Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2023 20:03

General

  • Target

    5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe

  • Size

    189KB

  • MD5

    db2d6311917f8ed73c52a9a877261d50

  • SHA1

    d494e922ae64b83200cdd3459bb32666727a5ea3

  • SHA256

    5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca

  • SHA512

    c850d9b202a559b8fc78e44c6302992e302a7f8e8a8357f490fc5187e270a801f0fcba95d1c63a8074b8dcf0e1fb80cc513b849bb3e77eb0ee15d1b94f42560a

  • SSDEEP

    3072:XftffjmNoxUJMcR/s6WeTdwzRTcP6+v8G/H4Z2GV9Zqob7ybmOHVb47DXfxcEfVF:PVfjmNDWTzRTcP6u/YZjFqhX27DZcET

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1392
      • C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe
        "C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1456
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a3FDE.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2232
          • C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe
            "C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe"
            4⤵
            • Executes dropped EXE
            PID:2732
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2244
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2152
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2960

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        8492f566225e557f3908460cb8d51626

        SHA1

        f9712b88a4825f7869494e8d4c3a2ec560878b89

        SHA256

        1cbcf9daf8569840caad44f23bf4b61296f4b908472e08a5d9e425018002ee81

        SHA512

        6c6649c5464136e5929257abcc5c1fa61c0aae74d43d4332da19ff0aaa4cf683a5dc6d681d1806d8698a0bf7914200bfe14ed5009bc83c267ea2df06d6914874

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        c6c8fde27f649c91ddaab8cb9ca344a6

        SHA1

        5e4865aec432a18107182f47edda176e8c566152

        SHA256

        32c3fed53bfc1d890e9bd1d771fdc7e2c81480e03f1425bce07b4045a192d100

        SHA512

        a8df7d1e852d871d7f16bae10c4ff049359583da88cc85a039f0298525839040d5363ce5ef4cbdb92a12a25785f73df83cf0df07752b78e6e6444f32160a2155

      • C:\Users\Admin\AppData\Local\Temp\$$a3FDE.bat

        Filesize

        722B

        MD5

        05ac16698aa9da38c4b5629b1aa5639a

        SHA1

        3e3588409983be2d1b6ee5b3a06680c3ad465bc9

        SHA256

        7b0db41b7c6cca57560b1e935666307511c52a9305d9fb5b1e8e8bf0e750f51a

        SHA512

        d12b461afdfdfb973e2ff2d20179ac41903b964e0f4027a468f6c2a9c9c0c01aba5c82764653e30ef8c5301373f938dd7ecbebf7ecf65c638f0d17b4f9969fc2

      • C:\Users\Admin\AppData\Local\Temp\$$a3FDE.bat

        Filesize

        722B

        MD5

        05ac16698aa9da38c4b5629b1aa5639a

        SHA1

        3e3588409983be2d1b6ee5b3a06680c3ad465bc9

        SHA256

        7b0db41b7c6cca57560b1e935666307511c52a9305d9fb5b1e8e8bf0e750f51a

        SHA512

        d12b461afdfdfb973e2ff2d20179ac41903b964e0f4027a468f6c2a9c9c0c01aba5c82764653e30ef8c5301373f938dd7ecbebf7ecf65c638f0d17b4f9969fc2

      • C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe

        Filesize

        162KB

        MD5

        c7575c57dd0b3e1d93b98f22281120ce

        SHA1

        6742c7a8f91bc1ad06908767b1bb01302f457bd3

        SHA256

        456be13b7bfd64a3046e06e6732880d99214669bc2c0d648e4ecffd83f9f75a5

        SHA512

        7186f700db928264bd98999732df0af1e14e4015c90658302612c166469e7a19432e3f23a2516c3be1449cf7b15cd6e957b187380598ce81bb29e719be58328b

      • C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe.exe

        Filesize

        162KB

        MD5

        c7575c57dd0b3e1d93b98f22281120ce

        SHA1

        6742c7a8f91bc1ad06908767b1bb01302f457bd3

        SHA256

        456be13b7bfd64a3046e06e6732880d99214669bc2c0d648e4ecffd83f9f75a5

        SHA512

        7186f700db928264bd98999732df0af1e14e4015c90658302612c166469e7a19432e3f23a2516c3be1449cf7b15cd6e957b187380598ce81bb29e719be58328b

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        a8cc9593630738ee6e1093a6d7be47ea

        SHA1

        45d401d61a84284452f75e1e028a40d81a9aeb1a

        SHA256

        c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

        SHA512

        f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        a8cc9593630738ee6e1093a6d7be47ea

        SHA1

        45d401d61a84284452f75e1e028a40d81a9aeb1a

        SHA256

        c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

        SHA512

        f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        a8cc9593630738ee6e1093a6d7be47ea

        SHA1

        45d401d61a84284452f75e1e028a40d81a9aeb1a

        SHA256

        c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

        SHA512

        f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        a8cc9593630738ee6e1093a6d7be47ea

        SHA1

        45d401d61a84284452f75e1e028a40d81a9aeb1a

        SHA256

        c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604

        SHA512

        f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8

      • F:\$RECYCLE.BIN\S-1-5-21-1154728922-3261336865-3456416385-1000\_desktop.ini

        Filesize

        10B

        MD5

        964ac8d4b418c88016736343238e671b

        SHA1

        bb68a3642be99aa9c113d48e397ad6578a3e9953

        SHA256

        930485019ca5a8337ebfc670ff859a8a828e8d23578a93af9ef0ec302cc4bc2f

        SHA512

        6e17b4086ac2efc6d57f97534b73f6a1465a75d213d0ddabf113c6b669b452ddac6ac43adeaabc3e67be53f1515fd9ff526f065d472d3f1f9a5fea16a6200846

      • \Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe

        Filesize

        162KB

        MD5

        c7575c57dd0b3e1d93b98f22281120ce

        SHA1

        6742c7a8f91bc1ad06908767b1bb01302f457bd3

        SHA256

        456be13b7bfd64a3046e06e6732880d99214669bc2c0d648e4ecffd83f9f75a5

        SHA512

        7186f700db928264bd98999732df0af1e14e4015c90658302612c166469e7a19432e3f23a2516c3be1449cf7b15cd6e957b187380598ce81bb29e719be58328b

      • memory/1392-29-0x00000000026D0000-0x00000000026D1000-memory.dmp

        Filesize

        4KB

      • memory/1456-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1456-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1456-20-0x00000000001B0000-0x00000000001E4000-memory.dmp

        Filesize

        208KB

      • memory/2244-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2244-44-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2244-90-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2244-96-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2244-286-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2244-1849-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2244-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2244-3309-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2244-31-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB