Analysis

  • max time kernel
    178s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/11/2023, 03:45

General

  • Target

    31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe

  • Size

    1.4MB

  • MD5

    b91a13d827ba32fb55c0b2576d5ad01f

  • SHA1

    c1516c3bb171d0a64b26ac3c5329466f583d1a50

  • SHA256

    31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953

  • SHA512

    55dfa395271284880eb7881279db4d10553bfb758cdd93a52c7dca2a94bdd63e05880bb601a321786a02a940bff38dd3450df148f30102bf0fa477d724420acd

  • SSDEEP

    24576:97dRxc0BCwZB2Ava3buKrnRRuo9yxyn5E1+YC4mPcWP461BFAshJO/705nzrq:97Nc8Cw72hHrnRRnk+mfC4m041Ase/7l

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe
    "C:\Users\Admin\AppData\Local\Temp\31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3840
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a867.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Users\Admin\AppData\Local\Temp\31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe
        "C:\Users\Admin\AppData\Local\Temp\31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3144
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4344
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:5036
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3320

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\CompressRequest.exe

        Filesize

        298KB

        MD5

        bddcc31874016a118e5f4f2ae5e179f6

        SHA1

        f82c257d5a45cd443c6d58e72ba8675011653223

        SHA256

        de899c50f6fd2ce7069e112023e197b45831a0afee61d050626f84fca44c679c

        SHA512

        546b2ad6b795c5a0480fa2f0e0af522a02137b48dd82b682f20178ef60d976c171016ccd76493a874b43c5e2e92abcf6dac3f51971f1a1ffbab421347ad9efb9

      • C:\Users\Admin\AppData\Local\Temp\$$a867.bat

        Filesize

        721B

        MD5

        ec7787c6edeecc1c4e21ef93f5f5e874

        SHA1

        7d6c9d98e564a15db5b4c7fa5c2d969badec2f40

        SHA256

        945685a5a09a4559dc1859c70c69ada699c25e59f9696bc09bedfc53041a267a

        SHA512

        299327d2e4276ac5d32d5715e4626f6a1a7288c2f4a6e1ad87273a5d0f0cdd4b87db174d42d8e41c629115d7febaba85a182ef7fba140bed50287d77508721bc

      • C:\Users\Admin\AppData\Local\Temp\31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe

        Filesize

        1.3MB

        MD5

        0e7f3447201121978fa8c30c64d77591

        SHA1

        639425445d9e396b888b1cb29a4ab6a6770c9ac5

        SHA256

        c65862a2655ed1aef35d3c8bbf279ffe970a1faef1d7d1c45c4ad480e755acbf

        SHA512

        ff7f637b622b35ac297f7b3bc6643c27545fa41355dfd11e56a133ecac9bbe34a22e7f8caca93ae00769fbd7dac8ff999a16e6aa4f1ec1e8276367418f3e2c0b

      • C:\Users\Admin\AppData\Local\Temp\31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe.exe

        Filesize

        1.3MB

        MD5

        0e7f3447201121978fa8c30c64d77591

        SHA1

        639425445d9e396b888b1cb29a4ab6a6770c9ac5

        SHA256

        c65862a2655ed1aef35d3c8bbf279ffe970a1faef1d7d1c45c4ad480e755acbf

        SHA512

        ff7f637b622b35ac297f7b3bc6643c27545fa41355dfd11e56a133ecac9bbe34a22e7f8caca93ae00769fbd7dac8ff999a16e6aa4f1ec1e8276367418f3e2c0b

      • C:\Users\Admin\AppData\Local\Temp\nsjF4E.tmp\System.dll

        Filesize

        11KB

        MD5

        bf712f32249029466fa86756f5546950

        SHA1

        75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

        SHA256

        7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

        SHA512

        13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        a8cc9593630738ee6e1093a6d7be47ea

        SHA1

        45d401d61a84284452f75e1e028a40d81a9aeb1a

        SHA256

        c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

        SHA512

        f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        a8cc9593630738ee6e1093a6d7be47ea

        SHA1

        45d401d61a84284452f75e1e028a40d81a9aeb1a

        SHA256

        c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

        SHA512

        f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        a8cc9593630738ee6e1093a6d7be47ea

        SHA1

        45d401d61a84284452f75e1e028a40d81a9aeb1a

        SHA256

        c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

        SHA512

        f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

      • F:\$RECYCLE.BIN\S-1-5-21-3811856890-180006922-3689258494-1000\_desktop.ini

        Filesize

        10B

        MD5

        efd2ef11e05f1e4e71c36b61f42f4b74

        SHA1

        66f050470e42f08b4f86a669c0c3e7739d334585

        SHA256

        c4d0fb64b84374af29c373ad1807dd661605dc6714e45c6617f7f5c537b9c5f4

        SHA512

        30402f761b30147ad56861e2c5da6b70c5a9056cf6b582a5c333b9f867259fd42bb2e18c8d8a43762a9365e7147d624e13f0356d307535863ba0b2c9567e486b

      • memory/2300-44-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2300-25-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2300-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2300-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2300-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2300-48-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2300-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2300-929-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2300-930-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2300-1027-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2300-1094-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3840-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3840-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB