Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2023, 01:37

General

  • Target

    c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe

  • Size

    1.2MB

  • MD5

    a1829110860f61b6d11844ae271343c9

  • SHA1

    bafb93ed4c34bfba05f4ead0f2f2376cf00e11be

  • SHA256

    c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6

  • SHA512

    40507b9de94649b08645b7076b5d98a635e5cdb3ed60e6f77c5b1a2838492f72aa6520fa63070746172d1f9b4e85a9d0ca66e797ce6421bb9d5bdf2d35550298

  • SSDEEP

    12288:fAPmhGLC+kPitN8Rju56BEdKSfQQeX6T6c73kFZEHZl0m9oKMA+nkb/8gJmkLcQ:fnBviuK5iEdKqQQRTkcb9v/8gJmOb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3148
      • C:\Users\Admin\AppData\Local\Temp\c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe
        "C:\Users\Admin\AppData\Local\Temp\c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA78A.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5076
          • C:\Users\Admin\AppData\Local\Temp\c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe
            "C:\Users\Admin\AppData\Local\Temp\c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe"
            4⤵
            • Executes dropped EXE
            PID:2560
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3752
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4132
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4320

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        568f17750238ab463c745953a303648a

        SHA1

        25e9de37d6edb52c584c442e4f93a0448b4b37d4

        SHA256

        5351b82387339c78b116a077f2ba633da2a6fef86a165d92bfe28c2c3770ac81

        SHA512

        9034bc060e8155e07009d2142830f03b29c50525232fa1719038eae4fc742d460c5dad7b7fdd6957264c338072fbe71193a23d994510dc809ae240023b9f1ed3

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        487KB

        MD5

        bf1bbfb3abc86e299017bcb5474595bf

        SHA1

        def80689c4abc742c6dcf47e68f362ec0efd1681

        SHA256

        a89f39f3f9ac3f8397818e9052f9c8cc2a74810b5c7cb6c313f4c91c898a7236

        SHA512

        063e46c0c3898e51c5ce35c67a079e9431ef356a8c4d532b9e8a5e8f4b4c2224fc067b5b40a3d3cebc3933345d45e93ea59782d8b887a41d1d1c7881bb00bd97

      • C:\Users\Admin\AppData\Local\Temp\$$aA78A.bat

        Filesize

        722B

        MD5

        ecc41eba41693349c0c9e21b488071e7

        SHA1

        64d89cbcd1efe48b73ce3db5a342facc342593f2

        SHA256

        555bdb056a14f36abed573e73510f62f383bb336b671ce5fcb2d0dcacf93282f

        SHA512

        3e5b1dfd814d18e84843114c8b69e64df8119103c1730d5b81169b86b6d048d588a7af3d130fa99dccadcaa574b42f3d6aa92649cb89e8e86a50632113da3ac5

      • C:\Users\Admin\AppData\Local\Temp\c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe

        Filesize

        1.2MB

        MD5

        6533cf0a67dfd46e6dba1d32ec59692f

        SHA1

        317b5e6ceef606ffc7d8577a7f65d5e6033fbcf4

        SHA256

        bc1eee308d746abe96701730f75b182438575209b7569a67323c5e837ceae2d2

        SHA512

        2a2ac1e7c91b0a37c5120ac157e75f202ac4cf048adf2d92ad70f198637bd0f15988a4b9f215d714c5b5643cd08278e57988d5594b6f2ae7e24e99b370fbd3be

      • C:\Users\Admin\AppData\Local\Temp\c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe.exe

        Filesize

        1.2MB

        MD5

        6533cf0a67dfd46e6dba1d32ec59692f

        SHA1

        317b5e6ceef606ffc7d8577a7f65d5e6033fbcf4

        SHA256

        bc1eee308d746abe96701730f75b182438575209b7569a67323c5e837ceae2d2

        SHA512

        2a2ac1e7c91b0a37c5120ac157e75f202ac4cf048adf2d92ad70f198637bd0f15988a4b9f215d714c5b5643cd08278e57988d5594b6f2ae7e24e99b370fbd3be

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        886eb3bf6157b45d4a041e1e32608c70

        SHA1

        f476a007366ac0349789b0e803ec46be523f457a

        SHA256

        a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b

        SHA512

        6e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        886eb3bf6157b45d4a041e1e32608c70

        SHA1

        f476a007366ac0349789b0e803ec46be523f457a

        SHA256

        a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b

        SHA512

        6e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        886eb3bf6157b45d4a041e1e32608c70

        SHA1

        f476a007366ac0349789b0e803ec46be523f457a

        SHA256

        a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b

        SHA512

        6e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca

      • F:\$RECYCLE.BIN\S-1-5-21-3350690463-3549324357-1323838019-1000\_desktop.ini

        Filesize

        9B

        MD5

        6e65261356966c380b6d0f666601373d

        SHA1

        32e89117530cec202f023f9b1baf357d39ea51f5

        SHA256

        6ddad334aa359298e28f0f8f79feb928940367e1c95b4a74b73736ec81e7d2b5

        SHA512

        a9f2dff591a56eacbc7e8bb8a0bf0772dc4428c952fc6551be55bddbc3f35be043e5b46fb834e0484266ef11de170970bd8664580140bd5b933f356d67dd7ba6

      • memory/3752-41-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3752-19-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3752-26-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3752-32-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3752-37-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3752-306-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3752-1084-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3752-3784-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3752-8-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3752-4647-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4516-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4516-10-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB