Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231201-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 03:59

General

  • Target

    1d3b7afd8b8a20328057eecf47d6576c793d4a2ee161fb240bce23497ddbcdae.exe

  • Size

    26KB

  • MD5

    afad2627c96b11ad68c9d73d364eb080

  • SHA1

    be397a122b0d88bbc755aa5a70ebbb6b9e5ef0ee

  • SHA256

    1d3b7afd8b8a20328057eecf47d6576c793d4a2ee161fb240bce23497ddbcdae

  • SHA512

    c086cad946573e0cb14d18c39e3f0bd1c6db534d56a6262c9b419a34f9cb3dece42347e58764693852b1ae4b45f368f2b8350ad13168d37569a3a917203ee821

  • SSDEEP

    768:qnW1ODKAaDMG8H92RwZNQSw+JnbmQj3FZJ9Vs9XnsD:zfgLdQAQfwt7FZJ92Bs

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3468
      • C:\Users\Admin\AppData\Local\Temp\1d3b7afd8b8a20328057eecf47d6576c793d4a2ee161fb240bce23497ddbcdae.exe
        "C:\Users\Admin\AppData\Local\Temp\1d3b7afd8b8a20328057eecf47d6576c793d4a2ee161fb240bce23497ddbcdae.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5092
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2140
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1636

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        2cf41fc4ff69fc9ee439525a0bf82cc0

        SHA1

        1aee485d54083a1f7b8f068bd152355b7acd6d48

        SHA256

        e95e07df7dc359250779e234e9caceb4e760ca495dd23af4cd6acde4735202d7

        SHA512

        2cb5dd8a357536d410f5143a0d39c2622757031a2df25dff7fa59ea4a0549801a13f742a5d29678fa07d67ef8eebc05397617772678543fa182d122f86928968

      • C:\Program Files\dotnet\dotnet.exe

        Filesize

        165KB

        MD5

        9991466d3ea3686afda1b311c35234e2

        SHA1

        a047434062fb025bfb67d7603a799f3fbb2671c0

        SHA256

        f2f27d69a68a6c3f921d1163ddf5462f81ba8f1822d4a09ca35b55fbb53c5553

        SHA512

        206751bd9f34073becc28b1b482cd33b705d6145654028b59774a6a8f7293037e1895b87f47eb60f0810af9d81fa1a3d80b5783ccf0dbe097b809d0a080ec2d2

      • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

        Filesize

        481KB

        MD5

        d9a20f38778ddec5c48e2acde4956248

        SHA1

        fe41d404f38c2d570cd55158524d450f5ed50da3

        SHA256

        f39c91803fd8d891849aa7b16cd6f82fa4a3b0eaf12d6699127206f48dbf9c63

        SHA512

        c879087690924c702a818643329c7c8c2fae5fae3d9a2c6b1c5eb608f3c899ba4bd4708cde9565e957b669c09fa8ab11ad289128bc5871dd85fe4fa90c31e4b4

      • F:\$RECYCLE.BIN\S-1-5-21-2192493100-457715857-1189582111-1000\_desktop.ini

        Filesize

        10B

        MD5

        cca2df68694b7b2b5f3fcd9d48fc8b33

        SHA1

        9237896c46a87ca46bba7a1830de78405425ecf9

        SHA256

        eb7f64f08cc544ff36927d516073b4e0057282131385ffa402ee6e797f142fa4

        SHA512

        78848570be3e3b6d4a24d18322d1ebdbea4434a6120d3296b0dfe6d1678ef7e912bae6bb448600a7fc71bb56a4f5465af39883a383b1bc2ace9be435ee9d2f96

      • memory/5092-27-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5092-23-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5092-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5092-18-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5092-988-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5092-1151-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5092-2331-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5092-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5092-4704-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5092-5-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB