Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2024, 02:08

General

  • Target

    427f9615cf393b372949ae9b027a3e01.exe

  • Size

    330KB

  • MD5

    427f9615cf393b372949ae9b027a3e01

  • SHA1

    048293ce62da9d65a6df04ca57bdf0e0b90de2f6

  • SHA256

    8fd593fd43f03a3e1b2490663e0a642707b363666a653cd10fb14a3d1f2b67a7

  • SHA512

    804a90f01c9e4133684db3512202cbe7323bffe6686a7b2d5b0934d6a42ae15b12bf70bc7e4b3a8eed611e31a7da7c7c7e79573467d033db1943f916bf6fa61c

  • SSDEEP

    3072:CftffhJCu/IQqifsI2+wrIk95SICKPsyEjvTtQXkVqKgvqgyAN9tQRiBE+y/Z:SVfhgu/1x2F0iSIGN7pmvX9/Q9Z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3364
      • C:\Users\Admin\AppData\Local\Temp\427f9615cf393b372949ae9b027a3e01.exe
        "C:\Users\Admin\AppData\Local\Temp\427f9615cf393b372949ae9b027a3e01.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4576
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4FA6.bat
          3⤵
            PID:3540
            • C:\Users\Admin\AppData\Local\Temp\427f9615cf393b372949ae9b027a3e01.exe
              "C:\Users\Admin\AppData\Local\Temp\427f9615cf393b372949ae9b027a3e01.exe"
              4⤵
              • Executes dropped EXE
              PID:4880
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3268
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3936
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2904

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                Filesize

                251KB

                MD5

                d6ba8cba8342c3088ca603a7853ba889

                SHA1

                3b98fb0e636d7fa449d80f7dc03586a845ef53d6

                SHA256

                e0eef1fc8924f7f4da010520e7978d95d1f648476c5730af7ca12615452103ad

                SHA512

                fa7ee684342ecfcb1025c0722f881762c7966e25a222e7d7996601fc6698e95ce6f8d0283b2c58b95103c2e21e7c0d237182aaa7e0f569cfc7ebd9c6a227297b

              • C:\Program Files\7-Zip\7z.exe

                Filesize

                570KB

                MD5

                2f7a5573c30b7e672790196321dd9013

                SHA1

                da1afaa70ce319d719318e6479ef804619d729bd

                SHA256

                2bdacc1d61136335527942ba3c14f9fbfaace30c86e7b78657e737f64dfd6737

                SHA512

                2752c7995920d225a725596675147220179e734da38e67eb7a4e6f6ce1130f0d8c12434cf20b6dc70bef380dde28957d0b12b656cb119eee070a4752b27ee910

              • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

                Filesize

                481KB

                MD5

                3d2c4c03edc5deaff2da6b8c40b9e910

                SHA1

                00cbc9f113f6e31193b793718639b9b87dc690c8

                SHA256

                7afe05938671d682a8eeca0f48a1cf660961c82ef15879a0773b1e69f9660474

                SHA512

                0f58f88693ec448090f5d298440ac08c207978e790b2f49a0d92d93ab6e11c1a8fa78c5cd65278a83c232cb0adbd2c672c21d5c65162370c9a42065507a3c594

              • C:\Users\Admin\AppData\Local\Temp\$$a4FA6.bat

                Filesize

                530B

                MD5

                41ab740e3daedc32b0f10a9e03e64fe7

                SHA1

                4e76293aad93223604d12b7275d81e87fccb8f20

                SHA256

                142207d992dc9b5c8549957f7ba3f741af31f9ea186d389de501b5e36d1f8849

                SHA512

                63d12b0825c96bfa7a576a6f819e576c8cf177464da0c58a348d144eed67987a3d85ecf71b8c01826b28c717fc0d58fbb4814bf2234a40c58418b7f445e294d3

              • C:\Users\Admin\AppData\Local\Temp\427f9615cf393b372949ae9b027a3e01.exe.exe

                Filesize

                304KB

                MD5

                32856c61ab3c0711dbf54890dcd0755a

                SHA1

                d242f8115fec145dfdff0a0729f34991027bd7a3

                SHA256

                de6e79f384444aebb61c5d38044ea430c2911162d1a3770267a63ac2cd9c03ab

                SHA512

                00fd2b0e4965b7a85ca772a34fae8fdeca14dfc5bc347412ebe6d15017ebc07f22cd78d9f6f9f61c49ba26ba62a21bae6721488872be97a6ffd64616320f83a8

              • C:\Windows\Logo1_.exe

                Filesize

                26KB

                MD5

                4deec1ee4c508e658e9ac56bd4e367d8

                SHA1

                8449fb96da6490e6abe8e6aa9cd38051f2c39625

                SHA256

                e4af0831fd974f9cbdbeca824ddeaf6d14472d0078aeb60fc3ed31c6189a763b

                SHA512

                7fab6020e1151beec9f8bc77c520c1ae60ec76815a24fbd5551b78a696611e5f9639f34671e84885fee17a227263b4904c47deedd0734c6c5b38fddfcd908b40

              • memory/3268-38-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3268-20-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3268-27-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3268-33-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3268-42-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3268-9-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3268-1165-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3268-4717-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/4576-0-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/4576-8-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/4880-18-0x0000000000010000-0x000000000002C100-memory.dmp

                Filesize

                112KB