Analysis

  • max time kernel
    150s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-11-2023 09:39

General

  • Target

    f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe

  • Size

    2.9MB

  • MD5

    439eec719b9a57cbef45355cd061e861

  • SHA1

    fba81da3aeb8e17ee89b23bf95a6df2587dac08b

  • SHA256

    f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05

  • SHA512

    dbf6ace6ba1fe374f06fae6c70d4c83a4a97db92d2810e20be856b9555298f66294742b38c0e606846fdad477fbd2006a439323240147d6fe372f9cd332c1b75

  • SSDEEP

    49152:17+4rYIA6+ngCDnW9GWuGUgs9E73Up0M+4A9IaC+T43x0bC+Q7HmlciT8urEdCc:s4RA6+nBbNgs97KbCl7HH0Ex

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3188
      • C:\Users\Admin\AppData\Local\Temp\f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe
        "C:\Users\Admin\AppData\Local\Temp\f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:5004
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aED6D.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1852
          • C:\Users\Admin\AppData\Local\Temp\f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe
            "C:\Users\Admin\AppData\Local\Temp\f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe"
            4⤵
            • Executes dropped EXE
            PID:3912
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3748
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4824
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1148

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        e9325483409732a224d105e072546fa8

        SHA1

        d23d39592deace449a7bf98427525d34b106b444

        SHA256

        116a778a061a28cd9dd0d3c028fb8982daa3e3ca84e6f33b56f13bc4fa3c1a78

        SHA512

        836d9b24a28b54f734c6d7e9bbb56f301db8a991a53310f9dffd620f76bf798ef1aa8f362b6cd330ec9c146095b6410f9cb174ff54f7b58322f1abd82818db59

      • C:\Program Files\InitializeJoin.exe

        Filesize

        770KB

        MD5

        9632e12ca719a974fd6c6be22f8cde45

        SHA1

        cddd3f3efb871110697a6c93baaa16dd0a864256

        SHA256

        dd1b7e4009cbcf3fc15eb05d805207d60048ca0c4f020b94ca76307f09a4af7e

        SHA512

        af0c630a9ba80322961ec8b147dfb120aa611788ce8678f85f963cb20e83280d120ec70945dba5e71a6dcd4e4a26b49467954dbb6ca6dd5f036ddb226eba153f

      • C:\Users\Admin\AppData\Local\Temp\$$aED6D.bat

        Filesize

        722B

        MD5

        5044f8aef2578e0bb42ee4044979af5b

        SHA1

        392127c1578788c291dca7905394642b4b8c7502

        SHA256

        6964209cf8a8908a8a3052a96b28707998bef357f232991b54a2cbd33dfb23a7

        SHA512

        1b8ca9660a014b4f1ede30815088b77b9dc38dd3eaa26508e985a7e914185d591c0bdffd5ee704970f25375e87f131e230e55fb0f8e5dd4e088d6b4e40a4c2f4

      • C:\Users\Admin\AppData\Local\Temp\f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe

        Filesize

        2.9MB

        MD5

        4ef9d5d47419e609f1720bc59ff64afd

        SHA1

        4420ab1d3b2a1eeae0ed382f352759c0d62d3220

        SHA256

        d42760aeaf5d938b7be942507c19309859c8653c102cca7fe1c235bdea28c43d

        SHA512

        3f7a383f08d9c38debbc5eabcd0994915594f65b1d09fb12b01f99e98b9e964742e6a53c40278de84426f6a52b9d42c8fb5a4ea633e8f5ca904b29884ef96bdb

      • C:\Users\Admin\AppData\Local\Temp\f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe.exe

        Filesize

        2.9MB

        MD5

        4ef9d5d47419e609f1720bc59ff64afd

        SHA1

        4420ab1d3b2a1eeae0ed382f352759c0d62d3220

        SHA256

        d42760aeaf5d938b7be942507c19309859c8653c102cca7fe1c235bdea28c43d

        SHA512

        3f7a383f08d9c38debbc5eabcd0994915594f65b1d09fb12b01f99e98b9e964742e6a53c40278de84426f6a52b9d42c8fb5a4ea633e8f5ca904b29884ef96bdb

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8922a4ac9c38bcb52124f9efe7e77593

        SHA1

        d3ed9dd3a8326e982d90926ced067b1a4bb5a663

        SHA256

        fece29ead615f8a7a4a13a36b8415c0fa517cc62954b77ca0c7dedb13a20a0d6

        SHA512

        2e17a7c3247b5c38f89b8cb9b502bd92bbb50966662479e9fd476c207e2e1678d394fc3bb9fd3e06e2b83e9b05a83def8a0539fedeb1842f38f0cdcd01363c5c

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8922a4ac9c38bcb52124f9efe7e77593

        SHA1

        d3ed9dd3a8326e982d90926ced067b1a4bb5a663

        SHA256

        fece29ead615f8a7a4a13a36b8415c0fa517cc62954b77ca0c7dedb13a20a0d6

        SHA512

        2e17a7c3247b5c38f89b8cb9b502bd92bbb50966662479e9fd476c207e2e1678d394fc3bb9fd3e06e2b83e9b05a83def8a0539fedeb1842f38f0cdcd01363c5c

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        8922a4ac9c38bcb52124f9efe7e77593

        SHA1

        d3ed9dd3a8326e982d90926ced067b1a4bb5a663

        SHA256

        fece29ead615f8a7a4a13a36b8415c0fa517cc62954b77ca0c7dedb13a20a0d6

        SHA512

        2e17a7c3247b5c38f89b8cb9b502bd92bbb50966662479e9fd476c207e2e1678d394fc3bb9fd3e06e2b83e9b05a83def8a0539fedeb1842f38f0cdcd01363c5c

      • F:\$RECYCLE.BIN\S-1-5-21-2231940048-779848787-2990559741-1000\_desktop.ini

        Filesize

        9B

        MD5

        a496dc6e67a7c97fe6b5f93f052c5de1

        SHA1

        91d1cbd786e4ca543f5d364b42273efd1be384c5

        SHA256

        f656a696c47b2c37afecab6674210ad082849577f4763b778f81ca947bef3e63

        SHA512

        850c4fe29e0fa3388cb06d91a85330c1ac5eed337d23d2b6ee3d74142941dba27a49485ecf4a8cc73800c8c22d207b6586447ee3b20443f9a0e355614a6a1cb2

      • memory/3748-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3748-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3748-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3748-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3748-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3748-10-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3748-1086-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3748-2163-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3748-4638-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5004-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5004-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB