Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 17:25

General

  • Target

    30c132eb08e887792ab649c797362643.exe

  • Size

    42KB

  • MD5

    30c132eb08e887792ab649c797362643

  • SHA1

    0d8c218a3a3e203519bacd3aa8fc67b4244d7ca6

  • SHA256

    84273f2eaea783db7b16436f1a64b832d89f3be62870948c8f367ef67a79809e

  • SHA512

    a342470f8cbebbf3e965d126446c5f95734564f45e10803651cf1a966bbcc5dc10be3e7b696547ef771f4fb4f0953d3385a4071a79cb0f8f310171e1ca7de4c1

  • SSDEEP

    768:AEENWxmcnc8uK8fToRaqIjTH4uB8wP9BgUMDVStJFwwSkEZJa:HEN2myxu9Toh8cDVmq7kEZM

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\30c132eb08e887792ab649c797362643.exe
        "C:\Users\Admin\AppData\Local\Temp\30c132eb08e887792ab649c797362643.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2312
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2132
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 476
            3⤵
            • Program crash
            PID:2880

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • F:\$RECYCLE.BIN\S-1-5-21-2444714103-3190537498-3629098939-1000\_desktop.ini

        Filesize

        10B

        MD5

        dac5fda49398490d5c087360437ceda2

        SHA1

        93f612913565101624fc7a13c7e7d932bbc1a922

        SHA256

        803ca38dd859bfb259b80410b8adea5e7b38a655bc999501843102affc8ce9c5

        SHA512

        39315941c3f5f4fddfdaccd31758281415474d9f51b756f256473b1d343740fd98e7e339ede6db57765566d68da1009c8eddc4d67e59a47ed8f746ee94dea581

      • memory/1260-5-0x00000000025F0000-0x00000000025F1000-memory.dmp

        Filesize

        4KB

      • memory/2372-0-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/2372-136-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB