Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
28/11/2023, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe
Resource
win10v2004-20231127-en
General
-
Target
6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe
-
Size
29KB
-
MD5
9661b81f24b7ea820377f79efcf39e77
-
SHA1
3971ef24a80442913c381b077f2ca2b360178fe1
-
SHA256
6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f
-
SHA512
4c527b2015527f17180d5591eb784a71bccd091ab8ef098faaf9c767231a4fbacdb540ff78a8ce015cad364b4148cdd351eadfcd4a552d33c080c1870d5de7e2
-
SSDEEP
384:Nbbh3QU1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:pmU16GVRu1yK9fMnJG2V9dHS8
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\Z: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\Y: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\U: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\R: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\P: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\I: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\W: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\J: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\H: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\G: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\T: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\O: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\N: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\K: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\X: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\V: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\S: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\Q: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\M: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened (read-only) \??\L: 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\VideoLAN\VLC\lua\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files (x86)\Windows Mail\en-US\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\it-IT\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\3082\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\Google\Chrome\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\applet\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\VideoLAN\VLC\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\Windows Sidebar\en-US\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\Windows Defender\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files\Windows Journal\en-US\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2944 wrote to memory of 1740 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 28 PID 2944 wrote to memory of 1740 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 28 PID 2944 wrote to memory of 1740 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 28 PID 2944 wrote to memory of 1740 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 28 PID 1740 wrote to memory of 2152 1740 net.exe 30 PID 1740 wrote to memory of 2152 1740 net.exe 30 PID 1740 wrote to memory of 2152 1740 net.exe 30 PID 1740 wrote to memory of 2152 1740 net.exe 30 PID 2944 wrote to memory of 1260 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 15 PID 2944 wrote to memory of 1260 2944 6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe"C:\Users\Admin\AppData\Local\Temp\6109674a0cf749ef17f95ebb546eb8f785a56f22cef931d131d26970dcb9767f.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2152
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
876KB
MD597357f7b9616195924213a55215ab075
SHA1f1a292a346c027767201bb7f1f0c8bec08010e0c
SHA256b4601d8e307f9bde6be8477106c89ea19c142b945a24b899c92ce300f78d44fe
SHA51262dd102ebf952759414645f75bcc63db2feb71e66eaeba8e221e7399a98c67a0ee9e3601a692346ff44b507cfda6797cb397eeddf866d7c94c59e7786da20ac1
-
Filesize
474KB
MD52faaad87f08521fcc8daee0d433d478b
SHA1a75b87049a6c122b921f66cddeabb12502857a2f
SHA25670546de82df8bdbcd9022e1bd74a8f50d61dd19532aeaa32a69582acda025b25
SHA5121dff24a69a25f323075c8553c643c1b5bbe83a5c6d975467dabd6027ff48d0c9d0cd06ecdbf6b6a5f97a060e0353eb31898d66a9e1adcc5497e05bac06566f27
-
Filesize
10B
MD54661db9bc35ff03ce317c10340aefcf0
SHA1f0e79b1005d44e64f7166d071630e842aaa38b52
SHA2562e37d9000ca5065fbf0811fb0284a648a61c808868310caa341a73a6a7dbe665
SHA5125c3bc77c7f03b7f28b86ce8cf61f6698ac2bd7f1521af9a89bbd81f3feabbc56fd45483d157e0ceae6bcbdaefc29f5f053fd40d45d4b68ce1270c8c0dddb2269