Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2023, 23:10

General

  • Target

    46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe

  • Size

    53KB

  • MD5

    57b9314acd1bbd7a9edac75056a9966f

  • SHA1

    7233a3c31b5add992e1a6e53877a21cbf672803c

  • SHA256

    46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53

  • SHA512

    a484a1ec10bb6cf26d21c518851c64f711a3ed3db426b90ca5065a94afa8d0a2279ddb9363e236c01ed7c1077ec3da0c996aabbeb17c8a730b5d6f201aec6adc

  • SSDEEP

    1536:c331fgLdQAQfwt7FZJ92BsooAYPJwPo5y7:cn1ftffepVPJAYPJwg5Q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3312
      • C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe
        "C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:760
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a1894.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4316
          • C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe
            "C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe"
            4⤵
            • Executes dropped EXE
            PID:4076
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4528
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4388
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3304

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              f4248ef43978b9abee5a392ad8a53570

              SHA1

              a76be5ee8ce18dcbb9beb7039ac212c33dcdfa8c

              SHA256

              03bb5c0f3c63de1ffe74ef992b0b5445904095250291b9678f342ff684babf02

              SHA512

              c43850d304970d194b548d384d31fc49afcb350bc6067f9eabbe3f7279c55815d600adee262b7ede9e86596b46cdac96756d5abdb305dcd854b96a0c6d165ad3

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              484KB

              MD5

              eb71a453ff4e8f6780e2b587b134d274

              SHA1

              136c98801e46a204e79020a36737e13d1579609a

              SHA256

              1543d9815dab4cd3cfa02ea1a18307fb35b4983759ab68b680de2cc098332cd3

              SHA512

              6cd506093ce3abe49794e0f2e997451fdedc5a1bcabee8319b86b484d6b87bced6d5a41ff382cbd9a84362db869b4445e2ec0e959cc861dbf6d1b54e0c936c79

            • C:\Users\Admin\AppData\Local\Temp\$$a1894.bat

              Filesize

              722B

              MD5

              392abaf11437023ded5ce0c55344cd09

              SHA1

              aeddb1e2bf8df1bf729e93cbba06b2567080374a

              SHA256

              7b3b85956b4c99590ea098a5d116ab47bae118313c66ebbe3f99d26ef4fe3729

              SHA512

              e17ba96efec25f931dc6ca7c5b098a68f9af46efab7b12599e85bc3246e29d165548c68c223b89fdb6872e1197dffc789253067b38b2cae6e8cf546c2e3cd1ee

            • C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe

              Filesize

              27KB

              MD5

              827a092884efbae20acbaa713a5c87c5

              SHA1

              3edac2e7b2f1adc6701ccc14a99f8050e73eb7b6

              SHA256

              77ed5d76c4185fa34b444b99859c80d4f5773c4c5a76fecca12abea40f749046

              SHA512

              25943ce74ea644a7e8a1ceb8157008c39475eec97d5f3bb1d73538f33b1a3ca6cd7cb89f81f15a0239bea35999cb949b8854db4c80f0eb2cf3ff0c2243974731

            • C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe.exe

              Filesize

              27KB

              MD5

              827a092884efbae20acbaa713a5c87c5

              SHA1

              3edac2e7b2f1adc6701ccc14a99f8050e73eb7b6

              SHA256

              77ed5d76c4185fa34b444b99859c80d4f5773c4c5a76fecca12abea40f749046

              SHA512

              25943ce74ea644a7e8a1ceb8157008c39475eec97d5f3bb1d73538f33b1a3ca6cd7cb89f81f15a0239bea35999cb949b8854db4c80f0eb2cf3ff0c2243974731

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              934cdf8e20087ae21c328ff42ebb5cb4

              SHA1

              758db62111fd17fd95c8afcec7f1f459b0b3e14b

              SHA256

              08ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c

              SHA512

              8cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              934cdf8e20087ae21c328ff42ebb5cb4

              SHA1

              758db62111fd17fd95c8afcec7f1f459b0b3e14b

              SHA256

              08ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c

              SHA512

              8cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              934cdf8e20087ae21c328ff42ebb5cb4

              SHA1

              758db62111fd17fd95c8afcec7f1f459b0b3e14b

              SHA256

              08ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c

              SHA512

              8cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c

            • F:\$RECYCLE.BIN\S-1-5-21-2231940048-779848787-2990559741-1000\_desktop.ini

              Filesize

              10B

              MD5

              0d897ff63d6d70834691031400f75fba

              SHA1

              1527f718ccce51339d233a1a409fbc4a27fe73d6

              SHA256

              4ae6beff7729c454ddd8204bac0ebeaf452455e43ffb2e7e6fef227f1ad09169

              SHA512

              6cdd19fa414b78c81ac442e75cb85fc7ec97444b80373cd4de0ca20b72f7a6a474589d44202ab04d7a493f2c202ab60951c51d031a4ff95f5a878fa93039794d

            • memory/760-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/760-10-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4528-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4528-26-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4528-33-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4528-37-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4528-42-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4528-497-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4528-1084-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4528-8-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4528-4635-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB