Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2023, 18:57

General

  • Target

    07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe

  • Size

    56KB

  • MD5

    dfd818b141baa165bf43194752aa6565

  • SHA1

    dca2e96f7dbeb397401c99d3e1183be1cc17dfb4

  • SHA256

    07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47

  • SHA512

    89312c27b7d8a9b6e36ff8e443957500687ab23a0bdfee0467180eb1c04367c84ee11cf7f2f0213469f2efd63001e80c5443444674378359848b776ecd0ef369

  • SSDEEP

    1536:XfgLdQAQfcfymNG+KxqYDK22zvgjgo5v1H:XftffjmNoxqYRVgoj

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe
        "C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a57F0.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2188
          • C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe
            "C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe"
            4⤵
            • Executes dropped EXE
            PID:2824
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1084
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2036
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2756

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              8492f566225e557f3908460cb8d51626

              SHA1

              f9712b88a4825f7869494e8d4c3a2ec560878b89

              SHA256

              1cbcf9daf8569840caad44f23bf4b61296f4b908472e08a5d9e425018002ee81

              SHA512

              6c6649c5464136e5929257abcc5c1fa61c0aae74d43d4332da19ff0aaa4cf683a5dc6d681d1806d8698a0bf7914200bfe14ed5009bc83c267ea2df06d6914874

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              c6c8fde27f649c91ddaab8cb9ca344a6

              SHA1

              5e4865aec432a18107182f47edda176e8c566152

              SHA256

              32c3fed53bfc1d890e9bd1d771fdc7e2c81480e03f1425bce07b4045a192d100

              SHA512

              a8df7d1e852d871d7f16bae10c4ff049359583da88cc85a039f0298525839040d5363ce5ef4cbdb92a12a25785f73df83cf0df07752b78e6e6444f32160a2155

            • C:\Users\Admin\AppData\Local\Temp\$$a57F0.bat

              Filesize

              722B

              MD5

              8de34b8cbfe7b54b9426ead6d4d35f1d

              SHA1

              4ab8a30bb933bfb225991c195533de644c114d43

              SHA256

              dcb9ded77ce887695a5e8ef831bf355a339e15ee32cbd8ff5dc63959a78b9cc1

              SHA512

              015d60d3a7df54a50f5eacc481efd984a893baf09bab6e1477bd5260f204756f6bfa9316e43a14470686bd537d4fe87421d7205195663f06dd7095d8b8661cb7

            • C:\Users\Admin\AppData\Local\Temp\$$a57F0.bat

              Filesize

              722B

              MD5

              8de34b8cbfe7b54b9426ead6d4d35f1d

              SHA1

              4ab8a30bb933bfb225991c195533de644c114d43

              SHA256

              dcb9ded77ce887695a5e8ef831bf355a339e15ee32cbd8ff5dc63959a78b9cc1

              SHA512

              015d60d3a7df54a50f5eacc481efd984a893baf09bab6e1477bd5260f204756f6bfa9316e43a14470686bd537d4fe87421d7205195663f06dd7095d8b8661cb7

            • C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe

              Filesize

              30KB

              MD5

              e5a07c7a8d47b4445318f0a34c5dcf61

              SHA1

              e33cffbf4f0d122b51cae4cb63e410d5554bfd0b

              SHA256

              8c40039fadb0a8a45d638160c8f6f5c7cc3a8b85afe2dabf494926c610348fc2

              SHA512

              c8de6f9dad39711456e0291ba72699b3a186b6132887425b16b4c7bbf380c27a16de010a4efdaf29e6216404500a4541e436dd49ecf1a814a2fa514ddcb9c7a6

            • C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe.exe

              Filesize

              30KB

              MD5

              e5a07c7a8d47b4445318f0a34c5dcf61

              SHA1

              e33cffbf4f0d122b51cae4cb63e410d5554bfd0b

              SHA256

              8c40039fadb0a8a45d638160c8f6f5c7cc3a8b85afe2dabf494926c610348fc2

              SHA512

              c8de6f9dad39711456e0291ba72699b3a186b6132887425b16b4c7bbf380c27a16de010a4efdaf29e6216404500a4541e436dd49ecf1a814a2fa514ddcb9c7a6

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              a8cc9593630738ee6e1093a6d7be47ea

              SHA1

              45d401d61a84284452f75e1e028a40d81a9aeb1a

              SHA256

              c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

              SHA512

              f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              a8cc9593630738ee6e1093a6d7be47ea

              SHA1

              45d401d61a84284452f75e1e028a40d81a9aeb1a

              SHA256

              c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

              SHA512

              f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              a8cc9593630738ee6e1093a6d7be47ea

              SHA1

              45d401d61a84284452f75e1e028a40d81a9aeb1a

              SHA256

              c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

              SHA512

              f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              a8cc9593630738ee6e1093a6d7be47ea

              SHA1

              45d401d61a84284452f75e1e028a40d81a9aeb1a

              SHA256

              c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

              SHA512

              f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

            • F:\$RECYCLE.BIN\S-1-5-21-2952504676-3105837840-1406404655-1000\_desktop.ini

              Filesize

              10B

              MD5

              5e76cfc33a5459a5b5394ebf5b4fb5d7

              SHA1

              2f26d96447cf7431ca7ff0757b3edbae97f3c14e

              SHA256

              e4313276577226a8016efa4678d1d8357aae1ba682953d56f8b0b1d5976f5bab

              SHA512

              dd064e348691ba39ad6890deb29b6906bbc9fe4a390ae6fb3091cca3988d1757056904d1744c664113712b652ad10eba21e31b0b2df8a9e976bcaaebaedd5f79

            • \Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe

              Filesize

              30KB

              MD5

              e5a07c7a8d47b4445318f0a34c5dcf61

              SHA1

              e33cffbf4f0d122b51cae4cb63e410d5554bfd0b

              SHA256

              8c40039fadb0a8a45d638160c8f6f5c7cc3a8b85afe2dabf494926c610348fc2

              SHA512

              c8de6f9dad39711456e0291ba72699b3a186b6132887425b16b4c7bbf380c27a16de010a4efdaf29e6216404500a4541e436dd49ecf1a814a2fa514ddcb9c7a6

            • memory/1084-45-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1084-91-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1084-31-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1084-3310-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1084-38-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1084-18-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1084-1850-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1084-248-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1084-97-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1264-29-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

              Filesize

              4KB

            • memory/1532-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1532-39-0x0000000000260000-0x0000000000294000-memory.dmp

              Filesize

              208KB

            • memory/1532-12-0x0000000000260000-0x0000000000294000-memory.dmp

              Filesize

              208KB

            • memory/1532-16-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB