Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    15/11/2023, 16:38

General

  • Target

    1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe

  • Size

    1.4MB

  • MD5

    ef6bd9be00ede657a759f8ec7296857e

  • SHA1

    4355b6e8fa4f236f34cf2766225ee15b90d6ee29

  • SHA256

    1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5

  • SHA512

    17061c6d85573f1a5ea5154c6c739dbf5760b77324d2ef226556f5b77f08408c03ef5fafa02280e898e74da940776aa6861cdaa21817793c4f6a427087f5fc41

  • SSDEEP

    24576:j7hpBrPMix7e6tP5mUVLpI+rqITbN2A0Ta3fbG/67fZQKP/19e4Mi11phQGAqdPc:j7bp06/rLjkEfc67hQKP/19e4rphQGAN

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1328
      • C:\Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe
        "C:\Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2104
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a4AF5.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1720
          • C:\Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe
            "C:\Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe"
            4⤵
            • Executes dropped EXE
            PID:2724
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3008
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2744
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2756

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        3254f74cb3b33bfc7be7ed5a00f441c8

        SHA1

        e53c1efdc9ae60c559389f30dfd1b9d36c4f92b3

        SHA256

        5aa37366c8c3de47ab77db554be0694bd31ba84799839adb30d5c8efe072a2d3

        SHA512

        2d780e304b76d1041e2beeac628e2666a38f5435b2ab4bc6ad553cd2a5d40e864943f7a4b90e90277821e8376b6d135b14bfbbcbaadc61d0781af0c3aa9ad696

      • C:\Users\Admin\AppData\Local\Temp\$$a4AF5.bat

        Filesize

        722B

        MD5

        54796509de169f0ae854e94ff0d0703d

        SHA1

        b522a734b0b2841309a66e343c60b1e72b79c06f

        SHA256

        5f1c5a355d26572ad364438a87217cb51fa42b1f7a158d777966946d9a8d55f7

        SHA512

        74e2517fdb348610ab115d6056d2a6062adda1a6fc3955ea45d5d6fa53c1f083ee88fbfc2abf9bf8332e6f41b890da52b66b8940df437683717c6bc29f2848f4

      • C:\Users\Admin\AppData\Local\Temp\$$a4AF5.bat

        Filesize

        722B

        MD5

        54796509de169f0ae854e94ff0d0703d

        SHA1

        b522a734b0b2841309a66e343c60b1e72b79c06f

        SHA256

        5f1c5a355d26572ad364438a87217cb51fa42b1f7a158d777966946d9a8d55f7

        SHA512

        74e2517fdb348610ab115d6056d2a6062adda1a6fc3955ea45d5d6fa53c1f083ee88fbfc2abf9bf8332e6f41b890da52b66b8940df437683717c6bc29f2848f4

      • C:\Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe

        Filesize

        1.4MB

        MD5

        d881b29ba4f09811f8fddb2e4acc6387

        SHA1

        cd08979aeabbb38d984a246b6aa7040bbe8722e4

        SHA256

        c0ee98f32055756cb3416b2e3c0a790d2799d85ee848541f04d0d00635990466

        SHA512

        2470f0ee118e1442023999522509b37159142162619b03549d74a889908dff8bcac256ddbf7413100c6d2c3e7e271309bbe17a13b1acc0b3a831b3caad991445

      • C:\Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe.exe

        Filesize

        1.4MB

        MD5

        d881b29ba4f09811f8fddb2e4acc6387

        SHA1

        cd08979aeabbb38d984a246b6aa7040bbe8722e4

        SHA256

        c0ee98f32055756cb3416b2e3c0a790d2799d85ee848541f04d0d00635990466

        SHA512

        2470f0ee118e1442023999522509b37159142162619b03549d74a889908dff8bcac256ddbf7413100c6d2c3e7e271309bbe17a13b1acc0b3a831b3caad991445

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        cbca3e8196ed927725baddcf0c89fb33

        SHA1

        7f1e39c3fe75198170cfff1792968f6ff5f07046

        SHA256

        1c029e9f721dcf0ab7ec76c4eafdf46343c1f59e1be982625315fe205a883d9e

        SHA512

        bdd87c1d6d2682efc535cb7abc32cd571354bb81407983891b98c85f0bb0b385101871ce975d541d43855c1908b156b12bd2ef3b2bec068eafaa4f5e9e79926e

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        cbca3e8196ed927725baddcf0c89fb33

        SHA1

        7f1e39c3fe75198170cfff1792968f6ff5f07046

        SHA256

        1c029e9f721dcf0ab7ec76c4eafdf46343c1f59e1be982625315fe205a883d9e

        SHA512

        bdd87c1d6d2682efc535cb7abc32cd571354bb81407983891b98c85f0bb0b385101871ce975d541d43855c1908b156b12bd2ef3b2bec068eafaa4f5e9e79926e

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        cbca3e8196ed927725baddcf0c89fb33

        SHA1

        7f1e39c3fe75198170cfff1792968f6ff5f07046

        SHA256

        1c029e9f721dcf0ab7ec76c4eafdf46343c1f59e1be982625315fe205a883d9e

        SHA512

        bdd87c1d6d2682efc535cb7abc32cd571354bb81407983891b98c85f0bb0b385101871ce975d541d43855c1908b156b12bd2ef3b2bec068eafaa4f5e9e79926e

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        cbca3e8196ed927725baddcf0c89fb33

        SHA1

        7f1e39c3fe75198170cfff1792968f6ff5f07046

        SHA256

        1c029e9f721dcf0ab7ec76c4eafdf46343c1f59e1be982625315fe205a883d9e

        SHA512

        bdd87c1d6d2682efc535cb7abc32cd571354bb81407983891b98c85f0bb0b385101871ce975d541d43855c1908b156b12bd2ef3b2bec068eafaa4f5e9e79926e

      • F:\$RECYCLE.BIN\S-1-5-21-1154728922-3261336865-3456416385-1000\_desktop.ini

        Filesize

        10B

        MD5

        65dbe3024623e6ca52f7ffc0aff48a7a

        SHA1

        fa85f73c2d8c16dc761a92e86f3611f5845e8b3b

        SHA256

        c148a5db22b58e10be752ed65b1ea427501f99f058de33ad0d659cb064eb1848

        SHA512

        bce9e3f68a68eeec543e2c15d835fb7e869dde64353cb5e014fcd5643d710af895c8b55823c007eddafbfe3d28a5e510efcde12ad2e6932495ddfe1d0bf1c616

      • \Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe

        Filesize

        1.4MB

        MD5

        d881b29ba4f09811f8fddb2e4acc6387

        SHA1

        cd08979aeabbb38d984a246b6aa7040bbe8722e4

        SHA256

        c0ee98f32055756cb3416b2e3c0a790d2799d85ee848541f04d0d00635990466

        SHA512

        2470f0ee118e1442023999522509b37159142162619b03549d74a889908dff8bcac256ddbf7413100c6d2c3e7e271309bbe17a13b1acc0b3a831b3caad991445

      • memory/1328-30-0x0000000002970000-0x0000000002971000-memory.dmp

        Filesize

        4KB

      • memory/2104-36-0x0000000000320000-0x0000000000354000-memory.dmp

        Filesize

        208KB

      • memory/2104-17-0x0000000000320000-0x0000000000354000-memory.dmp

        Filesize

        208KB

      • memory/2104-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2104-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2104-21-0x0000000000320000-0x0000000000354000-memory.dmp

        Filesize

        208KB

      • memory/3008-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-47-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-93-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-99-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-1851-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-2366-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB