Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2023 04:57

General

  • Target

    d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe

  • Size

    61KB

  • MD5

    4a7cfec46488c4775792f654247cda5d

  • SHA1

    cee11554f8303a8c45d5ec6db89950e23e679c4d

  • SHA256

    d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4

  • SHA512

    a79fb543787476817ad0374f6982d53bc13bffeff1332a9e2094b3d14acd8ff0c9e10114d41ae852b810de6353d42bec53a473e0a2c60883def02139632d242b

  • SSDEEP

    1536:TW13SHuJV9QaxSzc1kVQctbHB1gTXL7heiEE:TAkuJVFSqctbHB1ufQJE

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe
        "C:\Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2180
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a312E.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2764
          • C:\Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe
            "C:\Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe"
            4⤵
            • Executes dropped EXE
            PID:2828
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2848
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2588

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        dfa205bb023b7bbe85172fbd45871dd8

        SHA1

        f3b5412ec65c3e81116dcf016f8bc19c6b2e51a0

        SHA256

        aec3d1874294016edf267e2e0207bedbe710396c9d29f2468c0f46d57ac00640

        SHA512

        bdf76a8fe0d49120ddf99f377e17c0a7cfe61fdb9932d4a66acb90476fe11404297357c3bbdb7f96edd156ff0848c2388042c047ff743685f85175cbd4c024ac

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        474KB

        MD5

        a129ff6e8fb70f53efa3d7ffa661a6c7

        SHA1

        08cb3f944ac454c45fa7c5dc7b4f3baa676aa427

        SHA256

        c807165aee414ab50b72e5497f2bfa612636dc7d2596c2e947c0a2985dadeab5

        SHA512

        93c3a31b918d586c845dbadd7e40ffb991445ec21e9bfe57c375d772d41e35d090ffd6d96718e21f7bae4a760a3895c4584d21f0c71919a031d287ea5f407f73

      • C:\Users\Admin\AppData\Local\Temp\$$a312E.bat

        Filesize

        722B

        MD5

        4aa882005c2e47fde07813359fcb2cd7

        SHA1

        d7fa1078661e4b92678b313089e3a90758968a35

        SHA256

        0adcccfa8ecc3913f74626a174c1313024e7d67dd22ea6912682e30a23226c8f

        SHA512

        b307b62df63e5fffb6f4af70e0cf162c4d534c148609229842a4ddcc2e191f72fa1f5e8848db7400c7f2baa910f5f6af67e901fb5e2d6ad98fdc4da19100a048

      • C:\Users\Admin\AppData\Local\Temp\$$a312E.bat

        Filesize

        722B

        MD5

        4aa882005c2e47fde07813359fcb2cd7

        SHA1

        d7fa1078661e4b92678b313089e3a90758968a35

        SHA256

        0adcccfa8ecc3913f74626a174c1313024e7d67dd22ea6912682e30a23226c8f

        SHA512

        b307b62df63e5fffb6f4af70e0cf162c4d534c148609229842a4ddcc2e191f72fa1f5e8848db7400c7f2baa910f5f6af67e901fb5e2d6ad98fdc4da19100a048

      • C:\Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe

        Filesize

        32KB

        MD5

        3de16cea01950aac6a7a5eeb8cb102b0

        SHA1

        c89dd3ce02600d1ef68a83e85947d7e8c4e62cc8

        SHA256

        cd60e89b2ff2743bad3c298ab6f44e005e4986413d1cf97bede0185ac3f12280

        SHA512

        7120b8226aac32933bc1561b432093422a4d708b3c75bd4eea506f7f6586b0014ce2debf7da71874947274632db6f7ffd67b5ec0c88dd9d8f2ecff0b34e12df2

      • C:\Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe.exe

        Filesize

        32KB

        MD5

        3de16cea01950aac6a7a5eeb8cb102b0

        SHA1

        c89dd3ce02600d1ef68a83e85947d7e8c4e62cc8

        SHA256

        cd60e89b2ff2743bad3c298ab6f44e005e4986413d1cf97bede0185ac3f12280

        SHA512

        7120b8226aac32933bc1561b432093422a4d708b3c75bd4eea506f7f6586b0014ce2debf7da71874947274632db6f7ffd67b5ec0c88dd9d8f2ecff0b34e12df2

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        82897f96ab4c9d6951949ed787ce5c87

        SHA1

        324beecf3d6dc238b525a9268aad0ea7e7d7f0ab

        SHA256

        86b5a14b0a24afb270907b76502e74d5fa0bb64417217d60c7ac7ddf11876830

        SHA512

        fbb83f707e8c5a54d5aecee752ed49799cbcea66741f1d813e3aa0286fcdc2dc85967a9fb7a20590025e3710cf0100de143bdd5d8ecdada4a50c01bd86219cc6

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        82897f96ab4c9d6951949ed787ce5c87

        SHA1

        324beecf3d6dc238b525a9268aad0ea7e7d7f0ab

        SHA256

        86b5a14b0a24afb270907b76502e74d5fa0bb64417217d60c7ac7ddf11876830

        SHA512

        fbb83f707e8c5a54d5aecee752ed49799cbcea66741f1d813e3aa0286fcdc2dc85967a9fb7a20590025e3710cf0100de143bdd5d8ecdada4a50c01bd86219cc6

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        82897f96ab4c9d6951949ed787ce5c87

        SHA1

        324beecf3d6dc238b525a9268aad0ea7e7d7f0ab

        SHA256

        86b5a14b0a24afb270907b76502e74d5fa0bb64417217d60c7ac7ddf11876830

        SHA512

        fbb83f707e8c5a54d5aecee752ed49799cbcea66741f1d813e3aa0286fcdc2dc85967a9fb7a20590025e3710cf0100de143bdd5d8ecdada4a50c01bd86219cc6

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        82897f96ab4c9d6951949ed787ce5c87

        SHA1

        324beecf3d6dc238b525a9268aad0ea7e7d7f0ab

        SHA256

        86b5a14b0a24afb270907b76502e74d5fa0bb64417217d60c7ac7ddf11876830

        SHA512

        fbb83f707e8c5a54d5aecee752ed49799cbcea66741f1d813e3aa0286fcdc2dc85967a9fb7a20590025e3710cf0100de143bdd5d8ecdada4a50c01bd86219cc6

      • F:\$RECYCLE.BIN\S-1-5-21-2952504676-3105837840-1406404655-1000\_desktop.ini

        Filesize

        10B

        MD5

        b37b393b54a7359a4db72d7ede7217d8

        SHA1

        f72b757d8b265002cdbb349b309817684b06c790

        SHA256

        b2a681fd703549670a45f0f394a78843add6199a491ec7194d74454e7fa717a7

        SHA512

        7da2eacf26b7627db3ae5f29780bb8750b618f4e56b5b6576cae090c49b417c74d0df7402c6d07d9356004a70f5e9b968c14847d652df627d6a00227966f1772

      • \Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe

        Filesize

        32KB

        MD5

        3de16cea01950aac6a7a5eeb8cb102b0

        SHA1

        c89dd3ce02600d1ef68a83e85947d7e8c4e62cc8

        SHA256

        cd60e89b2ff2743bad3c298ab6f44e005e4986413d1cf97bede0185ac3f12280

        SHA512

        7120b8226aac32933bc1561b432093422a4d708b3c75bd4eea506f7f6586b0014ce2debf7da71874947274632db6f7ffd67b5ec0c88dd9d8f2ecff0b34e12df2

      • memory/1204-29-0x0000000002A90000-0x0000000002A91000-memory.dmp

        Filesize

        4KB

      • memory/2180-12-0x00000000002A0000-0x00000000002D6000-memory.dmp

        Filesize

        216KB

      • memory/2180-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2180-16-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2672-38-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2672-44-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2672-90-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2672-96-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2672-242-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2672-1849-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2672-31-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2672-3309-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2672-21-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB