Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    13-11-2023 16:44

General

  • Target

    54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe

  • Size

    292KB

  • MD5

    7aac4fbe5c22841c84e8690a836e46af

  • SHA1

    27e470e94a988e4a6d6bccf8b862d59e66c409d0

  • SHA256

    54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4

  • SHA512

    25b6ac5bc1ee8132443c88e0c65069e8eff1314152b4688dfc00ddb75723c16025fb5b9f1af6b29eed78ca9d152912ed57c7b3100bad1f6357a18808738f0d41

  • SSDEEP

    3072:UftffjmNSGNWHDzttk5pLzSMEjF47yctMYTWfYj9DfWxRmY7jyP0ejUl:sVfjmNfNmZtb4wNQBDfWxRvs0ewl

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1380
      • C:\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe
        "C:\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a819E.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2608
          • C:\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe
            "C:\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe"
            4⤵
            • Executes dropped EXE
            PID:2704
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2948
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2636
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2964

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        533ce215a7c274602dc456ca375cef93

        SHA1

        76c502d7c45eca3fd96f6b04eb850e751bc785dd

        SHA256

        d70c9f73bbeed5cbc0df4a4d14bae68789f84d8092281337d2919322b288ce9c

        SHA512

        09d9dee36c48567921de4b7c31c4a822d5f9ed5e0b1cb0330031b320f40b5ba9b15e89dc37d52561094642c0ff16c14d32e81ed5b1dac06150fefbbd6f3365bf

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a819E.bat

        Filesize

        722B

        MD5

        79b5fca384051ca44d6ee8a066213f59

        SHA1

        df25803f5f444ba333deeee97442c3fa29e8a559

        SHA256

        d1d7558dc1146ad5d6b62d6e2eeed2024713187973e445a8d776224e37997b09

        SHA512

        7fd5ef692ad44fa4617ed87631dd564d1a005002d4f40ebd79c2b60233f24e07a1bf6fdc57cbaffc7fd522d51f6d31602d237b9c98eb9aba9eb93e69aedbb3ae

      • C:\Users\Admin\AppData\Local\Temp\$$a819E.bat

        Filesize

        722B

        MD5

        79b5fca384051ca44d6ee8a066213f59

        SHA1

        df25803f5f444ba333deeee97442c3fa29e8a559

        SHA256

        d1d7558dc1146ad5d6b62d6e2eeed2024713187973e445a8d776224e37997b09

        SHA512

        7fd5ef692ad44fa4617ed87631dd564d1a005002d4f40ebd79c2b60233f24e07a1bf6fdc57cbaffc7fd522d51f6d31602d237b9c98eb9aba9eb93e69aedbb3ae

      • C:\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe

        Filesize

        266KB

        MD5

        b0dcc380e6b5d51460eafeba2a4c0d3b

        SHA1

        1fedbf0b02f7a7ce4149b96ff6b296f81574a7e1

        SHA256

        ebffb0122f9787bf691068614d576a634fdc0c6bb28ba565ecc3d7d49b41001c

        SHA512

        6d098af85eb8e12da482ec6347f4c19a8f75c72cdcfa0885a7a0f5a6b3718417bfdce1009648b9a29e64b61d1b1c5bd76744596f4182816171863fa8b72245d2

      • C:\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe.exe

        Filesize

        266KB

        MD5

        b0dcc380e6b5d51460eafeba2a4c0d3b

        SHA1

        1fedbf0b02f7a7ce4149b96ff6b296f81574a7e1

        SHA256

        ebffb0122f9787bf691068614d576a634fdc0c6bb28ba565ecc3d7d49b41001c

        SHA512

        6d098af85eb8e12da482ec6347f4c19a8f75c72cdcfa0885a7a0f5a6b3718417bfdce1009648b9a29e64b61d1b1c5bd76744596f4182816171863fa8b72245d2

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        ed9c69fcace8a0c07f7596f17c76cd92

        SHA1

        31fe334a5cd033d7688ae7cbf49b78db9f888cec

        SHA256

        0cff4e74e436b6c06ff1c99d2e9a605d6ecc4fcfb6fc20fd3942c19cee76e073

        SHA512

        80a86988ca56652428132faf8169a156d4ce88c7cc7a6c1cc825f120ec8e813d261fcaccdb462969346d690b6c14b60e40bbe421933fc68627fc975b9036ffdf

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        ed9c69fcace8a0c07f7596f17c76cd92

        SHA1

        31fe334a5cd033d7688ae7cbf49b78db9f888cec

        SHA256

        0cff4e74e436b6c06ff1c99d2e9a605d6ecc4fcfb6fc20fd3942c19cee76e073

        SHA512

        80a86988ca56652428132faf8169a156d4ce88c7cc7a6c1cc825f120ec8e813d261fcaccdb462969346d690b6c14b60e40bbe421933fc68627fc975b9036ffdf

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        ed9c69fcace8a0c07f7596f17c76cd92

        SHA1

        31fe334a5cd033d7688ae7cbf49b78db9f888cec

        SHA256

        0cff4e74e436b6c06ff1c99d2e9a605d6ecc4fcfb6fc20fd3942c19cee76e073

        SHA512

        80a86988ca56652428132faf8169a156d4ce88c7cc7a6c1cc825f120ec8e813d261fcaccdb462969346d690b6c14b60e40bbe421933fc68627fc975b9036ffdf

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        ed9c69fcace8a0c07f7596f17c76cd92

        SHA1

        31fe334a5cd033d7688ae7cbf49b78db9f888cec

        SHA256

        0cff4e74e436b6c06ff1c99d2e9a605d6ecc4fcfb6fc20fd3942c19cee76e073

        SHA512

        80a86988ca56652428132faf8169a156d4ce88c7cc7a6c1cc825f120ec8e813d261fcaccdb462969346d690b6c14b60e40bbe421933fc68627fc975b9036ffdf

      • F:\$RECYCLE.BIN\S-1-5-21-2085049433-1067986815-1244098655-1000\_desktop.ini

        Filesize

        10B

        MD5

        7af371ae7aad351d505f1b26382de243

        SHA1

        0a19bf0a1ccfb902a03b3da68bdd289190e62f5f

        SHA256

        4fcc643d52dbc25dd57a011e27cbb0503711cf1a2ad1610a4f9e7b9f17c5bc1b

        SHA512

        1127b9c88de9e2d58f7a512dd52c31bb9d96b0543f13e4cfff59ca2b73e60307538dd9bcd1c480e6d260fe45b44208a5554a5a60e8c2e3da8385b2cdd0e77d3e

      • \Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe

        Filesize

        266KB

        MD5

        b0dcc380e6b5d51460eafeba2a4c0d3b

        SHA1

        1fedbf0b02f7a7ce4149b96ff6b296f81574a7e1

        SHA256

        ebffb0122f9787bf691068614d576a634fdc0c6bb28ba565ecc3d7d49b41001c

        SHA512

        6d098af85eb8e12da482ec6347f4c19a8f75c72cdcfa0885a7a0f5a6b3718417bfdce1009648b9a29e64b61d1b1c5bd76744596f4182816171863fa8b72245d2

      • \Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe

        Filesize

        266KB

        MD5

        b0dcc380e6b5d51460eafeba2a4c0d3b

        SHA1

        1fedbf0b02f7a7ce4149b96ff6b296f81574a7e1

        SHA256

        ebffb0122f9787bf691068614d576a634fdc0c6bb28ba565ecc3d7d49b41001c

        SHA512

        6d098af85eb8e12da482ec6347f4c19a8f75c72cdcfa0885a7a0f5a6b3718417bfdce1009648b9a29e64b61d1b1c5bd76744596f4182816171863fa8b72245d2

      • memory/1380-35-0x0000000002990000-0x0000000002991000-memory.dmp

        Filesize

        4KB

      • memory/2372-21-0x0000000000330000-0x0000000000364000-memory.dmp

        Filesize

        208KB

      • memory/2372-16-0x0000000000330000-0x0000000000364000-memory.dmp

        Filesize

        208KB

      • memory/2372-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2372-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2372-38-0x0000000000330000-0x0000000000364000-memory.dmp

        Filesize

        208KB

      • memory/2608-31-0x0000000000180000-0x00000000001D7000-memory.dmp

        Filesize

        348KB

      • memory/2608-30-0x0000000000180000-0x00000000001D7000-memory.dmp

        Filesize

        348KB

      • memory/2704-33-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/2704-32-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/2948-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2948-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2948-52-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2948-97-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2948-104-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2948-358-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2948-1856-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2948-3316-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2948-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB