Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2023, 22:57

General

  • Target

    316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe

  • Size

    84KB

  • MD5

    40200b61f1beb43445ac45feb1623e11

  • SHA1

    d29e1d5018e29bc1d005773b3c81ede40a6509d7

  • SHA256

    316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f

  • SHA512

    081a10cfefd36a1382e65170b60166c54b07a16714160b72ed93bf2aac56a5a9a879a58fb3ec05775fa448080a0c5623d177eca80309ea95a16eede21cc1e3e7

  • SSDEEP

    1536:XfgLdQAQfcfymNG+Kx6kRssFOUCHaLObuc72RSciqjudzp:XftffjmNoxXRsssN1um2RwqgF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3168
      • C:\Users\Admin\AppData\Local\Temp\316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe
        "C:\Users\Admin\AppData\Local\Temp\316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8CFE.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1192
          • C:\Users\Admin\AppData\Local\Temp\316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe
            "C:\Users\Admin\AppData\Local\Temp\316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe"
            4⤵
            • Executes dropped EXE
            PID:4556
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3680
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4572
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2420

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        8492f566225e557f3908460cb8d51626

        SHA1

        f9712b88a4825f7869494e8d4c3a2ec560878b89

        SHA256

        1cbcf9daf8569840caad44f23bf4b61296f4b908472e08a5d9e425018002ee81

        SHA512

        6c6649c5464136e5929257abcc5c1fa61c0aae74d43d4332da19ff0aaa4cf683a5dc6d681d1806d8698a0bf7914200bfe14ed5009bc83c267ea2df06d6914874

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        10486053ce3a4472595173ee8618c91e

        SHA1

        314192d35b19998f7c8f4905066f340ad2ef43af

        SHA256

        3fcf2511baa791e07a985a27bd2be372c64964d216611ebea153cc6c77c06e05

        SHA512

        5f699f70e8e92c164844becd9e57e4a45b2602db75534e0dbe9ed76e7d3fc0e079d9a93af4c42e4f0df1c0e33ddaa8104f91ca7e82bfd826d9cd44e41390662f

      • C:\Users\Admin\AppData\Local\Temp\$$a8CFE.bat

        Filesize

        722B

        MD5

        495a39db28586b85045137d70e9c99f9

        SHA1

        61a32a7c07f889f009385a81ec74f5be566403b4

        SHA256

        cb2f34282e8cbd4cb3b448741c8cc2bf7479e44f946732ac523b884fa534f0bb

        SHA512

        2d28a1f05c4ff613d499692c5cd31003a0481f9013e68108a4bba71e685cad7f782153b5f27edc328b3e5f664a0dcc82a920a10f37069b4382a1569fc977eba0

      • C:\Users\Admin\AppData\Local\Temp\316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe

        Filesize

        57KB

        MD5

        fe10a00fee1b2f96d7261c5e295629c9

        SHA1

        1a173bff0227c544d7fad7f6fe2b3a9785b1e1e9

        SHA256

        38e4d1b58485e7e83f75cc0bc40b6d86b3c34b2472ca1bd87e6732de1720cc78

        SHA512

        20f490f37f2648b1fedbbe913c36ba3e779447ae85c9b559d5272b0436963e99248e48ed2f5217fe16ea18fbf89aef527a96479009f7a950b0a600191480c02a

      • C:\Users\Admin\AppData\Local\Temp\316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe.exe

        Filesize

        57KB

        MD5

        fe10a00fee1b2f96d7261c5e295629c9

        SHA1

        1a173bff0227c544d7fad7f6fe2b3a9785b1e1e9

        SHA256

        38e4d1b58485e7e83f75cc0bc40b6d86b3c34b2472ca1bd87e6732de1720cc78

        SHA512

        20f490f37f2648b1fedbbe913c36ba3e779447ae85c9b559d5272b0436963e99248e48ed2f5217fe16ea18fbf89aef527a96479009f7a950b0a600191480c02a

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        a8cc9593630738ee6e1093a6d7be47ea

        SHA1

        45d401d61a84284452f75e1e028a40d81a9aeb1a

        SHA256

        c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

        SHA512

        f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        a8cc9593630738ee6e1093a6d7be47ea

        SHA1

        45d401d61a84284452f75e1e028a40d81a9aeb1a

        SHA256

        c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

        SHA512

        f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        a8cc9593630738ee6e1093a6d7be47ea

        SHA1

        45d401d61a84284452f75e1e028a40d81a9aeb1a

        SHA256

        c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

        SHA512

        f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

      • F:\$RECYCLE.BIN\S-1-5-21-984744499-3605095035-265325720-1000\_desktop.ini

        Filesize

        10B

        MD5

        964ac8d4b418c88016736343238e671b

        SHA1

        bb68a3642be99aa9c113d48e397ad6578a3e9953

        SHA256

        930485019ca5a8337ebfc670ff859a8a828e8d23578a93af9ef0ec302cc4bc2f

        SHA512

        6e17b4086ac2efc6d57f97534b73f6a1465a75d213d0ddabf113c6b669b452ddac6ac43adeaabc3e67be53f1515fd9ff526f065d472d3f1f9a5fea16a6200846

      • memory/2584-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2584-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3680-36-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3680-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3680-29-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3680-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3680-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3680-339-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3680-1088-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3680-10-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3680-4639-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4556-30-0x00007FFC8F8D0000-0x00007FFC90391000-memory.dmp

        Filesize

        10.8MB

      • memory/4556-20-0x00007FFC8F8D0000-0x00007FFC90391000-memory.dmp

        Filesize

        10.8MB

      • memory/4556-18-0x000001FA0BD30000-0x000001FA0BD42000-memory.dmp

        Filesize

        72KB