Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2023, 06:36

General

  • Target

    59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe

  • Size

    43KB

  • MD5

    f90feee0b873e1cdbed2e9b808170c3a

  • SHA1

    978c4bd73f1374c5a1f993fbf6e585923656caef

  • SHA256

    59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392

  • SHA512

    14f41bb0f0b18945e10c90889e21c8141534fa0db9c30229a76d26f224198a70b8e5620879664e4324d92f9fe1a4de8ae00271c4366835080097e5e69cd57874

  • SSDEEP

    768:j1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLPxNIqhKDJUoKeALWUbCO75:5fgLdQAQfcfymNjIqhUAaQCO75

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3148
      • C:\Users\Admin\AppData\Local\Temp\59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe
        "C:\Users\Admin\AppData\Local\Temp\59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA604.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4896
          • C:\Users\Admin\AppData\Local\Temp\59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe
            "C:\Users\Admin\AppData\Local\Temp\59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe"
            4⤵
            • Executes dropped EXE
            PID:2380
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:980
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1840
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:212

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        ca3cdb90057fbc3463681171313994e7

        SHA1

        873e1af9bae05748986406679622740c95b427dc

        SHA256

        6e71672c6558a66fe6b3cf6c48ce33b862798855811e12ea0cfe3fa1252b506b

        SHA512

        09d1bcc49f523669431e1caec3ce0d1ef1258f244e2c38c685f8eb0056b2e5ff11108b1e07b89fc4a1d3f64fb29292897d1c629ead8c7d8d29b3943fd61042ba

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        b5a2c3ef34234395cd83d3d04f9a965b

        SHA1

        4d05dbf8f44b4b4df946f513cb8c5eb7f40e7459

        SHA256

        3ba3e344fe4a69d7252bf3c7957e6017df662d52dc57150fa001e29d5e07b635

        SHA512

        13d9f695ca14ff60036e6a0ae35058f7422690cb2692aa7dfe53b46d010a5fc277a0dc49f98c6ff63f48c44bac7fec21384157e3c6ef6274b26cf27d96d354b8

      • C:\Users\Admin\AppData\Local\Temp\$$aA604.bat

        Filesize

        722B

        MD5

        ff6318ccbcec416094d563e2e38ef517

        SHA1

        7b6a748ce302bddf0711f6b3ea49b484da6c0d53

        SHA256

        fe1a7a0d43671ea23d211bfec5fbc2f27a237d3af7e3592a21bb647bb99a5036

        SHA512

        37864fbe2b0eda03b4aac0f37f608a8e75f40e8dc4e9e3f27f88ed839cf47b5747b46734f17a8e1f05bfd06cc232b89d41ae9d9cbd7a1fac7dde3ba43d78ceef

      • C:\Users\Admin\AppData\Local\Temp\59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe

        Filesize

        17KB

        MD5

        322e72c39d2b837fbd3ad8b095a74fe0

        SHA1

        1d8fc1765a534fcd927b5a7de4461a3ee2156560

        SHA256

        eec71c90e6bfc0e638449383f60728af490eecf3d4da04023857a984927b197e

        SHA512

        1cffb3ddb62165d4013b441baafb08a5dfef7febb8ac4527faeffe1126340c5acad95fce830d863571fcce1ca50020542968d953b4a12b10ac9e2399e3ae90f4

      • C:\Users\Admin\AppData\Local\Temp\59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe.exe

        Filesize

        17KB

        MD5

        322e72c39d2b837fbd3ad8b095a74fe0

        SHA1

        1d8fc1765a534fcd927b5a7de4461a3ee2156560

        SHA256

        eec71c90e6bfc0e638449383f60728af490eecf3d4da04023857a984927b197e

        SHA512

        1cffb3ddb62165d4013b441baafb08a5dfef7febb8ac4527faeffe1126340c5acad95fce830d863571fcce1ca50020542968d953b4a12b10ac9e2399e3ae90f4

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        5e7e06fbb6e21e6de73ca67cc4a63166

        SHA1

        0609802af5b07d9f1b794e4182f9d27ebc25c1bf

        SHA256

        bb953dd3a09c6f84b34b954897457f8f8cd93fb1219f7ca907cfd95ffc253e12

        SHA512

        561520e55562990019d205e26905183338988dea70008f394ec6159bc5c9c7885e8eae2881acdc01d50475610500ab2dac6c0f8a342cb98e0edb4a29fde904df

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        5e7e06fbb6e21e6de73ca67cc4a63166

        SHA1

        0609802af5b07d9f1b794e4182f9d27ebc25c1bf

        SHA256

        bb953dd3a09c6f84b34b954897457f8f8cd93fb1219f7ca907cfd95ffc253e12

        SHA512

        561520e55562990019d205e26905183338988dea70008f394ec6159bc5c9c7885e8eae2881acdc01d50475610500ab2dac6c0f8a342cb98e0edb4a29fde904df

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        5e7e06fbb6e21e6de73ca67cc4a63166

        SHA1

        0609802af5b07d9f1b794e4182f9d27ebc25c1bf

        SHA256

        bb953dd3a09c6f84b34b954897457f8f8cd93fb1219f7ca907cfd95ffc253e12

        SHA512

        561520e55562990019d205e26905183338988dea70008f394ec6159bc5c9c7885e8eae2881acdc01d50475610500ab2dac6c0f8a342cb98e0edb4a29fde904df

      • F:\$RECYCLE.BIN\S-1-5-21-3350690463-3549324357-1323838019-1000\_desktop.ini

        Filesize

        9B

        MD5

        6e65261356966c380b6d0f666601373d

        SHA1

        32e89117530cec202f023f9b1baf357d39ea51f5

        SHA256

        6ddad334aa359298e28f0f8f79feb928940367e1c95b4a74b73736ec81e7d2b5

        SHA512

        a9f2dff591a56eacbc7e8bb8a0bf0772dc4428c952fc6551be55bddbc3f35be043e5b46fb834e0484266ef11de170970bd8664580140bd5b933f356d67dd7ba6

      • memory/980-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/980-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/980-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/980-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/980-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/980-289-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/980-1084-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/980-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/980-4302-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/980-4647-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2592-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2592-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB