Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2023, 08:43

General

  • Target

    af27c19c785030d021a9329a0422a0a8b41f8134fdb10c8eb7486bb9be0b5d68.exe

  • Size

    131KB

  • MD5

    bd79e54b37f932e5b88070c30507e002

  • SHA1

    d3913c036a018a5de5d486264183c743f14762d4

  • SHA256

    af27c19c785030d021a9329a0422a0a8b41f8134fdb10c8eb7486bb9be0b5d68

  • SHA512

    bd376969cdc46082611fe4100c36b2ffbd4af20994749872684e5df2b8a6b7c9303511fd40cbcbc9074caad4984be5871a93dcc2a39393e66fd34e580ecc3a83

  • SSDEEP

    3072:mftffjmNOJVOeG6hEd+npAV5MsChLK0ieFBgJmEIdtt:eVfjmNI3thEMnSMsCRNX2Id

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3228
      • C:\Users\Admin\AppData\Local\Temp\af27c19c785030d021a9329a0422a0a8b41f8134fdb10c8eb7486bb9be0b5d68.exe
        "C:\Users\Admin\AppData\Local\Temp\af27c19c785030d021a9329a0422a0a8b41f8134fdb10c8eb7486bb9be0b5d68.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4468
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aAAC7.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3748
          • C:\Users\Admin\AppData\Local\Temp\af27c19c785030d021a9329a0422a0a8b41f8134fdb10c8eb7486bb9be0b5d68.exe
            "C:\Users\Admin\AppData\Local\Temp\af27c19c785030d021a9329a0422a0a8b41f8134fdb10c8eb7486bb9be0b5d68.exe"
            4⤵
            • Executes dropped EXE
            PID:2260
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3044
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1528
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2932

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        bf7e4b61d39d3925c669a0f2156ad123

        SHA1

        6954f62f6aafcb44362b92e19eb033a6dccb5ab2

        SHA256

        965cc2c3c356993bb5b10d149dff3cac10e39ddf29423fa5f8c665bee032ac79

        SHA512

        f639acbb21618dd1c3d8f9ec7ff27be131c092535befd6cb5d0f755bf96ce9dd4a888d89733a8ebfafe65c211bfdbf8e706a4b2189aa32d88c6aecb09d79bc87

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        c21109f0decfcea851b0f756323c046a

        SHA1

        296d3fc968e822aadb2d0fbb293ae1fa17b026c4

        SHA256

        6c932f2186586ac2b461de7afc569cd8f5999f6dcdddaf45ec7a14ee489d38de

        SHA512

        84d18342ec9a5d21c9dd928839b950d1bd96a4a48c475dd8fc3dc8920eda3a7a9b0486b582f68017046f0e108872321e8cfdbf224dfebbbbca9d1b0e933a102a

      • C:\Users\Admin\AppData\Local\Temp\$$aAAC7.bat

        Filesize

        722B

        MD5

        46a7728c682a93e0f5bc395ad253cfd2

        SHA1

        9953537077e7a38db600adb3ed8105e0cf5101e3

        SHA256

        2ce5159bd29754cb70b3084202d53099693bd366fae5ae3418c506ad4815eaec

        SHA512

        bf2ca50581ca9729aaeff5e2cf0f2e8602f488fd17b370ea95ff2652d77da0cf400764e2baac07114a4450d447840a0eca89e064749f5fb72d5926bc8246288a

      • C:\Users\Admin\AppData\Local\Temp\af27c19c785030d021a9329a0422a0a8b41f8134fdb10c8eb7486bb9be0b5d68.exe

        Filesize

        105KB

        MD5

        30bfe79cfe4817baa04b0558193e24f7

        SHA1

        e1ee6b9c35b17946e0c39e782fce40b4a02487e2

        SHA256

        6f93d0e37ba1ddb515e7df8dc315ee496ff0eb15cdb70313fbf200dc4632e638

        SHA512

        f893e0624e9c005c29cd0a17d4f452970c2739a292759a85b1393530424622a4d2cb82522ae844373242151ecc5c5befdb2932852d6b7f1387673046cbfa98e4

      • C:\Users\Admin\AppData\Local\Temp\af27c19c785030d021a9329a0422a0a8b41f8134fdb10c8eb7486bb9be0b5d68.exe.exe

        Filesize

        105KB

        MD5

        30bfe79cfe4817baa04b0558193e24f7

        SHA1

        e1ee6b9c35b17946e0c39e782fce40b4a02487e2

        SHA256

        6f93d0e37ba1ddb515e7df8dc315ee496ff0eb15cdb70313fbf200dc4632e638

        SHA512

        f893e0624e9c005c29cd0a17d4f452970c2739a292759a85b1393530424622a4d2cb82522ae844373242151ecc5c5befdb2932852d6b7f1387673046cbfa98e4

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c613472e5c0aa7138439d995c7d84f3b

        SHA1

        9fb62c669b3a21df401f65d4742eb3944a0d2f13

        SHA256

        ee3ae5795a3b0a404d6e0f6216cf2b026565cc8d1333757265452993551a9a2d

        SHA512

        84316ae763310e59f3145d19361758db1d14cd32820e88c2922c1ac81527e5cf7113356bdb5b4ae275253caaa9c047eecaa656c60badcc7ec9e8eaf8341fe6aa

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c613472e5c0aa7138439d995c7d84f3b

        SHA1

        9fb62c669b3a21df401f65d4742eb3944a0d2f13

        SHA256

        ee3ae5795a3b0a404d6e0f6216cf2b026565cc8d1333757265452993551a9a2d

        SHA512

        84316ae763310e59f3145d19361758db1d14cd32820e88c2922c1ac81527e5cf7113356bdb5b4ae275253caaa9c047eecaa656c60badcc7ec9e8eaf8341fe6aa

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        c613472e5c0aa7138439d995c7d84f3b

        SHA1

        9fb62c669b3a21df401f65d4742eb3944a0d2f13

        SHA256

        ee3ae5795a3b0a404d6e0f6216cf2b026565cc8d1333757265452993551a9a2d

        SHA512

        84316ae763310e59f3145d19361758db1d14cd32820e88c2922c1ac81527e5cf7113356bdb5b4ae275253caaa9c047eecaa656c60badcc7ec9e8eaf8341fe6aa

      • F:\$RECYCLE.BIN\S-1-5-21-3811856890-180006922-3689258494-1000\_desktop.ini

        Filesize

        9B

        MD5

        6e65261356966c380b6d0f666601373d

        SHA1

        32e89117530cec202f023f9b1baf357d39ea51f5

        SHA256

        6ddad334aa359298e28f0f8f79feb928940367e1c95b4a74b73736ec81e7d2b5

        SHA512

        a9f2dff591a56eacbc7e8bb8a0bf0772dc4428c952fc6551be55bddbc3f35be043e5b46fb834e0484266ef11de170970bd8664580140bd5b933f356d67dd7ba6

      • memory/2260-22-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/2260-18-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/3044-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3044-29-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3044-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3044-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3044-46-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3044-52-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3044-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3044-1096-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3044-1489-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3044-4662-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4468-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4468-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB