Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2023, 18:57

General

  • Target

    07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe

  • Size

    56KB

  • MD5

    dfd818b141baa165bf43194752aa6565

  • SHA1

    dca2e96f7dbeb397401c99d3e1183be1cc17dfb4

  • SHA256

    07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47

  • SHA512

    89312c27b7d8a9b6e36ff8e443957500687ab23a0bdfee0467180eb1c04367c84ee11cf7f2f0213469f2efd63001e80c5443444674378359848b776ecd0ef369

  • SSDEEP

    1536:XfgLdQAQfcfymNG+KxqYDK22zvgjgo5v1H:XftffjmNoxqYRVgoj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3156
      • C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe
        "C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4148
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6C75.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1212
          • C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe
            "C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe"
            4⤵
            • Executes dropped EXE
            PID:4320
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:5076
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1876
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4252

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              8492f566225e557f3908460cb8d51626

              SHA1

              f9712b88a4825f7869494e8d4c3a2ec560878b89

              SHA256

              1cbcf9daf8569840caad44f23bf4b61296f4b908472e08a5d9e425018002ee81

              SHA512

              6c6649c5464136e5929257abcc5c1fa61c0aae74d43d4332da19ff0aaa4cf683a5dc6d681d1806d8698a0bf7914200bfe14ed5009bc83c267ea2df06d6914874

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              484KB

              MD5

              10486053ce3a4472595173ee8618c91e

              SHA1

              314192d35b19998f7c8f4905066f340ad2ef43af

              SHA256

              3fcf2511baa791e07a985a27bd2be372c64964d216611ebea153cc6c77c06e05

              SHA512

              5f699f70e8e92c164844becd9e57e4a45b2602db75534e0dbe9ed76e7d3fc0e079d9a93af4c42e4f0df1c0e33ddaa8104f91ca7e82bfd826d9cd44e41390662f

            • C:\Users\Admin\AppData\Local\Temp\$$a6C75.bat

              Filesize

              722B

              MD5

              986969ffb157e6cadd1dc11e0eeb7ffa

              SHA1

              472793262721aa4acb6302b093233d4743eb37a4

              SHA256

              499adf921590e0c47c358e1b0a0c5546fab0132ed8b96b25b796c0644359ab0e

              SHA512

              377bf949ecefc43dc86464aa875e642a7205984389193312dba98f9dc5ed58275866fb1d58eae93baae4739776365dbc7a5369c08e40a9010e741e715631cfb2

            • C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe

              Filesize

              30KB

              MD5

              e5a07c7a8d47b4445318f0a34c5dcf61

              SHA1

              e33cffbf4f0d122b51cae4cb63e410d5554bfd0b

              SHA256

              8c40039fadb0a8a45d638160c8f6f5c7cc3a8b85afe2dabf494926c610348fc2

              SHA512

              c8de6f9dad39711456e0291ba72699b3a186b6132887425b16b4c7bbf380c27a16de010a4efdaf29e6216404500a4541e436dd49ecf1a814a2fa514ddcb9c7a6

            • C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe.exe

              Filesize

              30KB

              MD5

              e5a07c7a8d47b4445318f0a34c5dcf61

              SHA1

              e33cffbf4f0d122b51cae4cb63e410d5554bfd0b

              SHA256

              8c40039fadb0a8a45d638160c8f6f5c7cc3a8b85afe2dabf494926c610348fc2

              SHA512

              c8de6f9dad39711456e0291ba72699b3a186b6132887425b16b4c7bbf380c27a16de010a4efdaf29e6216404500a4541e436dd49ecf1a814a2fa514ddcb9c7a6

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              a8cc9593630738ee6e1093a6d7be47ea

              SHA1

              45d401d61a84284452f75e1e028a40d81a9aeb1a

              SHA256

              c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

              SHA512

              f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              a8cc9593630738ee6e1093a6d7be47ea

              SHA1

              45d401d61a84284452f75e1e028a40d81a9aeb1a

              SHA256

              c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

              SHA512

              f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              a8cc9593630738ee6e1093a6d7be47ea

              SHA1

              45d401d61a84284452f75e1e028a40d81a9aeb1a

              SHA256

              c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

              SHA512

              f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

            • F:\$RECYCLE.BIN\S-1-5-21-177160434-2093019976-369403398-1000\_desktop.ini

              Filesize

              10B

              MD5

              5e76cfc33a5459a5b5394ebf5b4fb5d7

              SHA1

              2f26d96447cf7431ca7ff0757b3edbae97f3c14e

              SHA256

              e4313276577226a8016efa4678d1d8357aae1ba682953d56f8b0b1d5976f5bab

              SHA512

              dd064e348691ba39ad6890deb29b6906bbc9fe4a390ae6fb3091cca3988d1757056904d1744c664113712b652ad10eba21e31b0b2df8a9e976bcaaebaedd5f79

            • memory/4148-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4148-9-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/5076-33-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/5076-26-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/5076-37-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/5076-42-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/5076-8-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/5076-492-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/5076-1084-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/5076-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/5076-4635-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB