Analysis

  • max time kernel
    153s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 23:39

General

  • Target

    d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe

  • Size

    918KB

  • MD5

    c7e520416ae7ee92a39190b75a2e0aa8

  • SHA1

    5e022239ea66321e65b0d3c7a41702fc816bdf52

  • SHA256

    d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2

  • SHA512

    61a6955047484d9970efd88960cbb2a882c9974ccd3d71f9436c79fe30f7e0c5b892d51b9c16764bb936034bbf4e5f2ad31f3cce97b0e87cc5a81886661d54ed

  • SSDEEP

    24576:k7uFZnJHW5GduFp8Zf0+JGtCGhdUsc3xp:k7WBJlut+JGUGhus

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3540
      • C:\Users\Admin\AppData\Local\Temp\d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe
        "C:\Users\Admin\AppData\Local\Temp\d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3864
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aAC2E.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4404
          • C:\Users\Admin\AppData\Local\Temp\d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe
            "C:\Users\Admin\AppData\Local\Temp\d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe"
            4⤵
            • Executes dropped EXE
            PID:4284
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3740
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1260
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2640

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              d8dcf48f9b4ac454e3ef8ae758eed524

              SHA1

              e0ee818544dad30115bfcf771beab678c51c86f0

              SHA256

              44395a6da1a22b9548c535838249509ecfaacc4b0cde7e5db8e0e844a7b93a4d

              SHA512

              4c0f8735de0e10b7230d8adf0358cf4ae7821a4f98b4c8f6e6c3f57fdd7b237ed1cc2061273f98caa888283ff4962f1859f21b9fadcd9d25ef0850e973af6651

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              570KB

              MD5

              92a8e9c7a68c186b084aa771e3c419d4

              SHA1

              a13484b718fd2ab399494db46db34de619fa80af

              SHA256

              e2087d227aa42c07543098c095917dc394bac8d0cc2a5774e773fbd24faa5f77

              SHA512

              7aab65090855b417a5b9be9d59ea8fc64b6367c715aa27f136ad5d31d32b2e833f25ee8dd4197a81780badf6d4eacfeb5736123df2e9b21e0e7e596d088bdd81

            • C:\Users\Admin\AppData\Local\Temp\$$aAC2E.bat

              Filesize

              722B

              MD5

              f05ef6caebb44cfc81b10345bab30b66

              SHA1

              c370b7a2dd3e68e2f180ebad33b192a954b48bf2

              SHA256

              f951d337a3c1076bf7e678f16bf0a657fc5db8803d468c7a43fc5183f239f8bc

              SHA512

              9007fee33d480df36e0abe3aece1797f00e1c0eed9059126dad17d7dba97f09683886cffe236883bf7bd7d658b87ce6744272fe7bec7d280e7eac718036467ad

            • C:\Users\Admin\AppData\Local\Temp\d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe.exe

              Filesize

              892KB

              MD5

              c1a6d28143d2a93d255c8f9212b09b3f

              SHA1

              59542152680d17d3726913c6b9269c644a3ea949

              SHA256

              a4bfa67a001d7da06c01e5eb8dfb199793a9befd4f6af8b3aefe3bbe1c92f8d2

              SHA512

              9ef48678b8ecff356ad3c9b2bbcf3df67fac9d31374529bc7113af23eaec9629e1ea356eb270e412321a6629b66816d3a0568a3672a9e5f861700aef46977866

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              e1890df15dc55c2cadbfdfc704d2be92

              SHA1

              ec44ef26d8a5fce8186d3b3e4a24cdd58a5e7bc3

              SHA256

              6792501c3c0083746dc4a1444a558151e021afa3e2ab1612ff6d4297b16618a8

              SHA512

              2701c3c6e42d2523b485d8d1b18521e9bbda62ae2b42d7e4e59f425a1b4da6dda82fa8ac1ca419f8663e3d9eb402dff89679704cd39a681c1668499b4b0afe2b

            • F:\$RECYCLE.BIN\S-1-5-21-3073191680-435865314-2862784915-1000\_desktop.ini

              Filesize

              9B

              MD5

              dee25c43c917307934bf50dd00d5b05b

              SHA1

              60a2c2bae4facebce85267e1824d9b4f088a36be

              SHA256

              63fd9c0290bbae6042276a04417049ff5b7bfd90a95b33df666e252b80001b6d

              SHA512

              cf67ba11732a6ed63789e272b783f66bcbddd78612e46372dc81c191dc9a07a8d264c4a397b74af8651e7d667bcea5f0c39bf4d9b074004b4bf469503df3dc6c

            • memory/3740-33-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3740-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3740-26-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3740-37-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3740-42-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3740-9-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3740-146-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3740-1165-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3740-2222-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3740-3555-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3864-10-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3864-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB