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\J: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\H: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\V: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\T: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\Q: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\P: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\O: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\N: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\M: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\I: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\Y: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\X: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\U: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\R: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened (read-only) \??\E: 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files (x86)\Windows NT\Accessories\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\es-ES\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\DVD Maker\it-IT\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2952 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 28 PID 2040 wrote to memory of 2952 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 28 PID 2040 wrote to memory of 2952 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 28 PID 2040 wrote to memory of 2952 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 28 PID 2952 wrote to memory of 1280 2952 net.exe 30 PID 2952 wrote to memory of 1280 2952 net.exe 30 PID 2952 wrote to memory of 1280 2952 net.exe 30 PID 2952 wrote to memory of 1280 2952 net.exe 30 PID 2040 wrote to memory of 1212 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 6 PID 2040 wrote to memory of 1212 2040 2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe 6
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe"C:\Users\Admin\AppData\Local\Temp\2700888070d7180168bef006b71629b331bb089e4b5dc031010901f63f54afeb.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1280
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5ab16a418161e1e14a194192a48bf7cae
SHA1524f08ef7d9325ff38fa853db790807d9738c961
SHA25644e9ec401cc7a3a17b36db3432fb444af0f37bdd8e20b6d16417b7a6645c1b8d
SHA512eb9e520a3436475a0abb16d658cd5381de2f251fa9c537b517cb9762a1794d3220556c393488b897544d6a11fb95e8af0bc36c7f443645d853d462f708f00b2e
-
Filesize
876KB
MD5e354f52e014b20fc333ffab46f362af3
SHA1ee79007e400f4fb2013b962fd1dafea0ad1764c7
SHA256b33bed10b72d72a82a34cb3cb7d87e2bd1b2cbc68e9c11d8607d20d97b066e62
SHA51204b92cc603278d42c3fd3aa68bb811e8687be49e6285fc5647345d938944095969ca71aafa976380bcde7ee4c178c9f8cdd9da6dd0048382a822242294a44322
-
Filesize
474KB
MD5683b92ed9a7815ba566ea5750f489c6e
SHA1489e66c67780380506f54f7fda32a7b9e98d5d70
SHA25687f7a6e091d82bc6f773b756acf5f239100db9f6b931f29c6847480fa3365b5e
SHA51286346fe0faffdfc6af5f4bcdc4bda683c65fb7f8879976a87767f0a26efdeb8e656c0577124f9259a3b21faa74b29fc73ea0a005d7425fc9822e00eca4e8f679
-
Filesize
10B
MD566a297bdfb8bca17fc70dc7aade38f80
SHA1c131517df089bd22d314c2ad490b391e599e409c
SHA25620b72f923ff58cec359f33b5443b5bc5f5c638b719b6df50a73313c23a434ff7
SHA512c329a6351d692301d88ed2e94afde11919aa2b11b851ae662eed9a8468a61e4e14d1cf0487baf4424047f76bfc1c66b7402794f787638e0bd0da01d03cc25509