Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 12:33

General

  • Target

    da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe

  • Size

    101KB

  • MD5

    b04235b4ae92d1767f2f7fc1d9a57c3b

  • SHA1

    cf8f7b2ca9aa6997bff7667ee1fff95481ada42b

  • SHA256

    da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068

  • SHA512

    fb4c24bea5a31c7539a943278d5d6d76333d339580d1b3fc01d8264e3ab6cf13d68b8b915e40d2aba58abea6e728518e9831d202fc82ff9852e74f3e85ae66e6

  • SSDEEP

    3072:7eftffhJCuU1GvE4pL4zv2NL6sRe5lxe:CVfhguCGvEaL4z6Re5S

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe
    "C:\Users\Admin\AppData\Local\Temp\da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4798.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5036
      • C:\Users\Admin\AppData\Local\Temp\da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe
        "C:\Users\Admin\AppData\Local\Temp\da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe"
        3⤵
        • Executes dropped EXE
        PID:2436
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1108
  • C:\Windows\SysWOW64\net1.exe
    C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
    1⤵
      PID:1884
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:372
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3472

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              52d4dc15c2ac290bd7d8f5c88ea1ef4e

              SHA1

              a82a1d61cbb7a7a6693386e0c85c5b509c4019d6

              SHA256

              05dbcbb2ce2995b620c7f08bfc0e2d52bfc298479611d44ec8c9c50ca030cb72

              SHA512

              6d164e78fa73b899a6a1a2295de910e015408672253b4e71b772791af6aed0e5ab3149a17ab53f185671ea7093a891b1725c9c47befeabc5af5e585edc139a3e

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              570KB

              MD5

              43e285bdd6e5d3eb8ff21209d770de17

              SHA1

              b8fd2a62bc4336fe08fb219f1d7343e06524b212

              SHA256

              6372bbcf2d57bfa4b6c49029a83c882db6fffb9a74c3838eb108372cb353c11b

              SHA512

              7bc5bbfc14b73e874204a3517ca1a58e13031c68cfdbe047bd812ab9945f94952b4fedad292ba3b0027ea007470ba33f8157791bf6aa966d6766ca001c3fefcc

            • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

              Filesize

              481KB

              MD5

              e4a3af2bcbb38195944f3167e6909804

              SHA1

              063ec129648c36b23d2952e6676485859c974bcf

              SHA256

              61975168e81cca10a851d5ab360009e25b3ce0cf11d5d357fa709a418db85354

              SHA512

              f21e6f17e3cb82a70fb2613e2baa76695bc15113eb809178f98017578b1f6578d9da2547558790a640b811b5919d10792b81f34bc5cb7694a4e2b16f1d72d630

            • C:\Users\Admin\AppData\Local\Temp\$$a4798.bat

              Filesize

              722B

              MD5

              3c401f7d1b9c334f3ee3937d2cb70a9a

              SHA1

              e2799545109f758ee688e31a3968c2a08d1413fa

              SHA256

              373a21c08906831f0cc8e9fb5afb9f1ca49cb1160f2b0ad3626c29c3e4562e8d

              SHA512

              105e916f62a455c6b8923f11f6bc6a3fafc134d3f2c05f7318c0fd1f301651647e7d2f7a08598ced93f360c16b9eec451da113ac31ecf7a0e5350e4cb15a1680

            • C:\Users\Admin\AppData\Local\Temp\da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe

              Filesize

              22KB

              MD5

              82e60cd2b97cb26585ca760aa8065bb4

              SHA1

              b55b2e76717d806e589fcbb4a4973d51155fab8a

              SHA256

              5752ff2c6826f8a51fade404a894e3de65abfe7ce1e03610bae9bf5b64ce50da

              SHA512

              4cef4c9e2e2d2c2f8c2d10537071c095634345530cae162d3027958d138ca086d1bc6365cb3607b1af211e5a345a4782c6370710d0b09da66854ef163fc79e67

            • C:\Users\Admin\AppData\Local\Temp\da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe.exe

              Filesize

              25KB

              MD5

              3a3e8464237a10f1d9766d4fbef34273

              SHA1

              34898cd95900746a05b2ce44674ad0dc99b1e718

              SHA256

              b0de3fc99a468209306732387fafeb8e31c90a07c4c2edcfb371fa5988a77ae5

              SHA512

              f297e784da87db99c912cb6e076b223cc9aa215f9acc283d274b9b3209476fe9de608b37bae23d456e94597b6a81313b711213e08e91d32d5f4d6eae77ac55f5

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              3b87ff58bc104133916a7a30d3003760

              SHA1

              b9d39736d9659661bcd169f5792cd967f0ee430a

              SHA256

              2dea75339ef8773a1ba61b233c4d821f93a4eba1f7b1f776824acced8beec0ca

              SHA512

              30188c4d34cfb2b0017fb6c599c06aee4dac13cb6c4de52b08ebb3ee083791079a1e47d5f94f7772a5fbfd86fef3ddae55ba5e6dca0eaf1e61ed4b87120a8b26

            • C:\Windows\rundl132.exe

              Filesize

              25KB

              MD5

              99cd5017ef8957522b017952f9c79e06

              SHA1

              6717a42b3a4fc64e5c3173a5bf251b6478b1d03d

              SHA256

              e4033bb72e013a7aca48b7e44e4df7b78ef690564d9002af8e862ad00e2cbf78

              SHA512

              b8e6cfa0e8d004b38a087fad5f70238209d4a849d91bba17c39276e13429c218c79e031182f7b6ad9917302dc4e359a6fdb11cdbfe7c20f1993eade96947f77e

            • F:\$RECYCLE.BIN\S-1-5-21-768304381-2824894965-3840216961-1000\_desktop.ini

              Filesize

              9B

              MD5

              242aeb786105d703ec823e385bc6cb2a

              SHA1

              45c2b23f1b7d645e7345db310cb2d031d1670bdd

              SHA256

              74a26edf9895f7c6b0ecfd584a1aed3599749033a1f2388408f7f3c01eaffb4f

              SHA512

              d5006543b2a0244a9f3962dc17d760c1ebf707f958d677cb73e3063c0e6b7e59f6a2516ff5460cde828aa6685a4cd6721274b41fd8bfdf3fabec777fc3c94006

            • memory/1108-26-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1108-32-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1108-37-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1108-41-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1108-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1108-996-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1108-1165-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1108-4716-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1108-12-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1428-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1428-9-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB