Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2023, 02:55

General

  • Target

    fb4f6821a87cfaa3efca0d33934bb8ada262c3d9ea61ac06a957e95e892bb4ae.exe

  • Size

    26KB

  • MD5

    cd111d097897265213e4755c19234d03

  • SHA1

    3634d0e6893b0176d30ede86f925658705d72609

  • SHA256

    fb4f6821a87cfaa3efca0d33934bb8ada262c3d9ea61ac06a957e95e892bb4ae

  • SHA512

    57092f324bcd4ad001223c9fb5a4cfaef436efa96cc17f9af44dfc7781272f08caeff9cfb0c130dab3a3bed0330c1a21527f452c09ce2cf1a946fa3233027ffe

  • SSDEEP

    768:t1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:rfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1384
      • C:\Users\Admin\AppData\Local\Temp\fb4f6821a87cfaa3efca0d33934bb8ada262c3d9ea61ac06a957e95e892bb4ae.exe
        "C:\Users\Admin\AppData\Local\Temp\fb4f6821a87cfaa3efca0d33934bb8ada262c3d9ea61ac06a957e95e892bb4ae.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2236
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1748
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1848

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        1361999d7d59c1d7fb3e41d11b20c02e

        SHA1

        780f08eb1c6d3694f2f2f0971a42cf54847e9b69

        SHA256

        767d2aa2d2735646655066a8ba5aee6cc8a8a24ead47399cff9eca2a1079b69e

        SHA512

        4e16579481ec924433a21ed9829abc1ec2d7b4ac1675fffff9ea4edd2f281bc6c1101846122887594db2a81b5bd7458187e8701f51357172693d0d336ffad814

      • C:\Program Files\7-Zip\7zFM.exe

        Filesize

        873KB

        MD5

        40f329835b94438bd1a634784872a29d

        SHA1

        2c75acb48c83121798062f887169bef3401ff879

        SHA256

        98592f2b6a2bfee1eef550051c2193285b1c3771d0df755613a67da28c3dbf51

        SHA512

        98ab4f0a98397f8fcd797445871024694a172ee0b6adf1d766b50db869cbeafbc8b6044592ce698099072435071722329c0e200b9eabe4a956bba62e489420ff

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • F:\$RECYCLE.BIN\S-1-5-21-3470981204-343661084-3367201002-1000\_desktop.ini

        Filesize

        10B

        MD5

        cca2df68694b7b2b5f3fcd9d48fc8b33

        SHA1

        9237896c46a87ca46bba7a1830de78405425ecf9

        SHA256

        eb7f64f08cc544ff36927d516073b4e0057282131385ffa402ee6e797f142fa4

        SHA512

        78848570be3e3b6d4a24d18322d1ebdbea4434a6120d3296b0dfe6d1678ef7e912bae6bb448600a7fc71bb56a4f5465af39883a383b1bc2ace9be435ee9d2f96

      • memory/1384-5-0x0000000002F10000-0x0000000002F11000-memory.dmp

        Filesize

        4KB

      • memory/2236-66-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-72-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-667-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-1825-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-14-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-2462-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-3285-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-7-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB