Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2023 05:18

General

  • Target

    bb25d2dbc242ffd768317addb9e76363c9a0a460c0163a276bfe87a91f934456.exe

  • Size

    42KB

  • MD5

    d5b34951a8dca6d489e070518919fd52

  • SHA1

    3116f1092675f9807c3ce194389233c738ba6cfe

  • SHA256

    bb25d2dbc242ffd768317addb9e76363c9a0a460c0163a276bfe87a91f934456

  • SHA512

    65bb0e5c3947f2220e9e6865af650056fcb221f32e191b10dc943dd6d42cbffcf9ce0da089b3dd257c48b54a8c8d44807b2ad5aee97debdc240e27b43c7eb55f

  • SSDEEP

    768:3Ak0a1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLAFIH3cINcTZl+:3Ak0cfgLdQAQfcfymNncIN+0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3304
      • C:\Users\Admin\AppData\Local\Temp\bb25d2dbc242ffd768317addb9e76363c9a0a460c0163a276bfe87a91f934456.exe
        "C:\Users\Admin\AppData\Local\Temp\bb25d2dbc242ffd768317addb9e76363c9a0a460c0163a276bfe87a91f934456.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4616
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6CA4.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4900
          • C:\Users\Admin\AppData\Local\Temp\bb25d2dbc242ffd768317addb9e76363c9a0a460c0163a276bfe87a91f934456.exe
            "C:\Users\Admin\AppData\Local\Temp\bb25d2dbc242ffd768317addb9e76363c9a0a460c0163a276bfe87a91f934456.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4996
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
              dw20.exe -x -s 796
              5⤵
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious use of AdjustPrivilegeToken
              PID:4268
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4048
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3028
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:448

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        8d59d582fbbb186f068c2bbfab86bd18

        SHA1

        7c9851aafb449128fe95bbd8d22c2cb36a9d7ca3

        SHA256

        7b9a392a5997a7c3539c6663c51f132c678ade99ef36318255babd2ceec896ca

        SHA512

        bd505d2443e1f262584101c844399c2e0b6d6bead4ee5634be8f73d137bc16bd7c29a4053450be5d180b9172895fdd2439048d5142c1fa5c684f5e086b40b092

      • C:\Users\Admin\AppData\Local\Temp\$$a6CA4.bat

        Filesize

        722B

        MD5

        3cf5ac416bb597ba3c6fb37c1e262f65

        SHA1

        a0d2935ccd73c931a6a0ed01d7b27304ca4c69ac

        SHA256

        a4e777cf1899c822961d2c0633299044355f5bca3175f1b8e4658e558979a82e

        SHA512

        14cb54d9085678d120c8b7056f19856a13f98576d0041f2a7c079c0776a9531d3b21656ec2d1bbbb8424c06d7777f0522d73e58600282088641da0e4e9495ac0

      • C:\Users\Admin\AppData\Local\Temp\bb25d2dbc242ffd768317addb9e76363c9a0a460c0163a276bfe87a91f934456.exe.exe

        Filesize

        16KB

        MD5

        4d93d50cf21f0f1a84ea1af2996be6c1

        SHA1

        ec55a931527be18314bf77ae4bd80ee98008f548

        SHA256

        dd0b0f1530e51f825f3cec81670965f2b491a11ea0a62ae689d6488c8e944604

        SHA512

        f42957ee7d85d734c7e1fb8a5de33682be24aaba4955b973e79ad6b6943b50da64233e7d2d9a1c9892a5aab78632783ca0e916409c8fd66c1ecc2c31e2e7e6a3

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8798ef6c65ae81379131a4b496ca5f7e

        SHA1

        872c6836ef2bc03c931cd6eb09d88253b7595f66

        SHA256

        3bb3b43db951b65389a3026ee287f6b5eab1fade33c6035b83d9e8be80a92dac

        SHA512

        7f11f550a995d623555f3b75a506137f44b340caceff986b57e306f10587a1361d80532ee673695e84085685cebb7ed2fe05598f03b1c970e40d053dd53e0521

      • F:\$RECYCLE.BIN\S-1-5-21-983843758-932321429-1636175382-1000\_desktop.ini

        Filesize

        10B

        MD5

        6ae4bbb9d3e346a1434f2d399af100be

        SHA1

        e63be8fa52fc60a76d359913823a751b817c3148

        SHA256

        5cf932db5360bfcd95e40b96c6d3dd91dbe41cf392173700635373c4812d3e1c

        SHA512

        f6037ec9a4bdf0c9ece35134286a6fbad645ab9c99523e1bbab0ed4f478112938f778aab2e9e03a81b71aeb054eb2dbb87f386e171b8d48a000384aa0137f9a3

      • memory/4048-29-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4048-48-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4048-2153-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4048-1181-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4048-1175-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4048-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4048-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4048-52-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4048-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4048-43-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4616-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4616-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4996-18-0x0000000074F90000-0x0000000075541000-memory.dmp

        Filesize

        5.7MB

      • memory/4996-28-0x0000000074F90000-0x0000000075541000-memory.dmp

        Filesize

        5.7MB

      • memory/4996-20-0x00000000008D0000-0x00000000008E0000-memory.dmp

        Filesize

        64KB

      • memory/4996-19-0x0000000074F90000-0x0000000075541000-memory.dmp

        Filesize

        5.7MB