Analysis

  • max time kernel
    102s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    13-11-2023 14:56

General

  • Target

    9e9d44f576105feeea2201d9809027bd049d3f38101dcd85b9dcd11b86a037d9.exe

  • Size

    26KB

  • MD5

    a9dc4a172100eccd1c7ff84e66719574

  • SHA1

    c7ff20b4ee5562c514f504318a0f72f12b1d84d3

  • SHA256

    9e9d44f576105feeea2201d9809027bd049d3f38101dcd85b9dcd11b86a037d9

  • SHA512

    a3e5f460fc8bd397a277e1480e8863d9ec3245f5b7b18849c15289473db10e5f429e82c7a89e4323a637f9b570685f9677efcbeaad2d8a26f160a42967785284

  • SSDEEP

    768:MNA1ODKAaDMG8H92RwZNQSw+IlJIJJREIOARSdxnie:MNSfgLdQAQfhJIJ0IOhdIe

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1344
      • C:\Users\Admin\AppData\Local\Temp\9e9d44f576105feeea2201d9809027bd049d3f38101dcd85b9dcd11b86a037d9.exe
        "C:\Users\Admin\AppData\Local\Temp\9e9d44f576105feeea2201d9809027bd049d3f38101dcd85b9dcd11b86a037d9.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1984
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2672

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        16d53298149f0b043d8bf4fc2e5c221c

        SHA1

        f02ed855266962faf090c0000271a6140b056585

        SHA256

        d502cb88273648d7b22eb0c01753662b5354e3909ad31c5c5a3e8d7c379d6367

        SHA512

        546c568f28aac3c25b2eec81e7bc9562e1a2d1c733164165b91710f3ceda9dfa6d5636d097eb81aa272f36fd45aecd390192534b1ccca52bdc7e9ad094de9b41

      • C:\Program Files\7-Zip\7zFM.exe

        Filesize

        874KB

        MD5

        4a747e75d676a07c825c6fc4b7005645

        SHA1

        b29728f1f265fca0fe835667a3b7c07e40a8e853

        SHA256

        29810ef52a88489712235ba9e619e8de92712a107fd6c636015b038adfe45b03

        SHA512

        a8a68d75600e72036b6eb2361a3ba06b016c5bbf43ac568f69cf5b35771875a6c064947a8fc6c4a9ccd9a8be4e535117fcb2763b4c44d50736f24cbe9e4544c1

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        cd063a49bae945a38047d1627588ee01

        SHA1

        1608915d38130f68d3398c174f206dc073814e7b

        SHA256

        ae8ed667c2ef87a5a30302264032701269ee5821aa6b33343ceb404257709f38

        SHA512

        c789f3def7d88f776b609be95f98a0876f7b1126586603e77ade5554f8538acd22608484ef9978ee6e2e9214393e4c8d3c48ac22ff7ecae9a8dba9fa7cd7a39b

      • F:\$RECYCLE.BIN\S-1-5-21-2084844033-2744876406-2053742436-1000\_desktop.ini

        Filesize

        10B

        MD5

        7af371ae7aad351d505f1b26382de243

        SHA1

        0a19bf0a1ccfb902a03b3da68bdd289190e62f5f

        SHA256

        4fcc643d52dbc25dd57a011e27cbb0503711cf1a2ad1610a4f9e7b9f17c5bc1b

        SHA512

        1127b9c88de9e2d58f7a512dd52c31bb9d96b0543f13e4cfff59ca2b73e60307538dd9bcd1c480e6d260fe45b44208a5554a5a60e8c2e3da8385b2cdd0e77d3e

      • memory/1344-5-0x00000000025B0000-0x00000000025B1000-memory.dmp

        Filesize

        4KB

      • memory/1668-66-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1668-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1668-72-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1668-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1668-148-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1668-1825-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1668-14-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1668-3285-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1668-7-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB