Analysis

  • max time kernel
    169s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/11/2023, 19:44

General

  • Target

    7a557a998ca8474282622c29b696fcfa4720490b86167938fe4333fbe956967f.exe

  • Size

    7.3MB

  • MD5

    bbee57d76bd6c882e80e904308a9dec7

  • SHA1

    e8b9e5891bb8b9033df51e0953947cce7cfcb378

  • SHA256

    7a557a998ca8474282622c29b696fcfa4720490b86167938fe4333fbe956967f

  • SHA512

    faff70072cb7f0c3357d007a58c6d82ed5f584df794670e19eab6434e72e74030c4e589ce7ac6a9b8fb39dcf71f978ddb9878363e06d6ffdeb36ac49be3fedd6

  • SSDEEP

    98304:SmB9OWBVClfcaA1oZeSajfztbVCGQX4bME4bP8nQgMVQNKe5AJbI8D:Sg9OHi1oZepfxUGGNQNKe

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3324
      • C:\Users\Admin\AppData\Local\Temp\7a557a998ca8474282622c29b696fcfa4720490b86167938fe4333fbe956967f.exe
        "C:\Users\Admin\AppData\Local\Temp\7a557a998ca8474282622c29b696fcfa4720490b86167938fe4333fbe956967f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBFD5.bat
          3⤵
            PID:2244
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1068
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2000
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:3928

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files\7-Zip\7z.exe

                Filesize

                487KB

                MD5

                2c59ca21f6f1c944b31c2f361cb8f878

                SHA1

                f8b94103ad705dd04f9cd7564bbe96fae10416dc

                SHA256

                19a5c6c80514db49bd9b4cca0fc061de530325b2f913d1f08daed8220f2c12c3

                SHA512

                5b2dfa0199fa83e59e0496d7e05dae6c6204f04348161c860266ee25d0b94f546c0d20473bedb1cceab65158bf042ef03d1e7468a1bc9479d780f261b58a7f86

              • C:\Users\Admin\AppData\Local\Temp\$$aBFD5.bat

                Filesize

                722B

                MD5

                8b9f8b5180bdfe8c2d039bcbb4e2fa46

                SHA1

                b0e612e1e8bf6a614ef08e7e3ca8abb41f1b1910

                SHA256

                149ecb9434da6e627823af5ee22075e291022cb29eb82b553fe26f7fc4fcf55c

                SHA512

                55b86e392438c3d8e248c2a9d1ac24f82eb506e78092d3bcf7f746bdd5526be7ddbab63927ce40741fa6c33128ce9e821c9373f23a07d08b0d5dbb5aed4a2663

              • C:\Users\Admin\AppData\Local\Temp\7a557a998ca8474282622c29b696fcfa4720490b86167938fe4333fbe956967f.exe.exe

                Filesize

                7.3MB

                MD5

                172b6d29b3cdcdf2b0b14332eb216161

                SHA1

                7534c39aecd8a968c8cdf34db4cb388d999a3065

                SHA256

                3bb1c042bf917e6577be28edce3243628e9ce4245e9abbc2cc0196ccca26630c

                SHA512

                71e4e14c689974821c0bb80637a53cd5234df0111b809612ac810846fe2ba9d288da20141455b984dd842c8343166f807f8da51e74b66fbe3aec181db72806ce

              • C:\Windows\Logo1_.exe

                Filesize

                29KB

                MD5

                81630564087dc0b55754dcef927e5854

                SHA1

                be4be4b86da3df0627f99434e8c15d89119ee8ba

                SHA256

                6e58398b6ead714b557d62f4c5734ee2b2042a796c63ab55b0454eab6c401d3a

                SHA512

                2214d41d0448e3028619a1af5c1843ebafcda81f29c31e3dfb063766fca33cce57d68474d435a8a45cc6bb3a29545eb403a9043881dc41289a7e765e1d759dd8

              • C:\Windows\Logo1_.exe

                Filesize

                29KB

                MD5

                81630564087dc0b55754dcef927e5854

                SHA1

                be4be4b86da3df0627f99434e8c15d89119ee8ba

                SHA256

                6e58398b6ead714b557d62f4c5734ee2b2042a796c63ab55b0454eab6c401d3a

                SHA512

                2214d41d0448e3028619a1af5c1843ebafcda81f29c31e3dfb063766fca33cce57d68474d435a8a45cc6bb3a29545eb403a9043881dc41289a7e765e1d759dd8

              • C:\Windows\rundl132.exe

                Filesize

                29KB

                MD5

                81630564087dc0b55754dcef927e5854

                SHA1

                be4be4b86da3df0627f99434e8c15d89119ee8ba

                SHA256

                6e58398b6ead714b557d62f4c5734ee2b2042a796c63ab55b0454eab6c401d3a

                SHA512

                2214d41d0448e3028619a1af5c1843ebafcda81f29c31e3dfb063766fca33cce57d68474d435a8a45cc6bb3a29545eb403a9043881dc41289a7e765e1d759dd8

              • F:\$RECYCLE.BIN\S-1-5-21-1114462139-3090196418-29517368-1000\_desktop.ini

                Filesize

                10B

                MD5

                60d14ad2d8cf983c15b0537099900c9c

                SHA1

                e1ee66c7f17631143d9ddf816bc1ec0787e17447

                SHA256

                3ac04e33b3ef42c31240d788afd9639b8f26c5edf2f0d7bb82d348a7d8bc513e

                SHA512

                2d19dfda574fdbc46ee25954549bcc6330abebc4432abde57253d602aa750fe3cb3a976c769aeeae3cc0a7a5e43e505256a474dd3be5f84ceaba0607d6bb6685

              • memory/1068-18-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/1068-10-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/1068-25-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/1068-32-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/1068-36-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/1068-41-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/1068-63-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/1068-921-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/1068-1084-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/1068-1160-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/2380-0-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/2380-8-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB