Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    17/11/2023, 09:41

General

  • Target

    26a996f486970c2d593c589f3a1c2dabaf420e19de44d1a3c2e4b357b5e473b0.exe

  • Size

    29KB

  • MD5

    c2ae36a279fe52727590cb4cf97eaaa4

  • SHA1

    9acee6f7f7e2bb049612a785d79a8e1a028a0d6f

  • SHA256

    26a996f486970c2d593c589f3a1c2dabaf420e19de44d1a3c2e4b357b5e473b0

  • SHA512

    4d294bfc04570807f84594bfb78b59ccfccb3549092f51fbc0d5d920e604f7840dca95219472cfc8978201cfbc587f236540d893f35d0565089ad82d47bc3381

  • SSDEEP

    384:Nbbm0lDBL1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:p60lDl16GVRu1yK9fMnJG2V9dHS8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1356
      • C:\Users\Admin\AppData\Local\Temp\26a996f486970c2d593c589f3a1c2dabaf420e19de44d1a3c2e4b357b5e473b0.exe
        "C:\Users\Admin\AppData\Local\Temp\26a996f486970c2d593c589f3a1c2dabaf420e19de44d1a3c2e4b357b5e473b0.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2764
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2304

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              254KB

              MD5

              711722ec5ba4f2dd1d37ab99a463b6d7

              SHA1

              8f2dfe853b2214a43dc2ec427a78eef886a6bb61

              SHA256

              922ab8b99125415321754bb0d8627d38ea1f92cdd7fc799f5835cb4cc76ce45a

              SHA512

              6ea0752cf25a0b4cf719ec47737a8a2b956051c2d109a981899864d97e403feb1ed7c18fd9871b3ef5a24b877291532d40d04264a2d4663502db36f105277b3c

            • C:\Program Files\7-Zip\7zFM.exe

              Filesize

              876KB

              MD5

              13dabdf94653e586d8e5a457b9434f17

              SHA1

              44f02a1a8e2807d474887be6a8d8909ddf12df1c

              SHA256

              f9183603e7479c1ac3422b9fe1ed70ac4a71c23710c5c5269a524b1bc61529fe

              SHA512

              9e82e6f18efa84c9e0475a98e4f2e5257c307cdda764575cd873c602c9e96fd38ca1cb9842a4757a0d6301e8cd7685810023a961a3626b32972a9fcbd5170d9d

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              474KB

              MD5

              a64de166f8c22c1e44b7ff7263bea326

              SHA1

              388e8ba3e4c703f4bb00f702a63ecf7080093fd0

              SHA256

              6820f2e67e6d6e47a41b71c6611fe20cf8eeee4355599fd581b786e273b633db

              SHA512

              1e673698dc68826055c14c1a38c5be71417a7906bebc2128271b6f756570e8c6479ad9af5c37068ce953f5e5a5e1afbd69aa042b35a519abcb229af033a9b7ea

            • F:\$RECYCLE.BIN\S-1-5-21-3425689832-2386927309-2650718742-1000\_desktop.ini

              Filesize

              10B

              MD5

              86428ee6603531dc30f2d833964489a8

              SHA1

              26490ff1d5f66b6ec70d5837997120bd2e48bd32

              SHA256

              2bb8fd0e397dc928c50505968848bcd78084b33b7fdea2d7e9aba80f2f2d3092

              SHA512

              0c02cf7936975a484a27d2db97a01896b453db68dd8dffd6153748087d4a28f0b79be481743a0fa69a0c78c4d13e87a83d6a059235c472f1762ca4de134fe65a

            • memory/1356-5-0x0000000003D90000-0x0000000003D91000-memory.dmp

              Filesize

              4KB

            • memory/1984-66-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1984-0-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1984-72-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1984-20-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1984-122-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1984-1825-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1984-14-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1984-3285-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1984-7-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB