Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2023 15:52

General

  • Target

    3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe

  • Size

    203KB

  • MD5

    bd301c11fa85dca192e868fcc640351b

  • SHA1

    29bbb52634027378cc92382508c7bcb07f17fb03

  • SHA256

    3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888

  • SHA512

    f691ee9a80495cb1739a77b0b47d8d6a63068b15d7e93a8c073076f62056f1f2ecc451c849e1b10708f7d39fcf9ea765c0e6f7ea5ed4af53bc9839ff265c3362

  • SSDEEP

    3072:wsftffjmNrZgxhlhGeJJrJsQ+qHcNL6LyZI6nQpL4jRXFiOkg3kLcm5LUlJ9t:3VfjmNefnCM9yZVnQpLuNEbLc0UL9t

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1328
      • C:\Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe
        "C:\Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aA998.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1688
          • C:\Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe
            "C:\Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe"
            4⤵
            • Executes dropped EXE
            PID:2572
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2064
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1992
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2068

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        3663c1381766ef643154f7248cee081a

        SHA1

        d3391539358af56ef7ac65a5b87886e45e9bc42c

        SHA256

        0471b2b82fb08307f138b69649e69dd51864d5650e13d0dafe67d37d91288c29

        SHA512

        c3ed0a5d8b9eaa02efd030d4191849f5aa999e1585a47af66e8497ab494141488e97ca39289b412919f33faf78016c4e875522232c8f67bde995d968ecc7f6f7

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$aA998.bat

        Filesize

        722B

        MD5

        3bb53b8f057008ca3b4cd93febb21de4

        SHA1

        6ce5410c60b7dfdba3e9966b84e1250410a83330

        SHA256

        d3abb5a9ff11d9d82e5a4a5752b3a479663dca10b8cef1e321abd41d766e0166

        SHA512

        d44a69b2cd53a65a2142b4d74c0420e7fa3a3abf2e6d5598e0ce41a7faa2d421320ad772a1c5a9bf23296bf7eb82ee9e719def750e333a2da49cb9209d7566de

      • C:\Users\Admin\AppData\Local\Temp\$$aA998.bat

        Filesize

        722B

        MD5

        3bb53b8f057008ca3b4cd93febb21de4

        SHA1

        6ce5410c60b7dfdba3e9966b84e1250410a83330

        SHA256

        d3abb5a9ff11d9d82e5a4a5752b3a479663dca10b8cef1e321abd41d766e0166

        SHA512

        d44a69b2cd53a65a2142b4d74c0420e7fa3a3abf2e6d5598e0ce41a7faa2d421320ad772a1c5a9bf23296bf7eb82ee9e719def750e333a2da49cb9209d7566de

      • C:\Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe

        Filesize

        177KB

        MD5

        38ced7c7dca88182d3d8e02aaa889338

        SHA1

        c702b28c7b267d6034cd06ebfc2e7b10b6700aa9

        SHA256

        8b8bfe9d542b109edd6418d5679187abc1074e0c0f090c7ada0c608ce868d353

        SHA512

        473ccf1f9b3265c192384140a48bef06a65105ab1f7d63a274a0e06487aea477206514bce1258a3bd0b74329dd2b678c71028d6eee166a1a497dd42deaabf70d

      • C:\Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe.exe

        Filesize

        177KB

        MD5

        38ced7c7dca88182d3d8e02aaa889338

        SHA1

        c702b28c7b267d6034cd06ebfc2e7b10b6700aa9

        SHA256

        8b8bfe9d542b109edd6418d5679187abc1074e0c0f090c7ada0c608ce868d353

        SHA512

        473ccf1f9b3265c192384140a48bef06a65105ab1f7d63a274a0e06487aea477206514bce1258a3bd0b74329dd2b678c71028d6eee166a1a497dd42deaabf70d

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        4f6b7b7dd1e90f9968e5197d34085d7c

        SHA1

        e49e73e61aede77f897b3be38716b22a9ed86e37

        SHA256

        c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

        SHA512

        4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        4f6b7b7dd1e90f9968e5197d34085d7c

        SHA1

        e49e73e61aede77f897b3be38716b22a9ed86e37

        SHA256

        c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

        SHA512

        4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        4f6b7b7dd1e90f9968e5197d34085d7c

        SHA1

        e49e73e61aede77f897b3be38716b22a9ed86e37

        SHA256

        c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

        SHA512

        4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        4f6b7b7dd1e90f9968e5197d34085d7c

        SHA1

        e49e73e61aede77f897b3be38716b22a9ed86e37

        SHA256

        c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

        SHA512

        4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

      • F:\$RECYCLE.BIN\S-1-5-21-2085049433-1067986815-1244098655-1000\_desktop.ini

        Filesize

        9B

        MD5

        a496dc6e67a7c97fe6b5f93f052c5de1

        SHA1

        91d1cbd786e4ca543f5d364b42273efd1be384c5

        SHA256

        f656a696c47b2c37afecab6674210ad082849577f4763b778f81ca947bef3e63

        SHA512

        850c4fe29e0fa3388cb06d91a85330c1ac5eed337d23d2b6ee3d74142941dba27a49485ecf4a8cc73800c8c22d207b6586447ee3b20443f9a0e355614a6a1cb2

      • \Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe

        Filesize

        177KB

        MD5

        38ced7c7dca88182d3d8e02aaa889338

        SHA1

        c702b28c7b267d6034cd06ebfc2e7b10b6700aa9

        SHA256

        8b8bfe9d542b109edd6418d5679187abc1074e0c0f090c7ada0c608ce868d353

        SHA512

        473ccf1f9b3265c192384140a48bef06a65105ab1f7d63a274a0e06487aea477206514bce1258a3bd0b74329dd2b678c71028d6eee166a1a497dd42deaabf70d

      • memory/1328-29-0x00000000029F0000-0x00000000029F1000-memory.dmp

        Filesize

        4KB

      • memory/2064-91-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2064-31-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2064-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2064-44-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2064-97-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2064-176-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2064-1849-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2064-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2064-3309-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2116-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2116-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2116-16-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB