Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/01/2024, 01:34

General

  • Target

    ffde70aaf00f9216beffe37e3c424a60d0eaa5aca230d27e03abc0c9e3986641.exe

  • Size

    4.0MB

  • MD5

    e330b40b00ef0d38fdf3b4ab182e7f6a

  • SHA1

    9615c206133b42919bafd762223a4797e06ab741

  • SHA256

    ffde70aaf00f9216beffe37e3c424a60d0eaa5aca230d27e03abc0c9e3986641

  • SHA512

    e3feeeaab863b753dcdd86a47cb8b55873fb26644dffe4da5098225ff63b08c3af5ee0d979e2cd2a74cea2fb62cae28f548f8a8becb6a55dfb29d745d1363b81

  • SSDEEP

    98304:pV/HNRtqTphSv3YNU6M/Kx31QR1M1KeUrgVi5KzKo7PBTiWekfrQLl8pph6v3YNb:phtGqArQW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3372
      • C:\Users\Admin\AppData\Local\Temp\ffde70aaf00f9216beffe37e3c424a60d0eaa5aca230d27e03abc0c9e3986641.exe
        "C:\Users\Admin\AppData\Local\Temp\ffde70aaf00f9216beffe37e3c424a60d0eaa5aca230d27e03abc0c9e3986641.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3088
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a851E.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2908
          • C:\Users\Admin\AppData\Local\Temp\ffde70aaf00f9216beffe37e3c424a60d0eaa5aca230d27e03abc0c9e3986641.exe
            "C:\Users\Admin\AppData\Local\Temp\ffde70aaf00f9216beffe37e3c424a60d0eaa5aca230d27e03abc0c9e3986641.exe"
            4⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            PID:32
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 32 -s 2096
              5⤵
              • Program crash
              PID:4100
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1436
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1120
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3600
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 32 -ip 32
        1⤵
          PID:4852

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                Filesize

                251KB

                MD5

                2df1418d5d93ba658c5bf738f86f2c57

                SHA1

                6d3d7210a0abbc91c89a15c300c4f095d6831dc2

                SHA256

                83ba73a5b0133a543ab3c508f3927b373cc033a8d1741e9239939881097d5330

                SHA512

                d213e966a95f0a119b1f4cc85f4435d19795e419024790195f3d73d3b1755de25a5cb80acf3c28f8e6aa89ece57dc4e3d79e3fbc4bfab0fe83265b7c268904d8

              • C:\Program Files\7-Zip\7z.exe

                Filesize

                570KB

                MD5

                05baee76c44269f93a7a897bf5548b88

                SHA1

                6aa08b9ce79f8c6df12d1fb423e0909e01597506

                SHA256

                ded1699e81cec2b8ad818d38eba6321b873f77fb265ea1f1c611595602d7686d

                SHA512

                74528235f06c92bec447aee635951fe92d5544d55d9a4f60a6c2e85286b0236ece11cc44f155133c6eda30c4d99980197f4560ffb7aaff218e48b81d4b948fe2

              • C:\Users\Admin\AppData\Local\Temp\$$a851E.bat

                Filesize

                722B

                MD5

                8acb5e95635af2adb315105fb87d967b

                SHA1

                9c81db185f47f9847312594d30668a344084ae53

                SHA256

                a108549ef1c2c635c5f49eb4c2f6a0cb8508b918a61c4c0c3b623c2c4b78d679

                SHA512

                d2f61af4d8764324f288f5e31d48e40d42589660311638b1239de6d13d5bc516155169d2f945b7d68c05b414fed92f6f307708c0dfa1c7637bd7ce66ab1a3454

              • C:\Users\Admin\AppData\Local\Temp\ffde70aaf00f9216beffe37e3c424a60d0eaa5aca230d27e03abc0c9e3986641.exe.exe

                Filesize

                4.0MB

                MD5

                1ccfc447d471c11751c4963ccab3d450

                SHA1

                2e024fee63798f54ea7011003e954eef05f6d44c

                SHA256

                30442c2c6f7393dc7dfacf360fcf0bd7db0a46e7f700696f523b353f5e9b9742

                SHA512

                3b7f9002577586092acc2aea87430cf19d91504400b28b0c493666b3fdcb09a15134efe6e1312d525fc050ae81403ac3a95b8ff0662c4c9bda888c38a11c0d02

              • C:\Windows\Logo1_.exe

                Filesize

                26KB

                MD5

                dfa6b07d45f524ef8dd05f58914c9329

                SHA1

                ae020ee475d1959c5d7d650ef6895a44315be3b0

                SHA256

                f755957609ff6c8afb047c2735536d3811707e89e53249c1744a64a6de66010f

                SHA512

                36d662bb68ef1891cdd3fd8041c88bffe8124b52a00caddf97d2c568808085132a70d441fb152bbdd4cda9a86605dd98cc779affdb83a50aff22e82632b6c6cf

              • F:\$RECYCLE.BIN\S-1-5-21-983843758-932321429-1636175382-1000\_desktop.ini

                Filesize

                9B

                MD5

                39ce3e4cc2510d2f607f73d7b6f70ea8

                SHA1

                aa7fa97b952d98750031aa72a36afc5a49808c7f

                SHA256

                3ab6173d3d2d0cc2d8612469c887db94171cb2507edda2cdf7c2631209b451fb

                SHA512

                41a54ebc2c6a11d658edf1927225706c6dd5ebdbc5fb74bba8ea25be01e6915e9d1edd6efd65d8653ed83013307954916f40e094fabb26317b1222a6f89b1b7f

              • memory/32-35-0x0000000074BA0000-0x0000000075350000-memory.dmp

                Filesize

                7.7MB

              • memory/32-19-0x0000000074BA0000-0x0000000075350000-memory.dmp

                Filesize

                7.7MB

              • memory/32-21-0x0000000005D30000-0x0000000005D40000-memory.dmp

                Filesize

                64KB

              • memory/32-22-0x00000000062F0000-0x0000000006894000-memory.dmp

                Filesize

                5.6MB

              • memory/32-20-0x0000000000CA0000-0x00000000010A2000-memory.dmp

                Filesize

                4.0MB

              • memory/1436-54-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/1436-36-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/1436-43-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/1436-49-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/1436-58-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/1436-10-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/1436-65-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/1436-1182-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/1436-3375-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/1436-4734-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3088-0-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/3088-8-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB