Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 23:36

General

  • Target

    a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe

  • Size

    91KB

  • MD5

    e18931b191f6ac84eadcadc94c0a9a4d

  • SHA1

    6cb83d903daa257d3f02a4acd63efeebd3efc34a

  • SHA256

    a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08

  • SHA512

    63faf99ecf092f3671d1013100f17a07f27842eadcacdacb08105d0c1026e013432d54bd4ea9055966ac3b1d1065e1aa41920117bca4fa1ea9a1b2cff9a7d83b

  • SSDEEP

    1536:ifgLdQAQfcfymNtT23xP9e3VEs096VPOnQ61cmg6agxCxyk:iftffjmNoxP900sVOnQ61lgDgdk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe
    "C:\Users\Admin\AppData\Local\Temp\a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5311.bat
      2⤵
        PID:3068
        • C:\Users\Admin\AppData\Local\Temp\a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe
          "C:\Users\Admin\AppData\Local\Temp\a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe"
          3⤵
          • Executes dropped EXE
          PID:444
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1484
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
        2⤵
          PID:3744
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:3496

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          251KB

          MD5

          f8afecebe68f7cfe45aa9e6945db303b

          SHA1

          5f8d6941a67cde0d85cf4a346880039e084918c0

          SHA256

          c2b823c2433eed38663efa68bfe2c01aeadad2b17dbd5c865fa87725834bcbce

          SHA512

          4ebcb391fc3ceca2f3086f3b8a2970b7424c1080261860387f63ebffec172d03729f042253ae2913724821a39ddd0570b41668c3412c22d6c92143f3fc73b856

        • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

          Filesize

          481KB

          MD5

          1db5b390daa2d070657fbdb4f5d2cc55

          SHA1

          77e633e49df484b827080753514cc376749b0ceb

          SHA256

          d5fbaf5c0d8e313d4dad23b28cac4256c5dbed6ab3b0d797e2971f30c5e095ad

          SHA512

          68aa0152f5aae79a146c1813915fd16ec5454b285bd1781370923f97d6c147d53684192f7f4161e5c1a340959ec432ecaac127b0abe7d08f70c387e08ee4f617

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          8f8f7d1283da7486a98b4753427866fc

          SHA1

          721e29e2ac62c4a7a74d0efebab549d124763edb

          SHA256

          45a7aa639e9b93c7f2facf50c3bb34eef44407120ad89b162e6b7a4ef1be6ea1

          SHA512

          0ae3b0f32409018f2786d2e529ececffc78e39f964f5b52b6599492a94428737a76cbb1e1ef295e336cf111427b3c83041a39f82b964219e9560c3e0868d5076

        • F:\$RECYCLE.BIN\S-1-5-21-768304381-2824894965-3840216961-1000\_desktop.ini

          Filesize

          10B

          MD5

          3fb21251990dd269f80f958b0a71ed77

          SHA1

          5a505ccb9a59661e62ae104e2ff3ec8f2aa4cf5e

          SHA256

          cb4d0049abaf6aa0990ec6488c023f61ef8f9bdcd7b82a814db7264271f060ec

          SHA512

          3d401e86df952aa0bd86740f17df566b9800ce0aea48c9f61623d934436317038aebbcceaed0bc4cf38ce153b9ad8e853bb20aba42267563fc9ad96a99d0c637

        • memory/1484-37-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1484-26-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1484-33-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1484-41-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1484-19-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1484-1002-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1484-1165-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1484-2179-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1484-4716-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1484-10-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2164-0-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2164-8-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB