Analysis

  • max time kernel
    116s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2023, 10:12

General

  • Target

    a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe

  • Size

    3.4MB

  • MD5

    ba28fceeae6be85d8802b6fe7a78d2b0

  • SHA1

    f4515943b2958cfd3eef1c18cd6cde09b48e7148

  • SHA256

    a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd

  • SHA512

    b890ab04534d23838092b845c1a93b444e9244fd0c5e6ca15f7543b310c0247fb2f3e851160cfc1f2151b6e8ad19dee0d49fc9658aab159c025800e68ac4e4e0

  • SSDEEP

    49152:x7k2o5B4fySm4ldRpm7YJPoTrK92EGK72a4XfLGXS+OwX10otPXwYdGSBb+6mhW3:W2oZgdRpmEJPh92q4jG7yohwYkYb1feU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3304
      • C:\Users\Admin\AppData\Local\Temp\a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe
        "C:\Users\Admin\AppData\Local\Temp\a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4864
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE14.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3528
          • C:\Users\Admin\AppData\Local\Temp\a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe
            "C:\Users\Admin\AppData\Local\Temp\a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:4912
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:400
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2316
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1364

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        fe3c0915b18cdcfd2e6d8e541fbcff49

        SHA1

        d4b2ea24a4cf9484f635ee70d4362542ff897b45

        SHA256

        92f9b9cac114bcd198f3a08fb197d569b0c07d0c3b8058443a61d2813631fcb7

        SHA512

        38059db3bea09b9e6f705269f4f0dbef720d9a36b735830bdd930c554e6182b52eee93fa24b577b5262d1f8f9a9975b943cfdcdefe456a77a52eb89c032d22e3

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        4b659fca10ac85acf9fe2ff2c868e6fb

        SHA1

        8214964a49fff64a3b3348f3ae48a1ec358b29da

        SHA256

        aeb297804b4454a5adee5cb716ce4d4eb7424be928c27e6bb6cf04868a1b91d3

        SHA512

        4d1803cd74f0faf2ded523cca4d08aa6e068b4e8c7e2f56fb851bc121c57762acf664985636ea7fd6bb32cc69ef7ba77bdf140f03cb49c6beb996d6c2616c07b

      • C:\Users\Admin\AppData\Local\Temp\$$aE14.bat

        Filesize

        721B

        MD5

        02e1e05ee0ef474685e75df685660b21

        SHA1

        30ac4ecd414447f3583b49f7b1f9330df6072187

        SHA256

        1a633b48c1c4575e5e7ac2bc3e610a939fd01266451d76c9bbdb15a8c4588939

        SHA512

        c6663237b29d9ae92da6cb639a9f00c477b5e47d42e0a73d3245464d5e29eab081e266f44b6ddc26abf7126d37dac78c5e5eb6f55cb1dab2f000fbdf2592a554

      • C:\Users\Admin\AppData\Local\Temp\a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe

        Filesize

        3.4MB

        MD5

        e3215dcff91c5b77302252eb3fd54dea

        SHA1

        be5f1bf9ed7a5bce8b728a0d284bfddcbbbca815

        SHA256

        09a8a4d829cbceb3b7f13343d481ec1c51420cdbe5c8ffc728d4e8fb3cf6f927

        SHA512

        0f831f8a6435be7ae9f9a50a012389305f182fc5bc90d838a42af7bed79c1cfd51e6cdb399d3536241529d4210289fa76903e863ad965e53ed446c221d4c5f63

      • C:\Users\Admin\AppData\Local\Temp\a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe.exe

        Filesize

        3.4MB

        MD5

        e3215dcff91c5b77302252eb3fd54dea

        SHA1

        be5f1bf9ed7a5bce8b728a0d284bfddcbbbca815

        SHA256

        09a8a4d829cbceb3b7f13343d481ec1c51420cdbe5c8ffc728d4e8fb3cf6f927

        SHA512

        0f831f8a6435be7ae9f9a50a012389305f182fc5bc90d838a42af7bed79c1cfd51e6cdb399d3536241529d4210289fa76903e863ad965e53ed446c221d4c5f63

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        f6dcc7601bfee4410b3b95af8ef15b79

        SHA1

        a10a8983ff50f3f73022ee804ec391ed5d47ff5f

        SHA256

        521365ec23aafafa12cce3816a31f0f682def1dc5f249c1be9d0b7388f7553d5

        SHA512

        dd7fde23bd6e347711d7cb93a44d08829f3a38f2b772ae4842df09f26b1d19a02495cba7e1e1f08322cce0bc2294e3a8c109f446f98edbfc7e603ac3c46f55a3

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        f6dcc7601bfee4410b3b95af8ef15b79

        SHA1

        a10a8983ff50f3f73022ee804ec391ed5d47ff5f

        SHA256

        521365ec23aafafa12cce3816a31f0f682def1dc5f249c1be9d0b7388f7553d5

        SHA512

        dd7fde23bd6e347711d7cb93a44d08829f3a38f2b772ae4842df09f26b1d19a02495cba7e1e1f08322cce0bc2294e3a8c109f446f98edbfc7e603ac3c46f55a3

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        f6dcc7601bfee4410b3b95af8ef15b79

        SHA1

        a10a8983ff50f3f73022ee804ec391ed5d47ff5f

        SHA256

        521365ec23aafafa12cce3816a31f0f682def1dc5f249c1be9d0b7388f7553d5

        SHA512

        dd7fde23bd6e347711d7cb93a44d08829f3a38f2b772ae4842df09f26b1d19a02495cba7e1e1f08322cce0bc2294e3a8c109f446f98edbfc7e603ac3c46f55a3

      • F:\$RECYCLE.BIN\S-1-5-21-3125601242-331447593-1512828465-1000\_desktop.ini

        Filesize

        10B

        MD5

        1ac6500de33f973231298e1a1e1e7b38

        SHA1

        ab3a765fb39e758f638f6b49a841300ec61ff961

        SHA256

        f1e760f9e9b5eaeaa02cb5ca5dfc3ef6a19147a66053ed02ac52b7e2ce05a050

        SHA512

        25253907de7da7ecca0a76dfd1fb864992bc6bc092f29efb789ec2ad4d70aba377e0e28b4f64f602818ba9aefa83dc3454f07c58efdb90f38e0831354ce53f37

      • memory/400-4635-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/400-1086-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/400-2043-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/400-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/400-28-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/400-34-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/400-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/400-43-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/400-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/400-547-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4864-13-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4864-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4912-19-0x0000000000C30000-0x0000000000F74000-memory.dmp

        Filesize

        3.3MB

      • memory/4912-18-0x0000000000C30000-0x0000000000F74000-memory.dmp

        Filesize

        3.3MB