Analysis

  • max time kernel
    142s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 04:38

General

  • Target

    cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe

  • Size

    209KB

  • MD5

    405a0661788e1d5758d5deee5630f5e9

  • SHA1

    11a340ad45508afd012a5de55db66fa64c1f4346

  • SHA256

    cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6

  • SHA512

    804811a083df44e33c67a461d4232b524460ad4a512b3f08f0665fa93c3b0d830bd5770e661120a87639ed9b7e9b293457894bd78c93b575197ddc97547e7993

  • SSDEEP

    3072:RftffjmNXb2SNKt/CQywzDL8M5JJDhfRtHRl74DF4ODoMWpTav7Fi:ZVfjmNKAKt/CBwzDHO7cpTavR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\SysWOW64\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\$$a780.bat
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe
      "C:\Users\Admin\AppData\Local\Temp\cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe"
      2⤵
      • Executes dropped EXE
      PID:2684
  • C:\Windows\SysWOW64\net1.exe
    C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
    1⤵
      PID:2664
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:948
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      1⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3008
    • C:\Users\Admin\AppData\Local\Temp\cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe
      "C:\Users\Admin\AppData\Local\Temp\cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe"
      1⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2916
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1344

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        22243913f6f3f43a9783d9507502feef

        SHA1

        70646c3cabc5de5ff0c1c899530bb28e3bdb0e32

        SHA256

        8ee32093f71f58d09dd5fca9d1163b5e3137e7e236e136bf966855af742c70a8

        SHA512

        bd38965591aaedd8486fe9a74ba7c945a35990de0c201f398c6a0c97da3c44e9f803498448f98848104a6c4b806cf232c9184257c95bf49e1f709638a6eab43b

      • C:\Users\Admin\AppData\Local\Temp\$$a780.bat

        Filesize

        721B

        MD5

        c86dfc7371e5b046b7828e41f8c83958

        SHA1

        c2e5a00dd6a82b4d35a978e8409090d3d9416afd

        SHA256

        13e8d1afa7b0cdb994f1224e8a0a918cb594f8b307cdf527274ff8b564735664

        SHA512

        6ed40748cacddd8aa9ac5033a1017541fc5234988b6b99be157c7fbd389326eeb862e033cae3686dfa24d8c59913db567abc9e6412e5c8fa66a467c87b8bfb6d

      • C:\Users\Admin\AppData\Local\Temp\cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe

        Filesize

        93KB

        MD5

        66eb67102ea7f080c49ceb03f20553e7

        SHA1

        042ba17ff656e925630ac98ae3d32c08be670ab2

        SHA256

        705799c07f6a47b975cb754fd74564968197c0484c9843c244907f016d35b540

        SHA512

        d91bed58e0983278962f000f46362a47e3ab9cbe20abadaae619f30d99f1c66cebb137f0e2c5bcf1af5d74579740aaa1d2481953bd9105df01f8e693253c189c

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        f9e6e2b10236731c92beb834f2015421

        SHA1

        2ae694b9bf662a8eada79a37898a8f974f2adfb6

        SHA256

        4fd7b2f72cd533415bd61a541bf40384f22bd3aeaae8666131eb7b6509f7efd0

        SHA512

        9d0d2570445fc48b2bbb926aed818ea71e186935c2480014ae32de7fd38a4b02ddf33869affecb2588be07b447e13362df6858b55acc63659a6de9ad3b70099a

      • \Users\Admin\AppData\Local\Temp\cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe

        Filesize

        183KB

        MD5

        4d0ffdf38e0fed9b7ab5005adae722a4

        SHA1

        9770186a8195de2a3f63363308f35209f8a359b2

        SHA256

        21f10a13497344b35022afc7adc00329ce64ae031989ae182dc7ce20ede4c4e5

        SHA512

        029b725ac2a949fe50403c9362c308cb549644bc517083267f0d1dbbe1ae7f4d4d3e66d59289a99123fcc5b5db2854b47656f67482304acf6be15a64c37641d8

      • memory/1344-33-0x0000000002ED0000-0x0000000002ED1000-memory.dmp

        Filesize

        4KB

      • memory/2684-51-0x0000000002020000-0x0000000002060000-memory.dmp

        Filesize

        256KB

      • memory/2684-31-0x0000000000650000-0x0000000000670000-memory.dmp

        Filesize

        128KB

      • memory/2684-36-0x0000000074230000-0x000000007491E000-memory.dmp

        Filesize

        6.9MB

      • memory/2684-37-0x0000000002020000-0x0000000002060000-memory.dmp

        Filesize

        256KB

      • memory/2684-28-0x0000000000350000-0x0000000000384000-memory.dmp

        Filesize

        208KB

      • memory/2684-29-0x0000000074230000-0x000000007491E000-memory.dmp

        Filesize

        6.9MB

      • memory/2684-30-0x0000000002020000-0x0000000002060000-memory.dmp

        Filesize

        256KB

      • memory/2916-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2916-16-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2916-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-3316-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-35-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-50-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-97-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-103-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-1855-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3008-44-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB