Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    11/11/2023, 22:49

General

  • Target

    e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe

  • Size

    206KB

  • MD5

    fafe7eaf6cbcc4a295b6c5507ef3dc83

  • SHA1

    2449d9938d76267cff9042d550d37bb2e9ae2c2b

  • SHA256

    e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585

  • SHA512

    a34974753ca2b47391f40086e53b5b85a9d17e72d754f41ae496eb65672c77d2f97adae88be5cdb96093e36f7bccf5aca09c37a2ba317a72d00c82e5dbd13a73

  • SSDEEP

    3072:1sftffjmNR8cz7qXKwpe1gjcxiN1ICOqnPgaH5KuBGvc/:iVfjmNX7CKwpe1Wcw8IitU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1292
      • C:\Users\Admin\AppData\Local\Temp\e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe
        "C:\Users\Admin\AppData\Local\Temp\e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2360
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a9CAD.bat
          3⤵
          • Deletes itself
          PID:1708
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2260
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2340
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2700

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              3663c1381766ef643154f7248cee081a

              SHA1

              d3391539358af56ef7ac65a5b87886e45e9bc42c

              SHA256

              0471b2b82fb08307f138b69649e69dd51864d5650e13d0dafe67d37d91288c29

              SHA512

              c3ed0a5d8b9eaa02efd030d4191849f5aa999e1585a47af66e8497ab494141488e97ca39289b412919f33faf78016c4e875522232c8f67bde995d968ecc7f6f7

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              4cfdb20b04aa239d6f9e83084d5d0a77

              SHA1

              f22863e04cc1fd4435f785993ede165bd8245ac6

              SHA256

              30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

              SHA512

              35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

            • C:\Users\Admin\AppData\Local\Temp\$$a9CAD.bat

              Filesize

              722B

              MD5

              842eb81079c880907834eb7021c427fd

              SHA1

              c1426f2775b0b9054639e4c26892bef9755b985d

              SHA256

              7951ae19e228cb45c76407a59cc8ee0c353df0d6200b10555e0eb17016e722ea

              SHA512

              035664af2c3b2873136f8cc82e836ae356ca4e86486e16f1ccbde9f20662d58ae086fc1986d09878a60db9150672a74f13e9cd1c3e6b799d214d2ad64dfd8a9d

            • C:\Users\Admin\AppData\Local\Temp\$$a9CAD.bat

              Filesize

              722B

              MD5

              842eb81079c880907834eb7021c427fd

              SHA1

              c1426f2775b0b9054639e4c26892bef9755b985d

              SHA256

              7951ae19e228cb45c76407a59cc8ee0c353df0d6200b10555e0eb17016e722ea

              SHA512

              035664af2c3b2873136f8cc82e836ae356ca4e86486e16f1ccbde9f20662d58ae086fc1986d09878a60db9150672a74f13e9cd1c3e6b799d214d2ad64dfd8a9d

            • C:\Users\Admin\AppData\Local\Temp\e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe.exe

              Filesize

              179KB

              MD5

              9540ad83a08605ba1f52196424ce3067

              SHA1

              a533eb61319bce1720b55d8921691323a4178c3d

              SHA256

              b0b5d9eb6f4b176bdfbe4da0a060ad1b76c813186fae3d9a6e1b1dd9ee0d01d1

              SHA512

              bb00ee12c353c9deeb8105399b2a956343e4a1c13dd1198d0f481c4f699099a34ede80f15bb4efa9a1f68c2c12ff75da163b48bfdf30353d5ef5d4bb7c174493

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              785fa6c3710afc18d7fdec70e3b9a469

              SHA1

              d2903f4fa74689c6b8a7e5e7c8d9c1791a71523d

              SHA256

              c0e031a2d0e39b141a0cf1c8384e190bc6fa0cc8f4e0f36cde97ac631f126c27

              SHA512

              00b7c2d17161542744b54ef5a770363a1de0a21805da3d1b1b169de28c4939b2bc67d4eaa7cee9b2c0c46d853109b5943295f39051b5a7ae7e1924e002db606f

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              785fa6c3710afc18d7fdec70e3b9a469

              SHA1

              d2903f4fa74689c6b8a7e5e7c8d9c1791a71523d

              SHA256

              c0e031a2d0e39b141a0cf1c8384e190bc6fa0cc8f4e0f36cde97ac631f126c27

              SHA512

              00b7c2d17161542744b54ef5a770363a1de0a21805da3d1b1b169de28c4939b2bc67d4eaa7cee9b2c0c46d853109b5943295f39051b5a7ae7e1924e002db606f

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              785fa6c3710afc18d7fdec70e3b9a469

              SHA1

              d2903f4fa74689c6b8a7e5e7c8d9c1791a71523d

              SHA256

              c0e031a2d0e39b141a0cf1c8384e190bc6fa0cc8f4e0f36cde97ac631f126c27

              SHA512

              00b7c2d17161542744b54ef5a770363a1de0a21805da3d1b1b169de28c4939b2bc67d4eaa7cee9b2c0c46d853109b5943295f39051b5a7ae7e1924e002db606f

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              785fa6c3710afc18d7fdec70e3b9a469

              SHA1

              d2903f4fa74689c6b8a7e5e7c8d9c1791a71523d

              SHA256

              c0e031a2d0e39b141a0cf1c8384e190bc6fa0cc8f4e0f36cde97ac631f126c27

              SHA512

              00b7c2d17161542744b54ef5a770363a1de0a21805da3d1b1b169de28c4939b2bc67d4eaa7cee9b2c0c46d853109b5943295f39051b5a7ae7e1924e002db606f

            • F:\$RECYCLE.BIN\S-1-5-21-2085049433-1067986815-1244098655-1000\_desktop.ini

              Filesize

              10B

              MD5

              f51c3552f0c301ae8d98c7fba5088597

              SHA1

              b74920b9332b7ddc34e3d793215d6d402dfa265e

              SHA256

              d9d5ad4ac9b545fe611f501ffb102acad318e4d1e5648061eda6ff03ffc3e3a1

              SHA512

              281662d4c7abe512da2489431bb4ad36d979fd441654ec1212af9274dc7b0ea666111c52f1ee842adde37cbb51a8fe095091b52ad824cfdf4516f2f08232eb81

            • memory/1292-63-0x0000000002830000-0x0000000002831000-memory.dmp

              Filesize

              4KB

            • memory/1708-57-0x0000000002180000-0x0000000002181000-memory.dmp

              Filesize

              4KB

            • memory/2260-128-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2260-68-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2260-21-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2260-75-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2260-82-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2260-134-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2260-704-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2260-1887-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2260-3347-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2360-76-0x0000000000230000-0x0000000000264000-memory.dmp

              Filesize

              208KB

            • memory/2360-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2360-15-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2360-17-0x0000000000230000-0x0000000000264000-memory.dmp

              Filesize

              208KB