Analysis

  • max time kernel
    152s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2023, 00:37

General

  • Target

    27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe

  • Size

    631KB

  • MD5

    b0a88542ec31b27b5a80214dd1f986a0

  • SHA1

    6d84b15665cbba4c93121eb216ac56677477ad10

  • SHA256

    27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679

  • SHA512

    abea5d2e206776362a61fa1e47b530e6f965050deae5112d20d99daa0954821e1229808e4571ecf9a3638b0a9f4b6f98e4c65f18d2ac7ad6095d654d6ebc07fe

  • SSDEEP

    12288:K7+zrVFiAFasywTUzDV7Nwk/dvbKCnGy3tcp98:K7SrszDDwk/ICG2u98

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3232
      • C:\Users\Admin\AppData\Local\Temp\27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe
        "C:\Users\Admin\AppData\Local\Temp\27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:680
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a29E9.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3432
          • C:\Users\Admin\AppData\Local\Temp\27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe
            "C:\Users\Admin\AppData\Local\Temp\27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe"
            4⤵
            • Executes dropped EXE
            PID:2516
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1408
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4572
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4388

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        48ee00228e77405f1c8a8ab779c66b3b

        SHA1

        21900c5d606474cd0b23985bfa2af241671e2492

        SHA256

        ab5b3c90b8f0aed7dea077fdae0aae58ffa3fef27df5cc40922392e9a047cd42

        SHA512

        ab67a00c1bebf0a62a384fa920f6db10f73eba0e0c303a90ba76879452a0559ae185a1a5bf7e0f85b11360bf3451f48ee36ce619015d5c368833039ad134fccd

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        dedd6b598bace785557a241a4a5edd8d

        SHA1

        5a0c5244f670373c64fe9aa8932f4d0ebf10c933

        SHA256

        df8cd7c76f52f14f7b30c69f3d35fcf01c9d0f5367ac24e1c10e59a3212615b4

        SHA512

        09d6354f912e3973bff89e9f3fcfc8cf5aa362164484881472213464f6bc3b3d5f183c9bd6141dd56b4574be59e813abf07bff2a7bb9e72d55ab2d3ca6582045

      • C:\Users\Admin\AppData\Local\Temp\$$a29E9.bat

        Filesize

        722B

        MD5

        2d90cf66ee87442285f269a32be536f0

        SHA1

        f2f3e695f654ba5c89ac66023ee534179729c80e

        SHA256

        a6c5f9ea41c5bee9756d0afbde8ce4dee515743595220105c7e48a7e7b12861b

        SHA512

        dbabc5811f610de8a6fd18af3ab11051292629cd7cf67ad079c361047d639f1ec7a987f22faedcbc4f1a477d989185a01411af350055ed821a01380e0a62a872

      • C:\Users\Admin\AppData\Local\Temp\27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe

        Filesize

        604KB

        MD5

        a879a9af3f7d91226e4ad82f9ac6436a

        SHA1

        b5f2ed114f222fe5c0ba2c9049e9191810905442

        SHA256

        63f8208e1f2560186063455c8a01f5e41e3ab40280b43c49cd4d557956b25a35

        SHA512

        688c9dc57cbe707ab42ebbd43a84ac2a7950f887f580bd686b368eecc921b2134689fcacbe8636c641b00d8fdb7d68f77d6439b6a9b0d1e9501e5e8b8324635d

      • C:\Users\Admin\AppData\Local\Temp\27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe.exe

        Filesize

        604KB

        MD5

        a879a9af3f7d91226e4ad82f9ac6436a

        SHA1

        b5f2ed114f222fe5c0ba2c9049e9191810905442

        SHA256

        63f8208e1f2560186063455c8a01f5e41e3ab40280b43c49cd4d557956b25a35

        SHA512

        688c9dc57cbe707ab42ebbd43a84ac2a7950f887f580bd686b368eecc921b2134689fcacbe8636c641b00d8fdb7d68f77d6439b6a9b0d1e9501e5e8b8324635d

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        deeeb79dbcdd21896392c99148c76a1b

        SHA1

        583ffea0d38c41c7c4ce94dc67c04f8cba670ad0

        SHA256

        15ddeadbca3438d54d250d169706de6ff313ac3b68e80c13a8466b897153047d

        SHA512

        1050b72c6faf603c07420e6dd0cd6e49d6b0b695356fa489297d0ad4af7d728fc474d32f71eea895b9a77d15eb405fbf5882cd50afed698593ea23b001320047

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        deeeb79dbcdd21896392c99148c76a1b

        SHA1

        583ffea0d38c41c7c4ce94dc67c04f8cba670ad0

        SHA256

        15ddeadbca3438d54d250d169706de6ff313ac3b68e80c13a8466b897153047d

        SHA512

        1050b72c6faf603c07420e6dd0cd6e49d6b0b695356fa489297d0ad4af7d728fc474d32f71eea895b9a77d15eb405fbf5882cd50afed698593ea23b001320047

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        deeeb79dbcdd21896392c99148c76a1b

        SHA1

        583ffea0d38c41c7c4ce94dc67c04f8cba670ad0

        SHA256

        15ddeadbca3438d54d250d169706de6ff313ac3b68e80c13a8466b897153047d

        SHA512

        1050b72c6faf603c07420e6dd0cd6e49d6b0b695356fa489297d0ad4af7d728fc474d32f71eea895b9a77d15eb405fbf5882cd50afed698593ea23b001320047

      • F:\$RECYCLE.BIN\S-1-5-21-3125601242-331447593-1512828465-1000\_desktop.ini

        Filesize

        10B

        MD5

        964ac8d4b418c88016736343238e671b

        SHA1

        bb68a3642be99aa9c113d48e397ad6578a3e9953

        SHA256

        930485019ca5a8337ebfc670ff859a8a828e8d23578a93af9ef0ec302cc4bc2f

        SHA512

        6e17b4086ac2efc6d57f97534b73f6a1465a75d213d0ddabf113c6b669b452ddac6ac43adeaabc3e67be53f1515fd9ff526f065d472d3f1f9a5fea16a6200846

      • memory/680-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/680-10-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1408-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1408-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1408-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1408-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1408-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1408-263-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1408-1084-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1408-3570-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1408-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1408-4633-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB