Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 07:51

General

  • Target

    102ca957a61c263da2b97850322455bf.exe

  • Size

    95KB

  • MD5

    102ca957a61c263da2b97850322455bf

  • SHA1

    31e394198cb598873543e1ab51ab5a8235b978e2

  • SHA256

    3fdb09ca52969e42204da872f8496ebf08ba631108daa6af1603e9cd42b8c0f4

  • SHA512

    9b010d2c6d4b1978b776edb290f26b81b9f88531384265674265fa0309f71af2d084d8bd2d519adf86a95caeff1f5abf993f14d269b9c1f92ad629b23995f9ad

  • SSDEEP

    1536:M4fgLdQAQfhJIJ0IOhdIeXQVIOUaQGqseL5t5EMlnFusG9yGYJHu0f2RKYdwCaj:HftffhJCu/IJIJaGselt5JFFN2pYO0Og

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1420
      • C:\Users\Admin\AppData\Local\Temp\102ca957a61c263da2b97850322455bf.exe
        "C:\Users\Admin\AppData\Local\Temp\102ca957a61c263da2b97850322455bf.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2056
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a8FB2.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2240
          • C:\Users\Admin\AppData\Local\Temp\102ca957a61c263da2b97850322455bf.exe
            "C:\Users\Admin\AppData\Local\Temp\102ca957a61c263da2b97850322455bf.exe"
            4⤵
            • Executes dropped EXE
            PID:2756
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2832
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2268
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2808

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              d22177d5406ae01b712a3f6711693c25

              SHA1

              0d413ce2c3645472437d933617ad749fe3f4d997

              SHA256

              d40b74f9734a92d73b20bfd2c8fcc703854325714e8fe19fdaf26eb8c0439a04

              SHA512

              cf7380b756daf84961e6ed8cdab35ffb6d57d6cf0740dfdd15a6453ebbdcb0153aef51c0d7f89551f431bab940a874eb999a0b9fbe2d090e307774e8ca7d3751

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              cd063a49bae945a38047d1627588ee01

              SHA1

              1608915d38130f68d3398c174f206dc073814e7b

              SHA256

              ae8ed667c2ef87a5a30302264032701269ee5821aa6b33343ceb404257709f38

              SHA512

              c789f3def7d88f776b609be95f98a0876f7b1126586603e77ade5554f8538acd22608484ef9978ee6e2e9214393e4c8d3c48ac22ff7ecae9a8dba9fa7cd7a39b

            • C:\Users\Admin\AppData\Local\Temp\$$a8FB2.bat

              Filesize

              530B

              MD5

              4afb44ef24233da153e2ad13cdb6bf43

              SHA1

              f201a8f1cf071516da0406e42f5388524a3254e5

              SHA256

              fff1cf8cd3a1c04a8f6b527776c62b006721e8972d00a512b4bfca6ff33e1307

              SHA512

              2904a40a35a558e2ca9584ef24afdf8fd39fe0e4c91988d92339aed69971df35b6925f40b23106661de8395830f378a3061b8bf85408813b4ccaa176c66919ac

            • C:\Users\Admin\AppData\Local\Temp\102ca957a61c263da2b97850322455bf.exe.exe

              Filesize

              69KB

              MD5

              ae374e374da6a3522d7ce982bc1fe36a

              SHA1

              ec2f2b04a63294f3e88456200db5af6074ce4f5c

              SHA256

              ffce1cc73821b24ad3f1d9de112df6fd7456c93bdb79af3ba49ec5b8239a38a1

              SHA512

              c3016f9d8f9dd30616d95792c6981cacd3d41f2531209174db1905efb249aafa92fdacc967e512592287ed284cf94b92627c87bf1fea0189f9022ebdcb8ebe8a

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              307f58c9c0de8436de6b0ea5d358513d

              SHA1

              4df05bf43764d9f3672edaa8437d371e7d145edd

              SHA256

              9937c83b61783135229b94daf2ae3c56d64811512be65892a88606aabfd03b1c

              SHA512

              5137a664de3e65b8da773c2bac730791971bad78463966c232db0cb1cc93101527c19396cd9575be6dbc2e0c75d978a62b702a435cc853ae418cae1dbf5edacf

            • F:\$RECYCLE.BIN\S-1-5-21-3427588347-1492276948-3422228430-1000\_desktop.ini

              Filesize

              10B

              MD5

              5700371755e9238ee012f3bf6444e816

              SHA1

              3a72d1425bec0ea7dcd0902e1fa7db3877eff254

              SHA256

              e089752af3f0a42db847473d9db5a45c0e8b88b0e7e108ba334c85481944a1ed

              SHA512

              c392d9271ff1f5c8bd17b90bc6ec9c30e2c6b1ce6ebde84b7e337eb07d213c68791bc344fb9a392ec81b6c763c45c16ae2b60f6c60f61e76a411375cefaeff07

            • memory/1420-31-0x00000000025A0000-0x00000000025A1000-memory.dmp

              Filesize

              4KB

            • memory/2056-12-0x0000000000220000-0x0000000000254000-memory.dmp

              Filesize

              208KB

            • memory/2056-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2056-16-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2756-29-0x0000000000400000-0x0000000000415000-memory.dmp

              Filesize

              84KB

            • memory/2832-33-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2832-40-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2832-46-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2832-92-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2832-98-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2832-172-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2832-1851-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2832-21-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2832-3311-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB