Analysis

  • max time kernel
    152s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2023 04:31

General

  • Target

    8d171b98be8f635faa4be2507d6fd854bd2f4b6209f10d91b4f1dc7d9c8ad407.exe

  • Size

    26KB

  • MD5

    cf97539ab0042d947d6e4067514a55ee

  • SHA1

    940c741708bbb84c5ba81f5a89cb6f263aa96514

  • SHA256

    8d171b98be8f635faa4be2507d6fd854bd2f4b6209f10d91b4f1dc7d9c8ad407

  • SHA512

    7fc87b71a21c1157b0d99e9bbbb968bce61ebb7ecaab5e21a68801708f8bb11dac4c6e3462ddedf1144613c06a05ddb66363426ec002eaa0b4725341d3b954ef

  • SSDEEP

    768:6Dp1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:KfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d171b98be8f635faa4be2507d6fd854bd2f4b6209f10d91b4f1dc7d9c8ad407.exe
    "C:\Users\Admin\AppData\Local\Temp\8d171b98be8f635faa4be2507d6fd854bd2f4b6209f10d91b4f1dc7d9c8ad407.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
        3⤵
          PID:2124
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1244

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        6891307a264c0ac62dac07608b30d934

        SHA1

        7687165248ab474c156c834ba08c19bea20795da

        SHA256

        60648272c89fa15c6fd71f9dd83e41b9d0ca7a2bbc86e6c391f119c62cdc9b12

        SHA512

        1f280b36c21260409a01c614f73d56209a182235a512191dbae0ac1e7a2ec329f16d2164e9a0182538a57e41f3ed09677bb57db6e6d6b78131713f658b14702e

      • F:\$RECYCLE.BIN\S-1-5-21-2444714103-3190537498-3629098939-1000\_desktop.ini

        Filesize

        10B

        MD5

        157dcc32271e1367e7e2dd14aa27e5a3

        SHA1

        4971ce85072488f8136ba098ba71b0e6b45e221a

        SHA256

        763de86e71d2e922753efeaf737c37f65f77f3fdef2ae784faf43ffacf606ec8

        SHA512

        1c6e4cbf451952cdc047759d933761ae156643f6b7372a95f1a8e3739aebad946e6b1916dbb77d786316456419357d9f358034a8750e2c96938d8c915ecd46ed

      • memory/1244-5-0x0000000002A20000-0x0000000002A21000-memory.dmp

        Filesize

        4KB

      • memory/1996-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1996-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1996-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1996-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1996-67-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1996-73-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1996-77-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1996-7-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1996-1597-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1996-1828-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB