Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2023, 13:01

General

  • Target

    e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01.exe

  • Size

    176KB

  • MD5

    55496cfbc533467f4dcea66ed3ab6ccf

  • SHA1

    706b661d1548518f95249f56281b23655e08779c

  • SHA256

    e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01

  • SHA512

    37e453ff8d989452bb9019e75d0d1aecc049568cf1fe31d195b3532ac9f8515fe4c146af3c7707fe1a77602cb555cca71722d3d4af6c48e5fd899f34debf862a

  • SSDEEP

    3072:UNftffjmNoI+WxTv7F7xZIuju/gRqynUsV+bkvEQu:UdVfjmNXv7F7xalnbw

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 556
    1⤵
    • Loads dropped DLL
    • Program crash
    PID:1728
  • C:\Windows\SysWOW64\net1.exe
    C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
    1⤵
      PID:2704
    • C:\Users\Admin\AppData\Local\Temp\e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01.exe
      "C:\Users\Admin\AppData\Local\Temp\e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2740
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2812
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      1⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1908
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\$$a43D4.bat
      1⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2680
    • C:\Users\Admin\AppData\Local\Temp\e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01.exe
      "C:\Users\Admin\AppData\Local\Temp\e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01.exe"
      1⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2140
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1328

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              10e927db6aae50e89fcb4d441d9e27e1

              SHA1

              6a2250c03aba8fe7a9c388742db5ac4e473fa178

              SHA256

              a68e60f5bc35fdb50525110f44ad636498278629d38a3854369e9a93ed70ee19

              SHA512

              1d6c8b2d48403d037fc31ffeee690ca956ed8595671e1400c8dad69347ac0749d94498b00feec325575d98d300c0694d0083ca7e2e72a124ff45e9f74dd09227

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              4cfdb20b04aa239d6f9e83084d5d0a77

              SHA1

              f22863e04cc1fd4435f785993ede165bd8245ac6

              SHA256

              30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

              SHA512

              35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

            • C:\Users\Admin\AppData\Local\Temp\$$a43D4.bat

              Filesize

              722B

              MD5

              4752acebdc0247c43db54b031bf194f7

              SHA1

              4399e2d70730a686f222c77cd6d165619f0be630

              SHA256

              f9093785997a49c69526a8367be96b2a405fad1a14dce38ff8dd0c2e959efb5e

              SHA512

              c587e8a1423d51aaaf748c1431f2acd6a334b6e507118fdbcda05028815c001ed9d4a9a4fb92020cd59971d0d681583719e3c6686fec1688e1918a303492ce41

            • C:\Users\Admin\AppData\Local\Temp\$$a43D4.bat

              Filesize

              722B

              MD5

              4752acebdc0247c43db54b031bf194f7

              SHA1

              4399e2d70730a686f222c77cd6d165619f0be630

              SHA256

              f9093785997a49c69526a8367be96b2a405fad1a14dce38ff8dd0c2e959efb5e

              SHA512

              c587e8a1423d51aaaf748c1431f2acd6a334b6e507118fdbcda05028815c001ed9d4a9a4fb92020cd59971d0d681583719e3c6686fec1688e1918a303492ce41

            • C:\Users\Admin\AppData\Local\Temp\e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01.exe

              Filesize

              150KB

              MD5

              578f50a57a10e4c19316a43afcb0856e

              SHA1

              2ce86a04eeb040fe09f06456924965ed78520f50

              SHA256

              07a6187c69913a0058887e3e67f7ab317bcca9db5a6da171f40208000c7b76f7

              SHA512

              7bd1f02d5e8ddcef331fe47a491c1fce2daced6d11d980a6a95618a45a10f0ccadaf4eda9e6f5117e6d0476894cda25d5a35b00e58823038158e308e0f8b638f

            • C:\Users\Admin\AppData\Local\Temp\e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01.exe.exe

              Filesize

              150KB

              MD5

              578f50a57a10e4c19316a43afcb0856e

              SHA1

              2ce86a04eeb040fe09f06456924965ed78520f50

              SHA256

              07a6187c69913a0058887e3e67f7ab317bcca9db5a6da171f40208000c7b76f7

              SHA512

              7bd1f02d5e8ddcef331fe47a491c1fce2daced6d11d980a6a95618a45a10f0ccadaf4eda9e6f5117e6d0476894cda25d5a35b00e58823038158e308e0f8b638f

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              e7093a12cfd837f03fc2aa86eaa886ba

              SHA1

              bfeb2bd83d5d07adb9e0df6d23177660982f884d

              SHA256

              9ce4f790a3ad9cb93ba0b875d0888db7e560fbbbceb022a1624252a26dde4db2

              SHA512

              8ff9f31ff0e19431aec46a5ba04387ea145f42d4480911f5ea07deb9e8e48b6ce631d919746fa7446568a3a5e56c23a92f1e632379580cd286e7bdcc04350f55

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              e7093a12cfd837f03fc2aa86eaa886ba

              SHA1

              bfeb2bd83d5d07adb9e0df6d23177660982f884d

              SHA256

              9ce4f790a3ad9cb93ba0b875d0888db7e560fbbbceb022a1624252a26dde4db2

              SHA512

              8ff9f31ff0e19431aec46a5ba04387ea145f42d4480911f5ea07deb9e8e48b6ce631d919746fa7446568a3a5e56c23a92f1e632379580cd286e7bdcc04350f55

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              e7093a12cfd837f03fc2aa86eaa886ba

              SHA1

              bfeb2bd83d5d07adb9e0df6d23177660982f884d

              SHA256

              9ce4f790a3ad9cb93ba0b875d0888db7e560fbbbceb022a1624252a26dde4db2

              SHA512

              8ff9f31ff0e19431aec46a5ba04387ea145f42d4480911f5ea07deb9e8e48b6ce631d919746fa7446568a3a5e56c23a92f1e632379580cd286e7bdcc04350f55

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              e7093a12cfd837f03fc2aa86eaa886ba

              SHA1

              bfeb2bd83d5d07adb9e0df6d23177660982f884d

              SHA256

              9ce4f790a3ad9cb93ba0b875d0888db7e560fbbbceb022a1624252a26dde4db2

              SHA512

              8ff9f31ff0e19431aec46a5ba04387ea145f42d4480911f5ea07deb9e8e48b6ce631d919746fa7446568a3a5e56c23a92f1e632379580cd286e7bdcc04350f55

            • F:\$RECYCLE.BIN\S-1-5-21-2952504676-3105837840-1406404655-1000\_desktop.ini

              Filesize

              9B

              MD5

              6e65261356966c380b6d0f666601373d

              SHA1

              32e89117530cec202f023f9b1baf357d39ea51f5

              SHA256

              6ddad334aa359298e28f0f8f79feb928940367e1c95b4a74b73736ec81e7d2b5

              SHA512

              a9f2dff591a56eacbc7e8bb8a0bf0772dc4428c952fc6551be55bddbc3f35be043e5b46fb834e0484266ef11de170970bd8664580140bd5b933f356d67dd7ba6

            • \Users\Admin\AppData\Local\Temp\e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01.exe

              Filesize

              150KB

              MD5

              578f50a57a10e4c19316a43afcb0856e

              SHA1

              2ce86a04eeb040fe09f06456924965ed78520f50

              SHA256

              07a6187c69913a0058887e3e67f7ab317bcca9db5a6da171f40208000c7b76f7

              SHA512

              7bd1f02d5e8ddcef331fe47a491c1fce2daced6d11d980a6a95618a45a10f0ccadaf4eda9e6f5117e6d0476894cda25d5a35b00e58823038158e308e0f8b638f

            • \Users\Admin\AppData\Local\Temp\e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01.exe

              Filesize

              150KB

              MD5

              578f50a57a10e4c19316a43afcb0856e

              SHA1

              2ce86a04eeb040fe09f06456924965ed78520f50

              SHA256

              07a6187c69913a0058887e3e67f7ab317bcca9db5a6da171f40208000c7b76f7

              SHA512

              7bd1f02d5e8ddcef331fe47a491c1fce2daced6d11d980a6a95618a45a10f0ccadaf4eda9e6f5117e6d0476894cda25d5a35b00e58823038158e308e0f8b638f

            • \Users\Admin\AppData\Local\Temp\e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01.exe

              Filesize

              150KB

              MD5

              578f50a57a10e4c19316a43afcb0856e

              SHA1

              2ce86a04eeb040fe09f06456924965ed78520f50

              SHA256

              07a6187c69913a0058887e3e67f7ab317bcca9db5a6da171f40208000c7b76f7

              SHA512

              7bd1f02d5e8ddcef331fe47a491c1fce2daced6d11d980a6a95618a45a10f0ccadaf4eda9e6f5117e6d0476894cda25d5a35b00e58823038158e308e0f8b638f

            • \Users\Admin\AppData\Local\Temp\e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01.exe

              Filesize

              150KB

              MD5

              578f50a57a10e4c19316a43afcb0856e

              SHA1

              2ce86a04eeb040fe09f06456924965ed78520f50

              SHA256

              07a6187c69913a0058887e3e67f7ab317bcca9db5a6da171f40208000c7b76f7

              SHA512

              7bd1f02d5e8ddcef331fe47a491c1fce2daced6d11d980a6a95618a45a10f0ccadaf4eda9e6f5117e6d0476894cda25d5a35b00e58823038158e308e0f8b638f

            • \Users\Admin\AppData\Local\Temp\e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01.exe

              Filesize

              150KB

              MD5

              578f50a57a10e4c19316a43afcb0856e

              SHA1

              2ce86a04eeb040fe09f06456924965ed78520f50

              SHA256

              07a6187c69913a0058887e3e67f7ab317bcca9db5a6da171f40208000c7b76f7

              SHA512

              7bd1f02d5e8ddcef331fe47a491c1fce2daced6d11d980a6a95618a45a10f0ccadaf4eda9e6f5117e6d0476894cda25d5a35b00e58823038158e308e0f8b638f

            • \Users\Admin\AppData\Local\Temp\e5576457e968333cd4973c87afce4c1fcde7b56b3e69a28c4dc32653bff1aa01.exe

              Filesize

              150KB

              MD5

              578f50a57a10e4c19316a43afcb0856e

              SHA1

              2ce86a04eeb040fe09f06456924965ed78520f50

              SHA256

              07a6187c69913a0058887e3e67f7ab317bcca9db5a6da171f40208000c7b76f7

              SHA512

              7bd1f02d5e8ddcef331fe47a491c1fce2daced6d11d980a6a95618a45a10f0ccadaf4eda9e6f5117e6d0476894cda25d5a35b00e58823038158e308e0f8b638f

            • memory/1328-37-0x0000000003B20000-0x0000000003B21000-memory.dmp

              Filesize

              4KB

            • memory/1908-3319-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1908-22-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1908-1859-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1908-55-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1908-106-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1908-39-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1908-100-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1908-48-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2140-16-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2140-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2140-12-0x00000000003C0000-0x00000000003F4000-memory.dmp

              Filesize

              208KB

            • memory/2140-17-0x00000000003C0000-0x00000000003F4000-memory.dmp

              Filesize

              208KB

            • memory/2740-41-0x0000000073DD0000-0x00000000744BE000-memory.dmp

              Filesize

              6.9MB

            • memory/2740-30-0x0000000073DD0000-0x00000000744BE000-memory.dmp

              Filesize

              6.9MB

            • memory/2740-29-0x0000000000EA0000-0x0000000000ECC000-memory.dmp

              Filesize

              176KB