Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    04-11-2023 11:44

General

  • Target

    d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe

  • Size

    79KB

  • MD5

    31e4e02d3c2f02437a484adef87423eb

  • SHA1

    75142bce6720b83c075c3b6998d1b25843424023

  • SHA256

    d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac

  • SHA512

    6b80852107f85b2c9ad9a8abc78f24d260cc2c9edcec8b2015b97a05b40d3efd1112ed5fb3668c0ab6d673867bec07ace130943966037c8a7ff940974eb04841

  • SSDEEP

    768:21ODKAaDMG8H92RwZNQSwcfymNBg+g61GoZwcmYDVZjMJwXl0gF1ytpnLMd:wfgLdQAQfcfymNVDXMJM0I6pnLMd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1372
      • C:\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe
        "C:\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a4B24.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1488
          • C:\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe
            "C:\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe"
            4⤵
            • Executes dropped EXE
            PID:2716
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1716
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2116
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2860

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        548ddcade423bdb543717d8073ac88d5

        SHA1

        0210f769b1b16ae5e569e65e20fafbd12f2d0e04

        SHA256

        052524488f71bf143183bbf817657f609e226b2830071e8dea7fcede4c0ec052

        SHA512

        8576336e7eb0b1132dc5c4eef772ba5f9b57844173f17d9c5cf1fbb09afa443313a1675fcd03e028c592ecc59d0f52ea44529c58f721ccfc2bc958ae292bb0b0

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        99ea9b604a7a734d3087fa6159684c42

        SHA1

        709fa1068ad4d560fe03e05b68056f1b0bedbfc8

        SHA256

        3f733f9e6fec7c4165ca8ba41eb23f604a248babe794c4ad2c6c3ce8032aab1c

        SHA512

        7af8008c7e187f925c62efc97e1891a7a38d089302dba39fbde137fb895e0592847ed0982c824c2075be8e6b95b6ce165ecb848ab85adf53779ebef613410fbb

      • C:\Users\Admin\AppData\Local\Temp\$$a4B24.bat

        Filesize

        722B

        MD5

        2efee963ce4726016b8b7fbf6ec19ea7

        SHA1

        ee07039b9eec895b19a44aee4a53eb4f28ec9e9c

        SHA256

        0bbc692e953af494da511a06270b08379807054db45e8e55111fa6937b07d827

        SHA512

        89dac58ec3075a5b45d53429b04a483676d63360e39d92356e7284a9aa7d2053de2ab4f97c5ac8d969f9beb1a03308b03da59c15f8f715e7f01d91cdf4d7ecc2

      • C:\Users\Admin\AppData\Local\Temp\$$a4B24.bat

        Filesize

        722B

        MD5

        2efee963ce4726016b8b7fbf6ec19ea7

        SHA1

        ee07039b9eec895b19a44aee4a53eb4f28ec9e9c

        SHA256

        0bbc692e953af494da511a06270b08379807054db45e8e55111fa6937b07d827

        SHA512

        89dac58ec3075a5b45d53429b04a483676d63360e39d92356e7284a9aa7d2053de2ab4f97c5ac8d969f9beb1a03308b03da59c15f8f715e7f01d91cdf4d7ecc2

      • C:\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe

        Filesize

        53KB

        MD5

        fa4ccade686d9a4a3620ec3333e5fa1f

        SHA1

        86e7398ebd92c145772e0812a451fc169e7fb79a

        SHA256

        86d41b076ce41684d141c16d617015dc099c20a9c774c340def1ecfaa46a1bef

        SHA512

        c4ea61e6cc98d2e95fdb0c38a47c324e693f54b0856460e8f1194c340677d291bd7765baab3759c928ec6e34d6809a546d619fad08edd8bf2dac8d88c2d3ea92

      • C:\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe.exe

        Filesize

        53KB

        MD5

        fa4ccade686d9a4a3620ec3333e5fa1f

        SHA1

        86e7398ebd92c145772e0812a451fc169e7fb79a

        SHA256

        86d41b076ce41684d141c16d617015dc099c20a9c774c340def1ecfaa46a1bef

        SHA512

        c4ea61e6cc98d2e95fdb0c38a47c324e693f54b0856460e8f1194c340677d291bd7765baab3759c928ec6e34d6809a546d619fad08edd8bf2dac8d88c2d3ea92

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        bf432bacde0b936f7fd20c466ec0bfc9

        SHA1

        aff70b2cb9c409e3b63e7fc33f132441edad86db

        SHA256

        5d2e80c8e42ad3cf43ca754fb4597753ec8d80fc7d027e11f43536dd2f88d39e

        SHA512

        c134428f8da55038acf63eaae12357060574e2f062befc57c6a69c6833ab10a4eb08c6f36cd6433de1538f2b5b09ef8bb74acb8235856a5aac024914165c1a1a

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        bf432bacde0b936f7fd20c466ec0bfc9

        SHA1

        aff70b2cb9c409e3b63e7fc33f132441edad86db

        SHA256

        5d2e80c8e42ad3cf43ca754fb4597753ec8d80fc7d027e11f43536dd2f88d39e

        SHA512

        c134428f8da55038acf63eaae12357060574e2f062befc57c6a69c6833ab10a4eb08c6f36cd6433de1538f2b5b09ef8bb74acb8235856a5aac024914165c1a1a

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        bf432bacde0b936f7fd20c466ec0bfc9

        SHA1

        aff70b2cb9c409e3b63e7fc33f132441edad86db

        SHA256

        5d2e80c8e42ad3cf43ca754fb4597753ec8d80fc7d027e11f43536dd2f88d39e

        SHA512

        c134428f8da55038acf63eaae12357060574e2f062befc57c6a69c6833ab10a4eb08c6f36cd6433de1538f2b5b09ef8bb74acb8235856a5aac024914165c1a1a

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        bf432bacde0b936f7fd20c466ec0bfc9

        SHA1

        aff70b2cb9c409e3b63e7fc33f132441edad86db

        SHA256

        5d2e80c8e42ad3cf43ca754fb4597753ec8d80fc7d027e11f43536dd2f88d39e

        SHA512

        c134428f8da55038acf63eaae12357060574e2f062befc57c6a69c6833ab10a4eb08c6f36cd6433de1538f2b5b09ef8bb74acb8235856a5aac024914165c1a1a

      • F:\$RECYCLE.BIN\S-1-5-21-2952504676-3105837840-1406404655-1000\_desktop.ini

        Filesize

        9B

        MD5

        6029ce528adbc1284163cdd2b27a082e

        SHA1

        a2f23e1d5101c3b6929686a2d5711c2af2dec1b7

        SHA256

        5036deecfbb090aa7f7c21c159b1921df0cf23eedafb7e0c208668ad82872dae

        SHA512

        a661e939e69a59f88fd86fa654371ba4b3e3e8faf5c1b39bdaa0def8b277b26b63e96d4f5eb047ca3d8888597165dc709f395eeaf333c25c9cf56441c31dd676

      • \Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe

        Filesize

        53KB

        MD5

        fa4ccade686d9a4a3620ec3333e5fa1f

        SHA1

        86e7398ebd92c145772e0812a451fc169e7fb79a

        SHA256

        86d41b076ce41684d141c16d617015dc099c20a9c774c340def1ecfaa46a1bef

        SHA512

        c4ea61e6cc98d2e95fdb0c38a47c324e693f54b0856460e8f1194c340677d291bd7765baab3759c928ec6e34d6809a546d619fad08edd8bf2dac8d88c2d3ea92

      • \Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe

        Filesize

        53KB

        MD5

        fa4ccade686d9a4a3620ec3333e5fa1f

        SHA1

        86e7398ebd92c145772e0812a451fc169e7fb79a

        SHA256

        86d41b076ce41684d141c16d617015dc099c20a9c774c340def1ecfaa46a1bef

        SHA512

        c4ea61e6cc98d2e95fdb0c38a47c324e693f54b0856460e8f1194c340677d291bd7765baab3759c928ec6e34d6809a546d619fad08edd8bf2dac8d88c2d3ea92

      • memory/1372-32-0x0000000002600000-0x0000000002601000-memory.dmp

        Filesize

        4KB

      • memory/1488-27-0x0000000000130000-0x0000000000143000-memory.dmp

        Filesize

        76KB

      • memory/1716-51-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1716-192-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1716-36-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1716-3316-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1716-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1716-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1716-1856-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1716-98-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1716-99-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1716-104-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2016-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2016-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2016-12-0x0000000000260000-0x0000000000294000-memory.dmp

        Filesize

        208KB

      • memory/2716-30-0x0000000001000000-0x0000000001013000-memory.dmp

        Filesize

        76KB

      • memory/2716-37-0x0000000001000000-0x0000000001013000-memory.dmp

        Filesize

        76KB