Analysis

  • max time kernel
    178s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2023 17:44

General

  • Target

    df9bf5e6ca8278fe3ddc6fc7b28b7add683b8b5ef1dfaaf6fc5ce90ba3b0f94a.exe

  • Size

    68KB

  • MD5

    3652b87998946f9eaec771eae01f5384

  • SHA1

    27251fbaa4df091f9c9401744e06adfb57a9c47d

  • SHA256

    df9bf5e6ca8278fe3ddc6fc7b28b7add683b8b5ef1dfaaf6fc5ce90ba3b0f94a

  • SHA512

    14e122203982c8a21ee75208ce7b2930b1764b74aad1c94bc22c0980a20a6237280bf0111adbfe92bdee73de7e4dd1dafc9e631af5bc7fad0dd2c8f215c7e787

  • SSDEEP

    1536:AfgLdQAQfcfymN71gNnR1PL9YoOIlg0FJf:AftffjmNpgrlfF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3364
      • C:\Users\Admin\AppData\Local\Temp\df9bf5e6ca8278fe3ddc6fc7b28b7add683b8b5ef1dfaaf6fc5ce90ba3b0f94a.exe
        "C:\Users\Admin\AppData\Local\Temp\df9bf5e6ca8278fe3ddc6fc7b28b7add683b8b5ef1dfaaf6fc5ce90ba3b0f94a.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4688
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB3F9.bat
          3⤵
            PID:1652
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2188
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1316
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:1456

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          484KB

          MD5

          9cbede5c7169b1bd71ecfffbaaab59fe

          SHA1

          037c2e0b0d19428d483af7f34dd8e0d71d0f3f04

          SHA256

          e286579d02a22beb288806ea7006fc2f65b339f9fac6cb0412d031091cc27852

          SHA512

          5d3009ffedeb3339560a5188140977f46f56f89bc021db5916d6a9f02eb030e96da3acec2324a80ee9f95ba6d93818fa73293b8203272b1b2caa842868cba86d

        • C:\Users\Admin\AppData\Local\Temp\$$aB3F9.bat

          Filesize

          722B

          MD5

          e6486ee4098184bcbf818878a86a1327

          SHA1

          fc5a714b6aa8bfc3032f4eccd98b072dac7174c4

          SHA256

          4d512ab533cb5626be6c2922bceea569978df9716f82818f79b2ffc76f300d05

          SHA512

          3b92d2790b2d5ac48446152abcd645aaa7f5428842ce0a121bb135d8d5dc8492772ff7d8ad0b7f443998e44cbb08f66f95aeb607f4717a87678054d98b4e4364

        • C:\Users\Admin\AppData\Local\Temp\df9bf5e6ca8278fe3ddc6fc7b28b7add683b8b5ef1dfaaf6fc5ce90ba3b0f94a.exe.exe

          Filesize

          42KB

          MD5

          774057afbd4dccd6992989a593720e86

          SHA1

          633b8f0677043c18f9541c3cb9478f2eee3695d0

          SHA256

          a9d1c28a189b61f37375f0b29d38e4a82d394c77a1c84721e638e2526c35d4ff

          SHA512

          37fcd7fa6400f76647c5052c2a3b82316dc95f51befd3bac6eb555824d157766393ff3bafb3a6802ddb918ae4870081174e4fc70869ae180725755daca332df2

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          006fea33f14c9da590dc8739811ffce2

          SHA1

          ad2319b507e25457427483b5d5a83f1f41aa19cc

          SHA256

          c24589d3af6a0fc94d9861e4e893d109cdbb2129051a178280fdd17a3e62af45

          SHA512

          f6117e3d55da2f84ac78babef6bc09df8955e37d73bfa351eb3e055c06f4f7aacc270a219bf28e0ec5d8c0b30c013d401bbd35dde42497501125490648156cca

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          006fea33f14c9da590dc8739811ffce2

          SHA1

          ad2319b507e25457427483b5d5a83f1f41aa19cc

          SHA256

          c24589d3af6a0fc94d9861e4e893d109cdbb2129051a178280fdd17a3e62af45

          SHA512

          f6117e3d55da2f84ac78babef6bc09df8955e37d73bfa351eb3e055c06f4f7aacc270a219bf28e0ec5d8c0b30c013d401bbd35dde42497501125490648156cca

        • C:\Windows\rundl132.exe

          Filesize

          26KB

          MD5

          006fea33f14c9da590dc8739811ffce2

          SHA1

          ad2319b507e25457427483b5d5a83f1f41aa19cc

          SHA256

          c24589d3af6a0fc94d9861e4e893d109cdbb2129051a178280fdd17a3e62af45

          SHA512

          f6117e3d55da2f84ac78babef6bc09df8955e37d73bfa351eb3e055c06f4f7aacc270a219bf28e0ec5d8c0b30c013d401bbd35dde42497501125490648156cca

        • F:\$RECYCLE.BIN\S-1-5-21-3125601242-331447593-1512828465-1000\_desktop.ini

          Filesize

          9B

          MD5

          4d72cff1ce9d97416bd764af363f34df

          SHA1

          e5377631a8a8ae98182121d4e15e878bd302dbc6

          SHA256

          023ab9831a0de101117d7d810372142f03ab43630ab99c68cbff7f11af67f861

          SHA512

          7489eb7b688a2ebd105c8f23c66ff71cb9f72546e4be795a888a12432d8b3ce50ca9dd173d9291ada405596864224e658af61479c70b2a7443161a533abce1e2

        • memory/2188-20-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2188-10-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2188-21-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2188-28-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2188-34-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2188-39-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2188-43-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2188-98-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2188-144-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4688-15-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4688-0-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4688-2-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4688-1-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB