Analysis

  • max time kernel
    149s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14/01/2024, 00:35

General

  • Target

    327a7e69cb102823ec0ff1f9cef546d465b7a67f1e38495d53129d406a14df2e.exe

  • Size

    46KB

  • MD5

    883d747a39aa4ff20c93f5732d14533f

  • SHA1

    3a8f720eae459459b6ff869b1570912062aa3d9a

  • SHA256

    327a7e69cb102823ec0ff1f9cef546d465b7a67f1e38495d53129d406a14df2e

  • SHA512

    69e00490951d97cf379267e99dc014bf2d7e15805d2995deae35baf5eec3f2816bb404dacbeb9242a2bc151c5257bd5254d9f7ab9098cee27e394dabda285b0e

  • SSDEEP

    768:kf01ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLHnV9P8fGZ2Fl/flDG7OUf2hD:FfgLdQAQfcfymNTV9q/f2OUfS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\327a7e69cb102823ec0ff1f9cef546d465b7a67f1e38495d53129d406a14df2e.exe
        "C:\Users\Admin\AppData\Local\Temp\327a7e69cb102823ec0ff1f9cef546d465b7a67f1e38495d53129d406a14df2e.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aDC6.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Users\Admin\AppData\Local\Temp\327a7e69cb102823ec0ff1f9cef546d465b7a67f1e38495d53129d406a14df2e.exe
            "C:\Users\Admin\AppData\Local\Temp\327a7e69cb102823ec0ff1f9cef546d465b7a67f1e38495d53129d406a14df2e.exe"
            4⤵
            • Executes dropped EXE
            PID:2656
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2160
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3012
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2644

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        920549b3749f17049173fc1c69ce5fcd

        SHA1

        1b5be37d2d800e23d87b4c415fdfc7ff875b8580

        SHA256

        ddaf4a789e331cc85e2503408634f6c90a5013d876588cdcd62f937159797980

        SHA512

        beb8eac40bf9fd6db8b88ecdac79afe2ced905c5216e06f3f401f536b3b1358b870470962b97b61721bfeec1820bf5446e6bce49aa5e3667e29f08ed776dcddb

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$aDC6.bat

        Filesize

        721B

        MD5

        82e433b727baeb238a1c64f331df3a4d

        SHA1

        1fe0659dd79d507542f59ab1e7ec0f12a44f9bd9

        SHA256

        c9503bae5f426f9b856ba621b78daab6acb90720be222200801dc8bafe373a80

        SHA512

        97331b83025af06be70ce6d7dbd3c98844d843d493096094a4087c7770c3b859249fa04042a62476eb0759078f09c8d20166f1259c2c86158fd0295b0f92c7ba

      • C:\Users\Admin\AppData\Local\Temp\327a7e69cb102823ec0ff1f9cef546d465b7a67f1e38495d53129d406a14df2e.exe.exe

        Filesize

        20KB

        MD5

        eecbaf85768c517873d9d252a80b195f

        SHA1

        029a51833a50acedd0cab3b4346e00c4410fe6e2

        SHA256

        db5e89efdc811020d02ecbcd908a118baadfaf65a54b2b6d8ff413a49b750e02

        SHA512

        fdd70770b4c42c03f85ce5c9b081df48313bc0415b1085193ea259c114befa93eff0136129b7d99f591268c546e8652512b468275b0b905497d576af9bdad4ec

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        f598376cea79e7f718da4683838390fe

        SHA1

        f78e230efc8c5e8c91a0b9b113ceaed1540b265a

        SHA256

        4b3bae74acc7982f6fced2e409db1a27fe3d1a12b183172722deb128d0f369fb

        SHA512

        4c522f02a7dd671865f570ca74faa19ba74287240856f8ed7c85cae0f079b66b5af92e5f4c0ec6d77b41b8c0fd58f030c7d16d20d7ad537eb9117ab7d1bbc831

      • F:\$RECYCLE.BIN\S-1-5-21-3470981204-343661084-3367201002-1000\_desktop.ini

        Filesize

        9B

        MD5

        0b7b9562015af2b7e19efc062b59ee14

        SHA1

        bca831ddb43ecb24747e57434d4b443497801c21

        SHA256

        7ef40a98b77a81085c0a426908276cbaead1573daf25f79344d7b4502d953774

        SHA512

        bd3c5f0408ac0ad1b82734cc0c4aca5fa6c96c901307f2e85dc4ce6d1db5a91ac6f7e4794e84286813fd94c648665a94f3496e5d22f6b0f624af4b795871f5a3

      • memory/1256-29-0x00000000025E0000-0x00000000025E1000-memory.dmp

        Filesize

        4KB

      • memory/2160-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2160-31-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2160-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2160-44-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2160-90-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2160-96-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2160-911-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2160-1849-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2160-2660-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2160-3309-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2824-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2824-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2824-16-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB