Analysis

  • max time kernel
    176s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2023, 20:48

General

  • Target

    f117b4e134f87a80d5a3a7d0089a4a810be7552156147553c8b17b6ebe3a0fe7.exe

  • Size

    2.8MB

  • MD5

    4b16d93a0cb2abc4c9023428e8e752d6

  • SHA1

    5f945e3612578b027bfdf0d1992d31d9af5a45dc

  • SHA256

    f117b4e134f87a80d5a3a7d0089a4a810be7552156147553c8b17b6ebe3a0fe7

  • SHA512

    62a5af242150e03e52a5b887d5ad5e935a1fe6db4e17af55868204a81fd77c5fe7fbe41b41219c8db851b3e85c8c617d52a633a8c22bd136450a3083489dfebb

  • SSDEEP

    49152:3BH6gLKJuMarhVnMFwTH8/giBiBcbk4ZxZ2DqFeVMhuxcPh:3Ud1XdhBiiMa7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3100
      • C:\Users\Admin\AppData\Local\Temp\f117b4e134f87a80d5a3a7d0089a4a810be7552156147553c8b17b6ebe3a0fe7.exe
        "C:\Users\Admin\AppData\Local\Temp\f117b4e134f87a80d5a3a7d0089a4a810be7552156147553c8b17b6ebe3a0fe7.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3892
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:4304
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE27B.bat
            3⤵
              PID:1712
              • C:\Users\Admin\AppData\Local\Temp\f117b4e134f87a80d5a3a7d0089a4a810be7552156147553c8b17b6ebe3a0fe7.exe
                "C:\Users\Admin\AppData\Local\Temp\f117b4e134f87a80d5a3a7d0089a4a810be7552156147553c8b17b6ebe3a0fe7.exe"
                4⤵
                • Executes dropped EXE
                PID:3852
            • C:\Windows\Logo1_.exe
              C:\Windows\Logo1_.exe
              3⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1968
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1300
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:5116
                • C:\Windows\SysWOW64\net.exe
                  net stop "Kingsoft AntiVirus Service"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:872
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                    5⤵
                      PID:1112

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files\7-Zip\7z.exe

                    Filesize

                    491KB

                    MD5

                    2d704f39a13b1039763aae0325fe8581

                    SHA1

                    d4ce097fd0a9d5c4254415afdfb900545ee8a83c

                    SHA256

                    1dfc413d94c0795d4c9e862132453ce486b15183fe414ae4e3f543b89aa37c6f

                    SHA512

                    5af43f930b89d3e5d3214d0a5f83d371f003fad133f10d26faa6e09f1b89bc90c1e0a75d5ed3d389116858235c5b6e10f3e5eb837ba935065322e4fecc9be296

                  • C:\Users\Admin\AppData\Local\Temp\$$aE27B.bat

                    Filesize

                    722B

                    MD5

                    9ed0db2c1b04291896d544651332590f

                    SHA1

                    c807208b14fbc6379e03f8b89ba078f35d8a4b34

                    SHA256

                    ed7f7abbd2b9d258f0a2382fbf0bcb8ec433f33603d9d00cff0e9cf0d0714049

                    SHA512

                    21c4ed8d9bea5064f46bc2ea9971f63e704f62b940f10cb59a7403279b1f421fdf4168a41dc25cff07ab3c1cdeb32823d097c7673cb9f6c75a261c7ff6d76dc5

                  • C:\Users\Admin\AppData\Local\Temp\f117b4e134f87a80d5a3a7d0089a4a810be7552156147553c8b17b6ebe3a0fe7.exe

                    Filesize

                    2.8MB

                    MD5

                    095092f4e746810c5829038d48afd55a

                    SHA1

                    246eb3d41194dddc826049bbafeb6fc522ec044a

                    SHA256

                    2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

                    SHA512

                    7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

                  • C:\Users\Admin\AppData\Local\Temp\f117b4e134f87a80d5a3a7d0089a4a810be7552156147553c8b17b6ebe3a0fe7.exe.exe

                    Filesize

                    2.8MB

                    MD5

                    095092f4e746810c5829038d48afd55a

                    SHA1

                    246eb3d41194dddc826049bbafeb6fc522ec044a

                    SHA256

                    2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

                    SHA512

                    7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

                  • C:\Windows\Logo1_.exe

                    Filesize

                    33KB

                    MD5

                    b760a1f682f6a7c8b850672fff809ad3

                    SHA1

                    56dcedacb977e5588459a244fae90528b9a833f4

                    SHA256

                    5db94c94dc5961593861da9ad1ee5bb1ad2a766b96acbb4b2704787cd4c8e7e5

                    SHA512

                    3513a5a722cf71c66620467caed26a2775e19c7659aa52bf2de10404065ad23f1d54680e176658c763d642d0dbd814c9050ffe89163fa37a6b8c3a69f6fa4c85

                  • C:\Windows\Logo1_.exe

                    Filesize

                    33KB

                    MD5

                    b760a1f682f6a7c8b850672fff809ad3

                    SHA1

                    56dcedacb977e5588459a244fae90528b9a833f4

                    SHA256

                    5db94c94dc5961593861da9ad1ee5bb1ad2a766b96acbb4b2704787cd4c8e7e5

                    SHA512

                    3513a5a722cf71c66620467caed26a2775e19c7659aa52bf2de10404065ad23f1d54680e176658c763d642d0dbd814c9050ffe89163fa37a6b8c3a69f6fa4c85

                  • C:\Windows\rundl132.exe

                    Filesize

                    33KB

                    MD5

                    b760a1f682f6a7c8b850672fff809ad3

                    SHA1

                    56dcedacb977e5588459a244fae90528b9a833f4

                    SHA256

                    5db94c94dc5961593861da9ad1ee5bb1ad2a766b96acbb4b2704787cd4c8e7e5

                    SHA512

                    3513a5a722cf71c66620467caed26a2775e19c7659aa52bf2de10404065ad23f1d54680e176658c763d642d0dbd814c9050ffe89163fa37a6b8c3a69f6fa4c85

                  • F:\$RECYCLE.BIN\S-1-5-21-3125601242-331447593-1512828465-1000\_desktop.ini

                    Filesize

                    9B

                    MD5

                    35dff1b2d2822022424940d4487e8d0d

                    SHA1

                    cf3c5e0326ffacd39689a35b566c8d3c626cc96b

                    SHA256

                    0432a628b4273444218f05d7d906b391ab84e1d51bc1b084c37456324e0f84ae

                    SHA512

                    91c1e3f5497c8c249e695b9e6f844f141b8747d5d1c5d23d09a2e39aae974cfcfe26b6a4580904b87aa495d452df942937fd721ff8189016a59f61c0835e1665

                  • memory/1624-10-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1624-2-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1624-0-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1624-1-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1968-44-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1968-13-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1968-20-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1968-146-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1968-183-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1968-201-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1968-212-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1968-262-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1968-444-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1968-711-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB