Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 08:30

General

  • Target

    598fea20380a4380a4eb6cfbbb6d1281c73c45c528c23736be2b35f4df001865.exe

  • Size

    26KB

  • MD5

    bf405359b979f98385108eb926d2eb85

  • SHA1

    ec22a83e4f536e951e5366f98a41ac7d01592517

  • SHA256

    598fea20380a4380a4eb6cfbbb6d1281c73c45c528c23736be2b35f4df001865

  • SHA512

    9c1b9f71b9a78c76dacd7b46735a6f7e3557d6ae448075307cbd5a0fd21e934418701fd57eeb3b381f72e1ed634d8bb2f9a3a8db39cd601237d6e8467bebced9

  • SSDEEP

    768:kfB01ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:PfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\598fea20380a4380a4eb6cfbbb6d1281c73c45c528c23736be2b35f4df001865.exe
        "C:\Users\Admin\AppData\Local\Temp\598fea20380a4380a4eb6cfbbb6d1281c73c45c528c23736be2b35f4df001865.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1380
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2668

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        ba833d02d5db93c1869525d88726eb10

        SHA1

        f6dd0b3f852926ebdd07ca02a3e2e51e49e25363

        SHA256

        91eaa026c74292178d86f86e677d562923e81001a19991929c72084b1e9faf23

        SHA512

        a5f42c614e87dc19cd839c26f21bb65177b5c012d4ca66edfe66cdf46f5905f468403d2b7a4c637745a7f03252d845e063bc74193040a52eba4f80a016fae017

      • C:\Program Files\7-Zip\7zFM.exe

        Filesize

        956KB

        MD5

        4bfe6127e8eec2dab106914c2d0dc1a4

        SHA1

        dfbb5708268d4ad37d2443b13249a0343ba957b0

        SHA256

        6dedf4db7fb245bf0d8e681104a41bb29f68b8168bc4081b761995dd9f074522

        SHA512

        bdd32a45b7541a6871dba4c37687ccd371093e353135bd57af0dfd50572cb3954840cc91fefcb9ad0d44b28650dbf80607a85138a309893d1a10347b44fa3a26

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • F:\$RECYCLE.BIN\S-1-5-21-2444714103-3190537498-3629098939-1000\_desktop.ini

        Filesize

        9B

        MD5

        7f808734d303ae0442efdfce3344deee

        SHA1

        c814ffceeaadd0b7d41254ebf9698895924d5d42

        SHA256

        5b9baea2f17425d3edf9e446b467d55f39d41faaa8dbb351fea88b88bd20e79c

        SHA512

        b0278d3f79e4d8101351196b056c29a03102cac7fce93ba755156b1706ae505eeac237f0febff2718603707499b9ace1dc9dde225230e11c875ab55471ef4e9c

      • memory/1260-5-0x00000000025F0000-0x00000000025F1000-memory.dmp

        Filesize

        4KB

      • memory/2044-66-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-72-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-226-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-1825-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-14-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-3285-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-7-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB