Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2024, 19:30

General

  • Target

    f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe

  • Size

    195KB

  • MD5

    1214bd3267f9298cac712c0c646ed9bc

  • SHA1

    41f0f2bd5126e8c3262853709e304a227941e46b

  • SHA256

    f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3

  • SHA512

    862960952f1a33e59f4de644a250ea76305ea8a29bcf5ac16527d72d495951bc37f525c350e7dfed35cb752a202c694841ca47cdc0e9e92e0df835edad6945c8

  • SSDEEP

    3072:MftffjmNCsJ6EQJfF//tl6DZWTot/MRK5qoYD/Z1NTAAOeA2xNSzPNAOtJe:UVfjmNC4m/yDOSUg5qoMNTA/v2SzPOO0

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe
    "C:\Users\Admin\AppData\Local\Temp\f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\$$a18DE.bat
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Users\Admin\AppData\Local\Temp\f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe
        "C:\Users\Admin\AppData\Local\Temp\f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2388
        • C:\Users\Admin\AppData\Local\Temp\GLB19A8.tmp
          C:\Users\Admin\AppData\Local\Temp\GLB19A8.tmp 4736 C:\Users\Admin\AppData\Local\Temp\F1BDD7~1.EXE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2740
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:2092
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1188

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        394daa43c3dfb483738964af17306134

        SHA1

        b99dcd69f0a6e2ba33e23b347d359a351589e055

        SHA256

        ffe70a0cdec40e7185a28d227932f211920e5d44dcbe0ec1d08ef37bd177739b

        SHA512

        5eb5e817e1622fc37880dd01d17fbe8a365943cf29f355c9911595e9b2d80de7100557ed3be8d58e4d7aca51315536d0141bd266f54535d5564116eae7abf9f1

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a18DE.bat

        Filesize

        722B

        MD5

        14b93d410780bf02eaaad6bba771e01f

        SHA1

        fb730724bbb83e4d89816f1a0fac0b32f8b5bd70

        SHA256

        8a67af27c7eea676677649cce110f277954a1369b9cfde1a00b8c709d6683e3b

        SHA512

        461693da9f3f63cf07adf167d5c05f49a8586822e0674f6f247b1efa13778159b9b1d118d72661379f274dc164b084781f48771bd56c6e75dcf304df058a4100

      • C:\Users\Admin\AppData\Local\Temp\GLB19A8.tmp

        Filesize

        70KB

        MD5

        1c648329f53fe2ec218105168678ea04

        SHA1

        869992c2b3672d935001493b058e1252bbe89b17

        SHA256

        4b5dd4a189dd3528fe5b63c9543144854b314a18e35fb7294abc6ff7d74a195a

        SHA512

        9bf119625a938549b8945c20571cfb6599f95c4a2cb00cbc893adbc760df86a85a8abea3c207dfa3c28e5c199469b65003b34b336a1e5c8ae21a9f05cf95e4a8

      • C:\Users\Admin\AppData\Local\Temp\f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe.exe

        Filesize

        169KB

        MD5

        99addfd3b91e5c2de78376dc5bbb73d1

        SHA1

        05bfadc5a8a1647f957ba5fcfdb2a061991c577a

        SHA256

        b8087b70b6d17f521aaeb17f0e1beb2e8e14608b22b66a8bc7d5ff68b0a2b742

        SHA512

        d530ae97f7bae612d60d31377a396c8a5e8bf78004e82f84b3a3d8274b1f32f435e7f1af7f5297cb1e90c406c08fe76ce8cdef042d11be659d10bfa827dc2ead

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        02d060ef4b63918c07d3c0b03d43d04c

        SHA1

        79253fc4688248e3cb38bead9930911af880ec87

        SHA256

        a707a0c51bf465916cd5ef711ddf0813f83c782a81e47f3ee2bc04539437a065

        SHA512

        4e5a8f7d7992dfec0cf4866e5e5fae60301321ff27bdd651c8a7f07c8ae340ad278fe3c9d8bdc7478c150e4f61f2211e4adf72641caf677049439494c8a521b9

      • F:\$RECYCLE.BIN\S-1-5-21-3601492379-692465709-652514833-1000\_desktop.ini

        Filesize

        9B

        MD5

        593130a35dad97776f4a5d8af38d4ec6

        SHA1

        d3673081d997fe2057dd0e2ce152af5369692767

        SHA256

        479ae218866e5c40d1a0e41c1e380e6c9be107e86bc4e465be1d87f77e5741e5

        SHA512

        083d63f2813ea37e914a8764a32fd2953ed74c25690696007a82f4e55ada3fcaca8c362762fb114b101840c801a522aaac2ba958a8a66e3fb86e08ccaf5e73c3

      • \Users\Admin\AppData\Local\Temp\GLC19C8.tmp

        Filesize

        161KB

        MD5

        09e59d00df5d2effd8dd9b30385cb9d2

        SHA1

        0fa0d3f6692f31fdabefb719b0f7a28cbf5d5415

        SHA256

        1c574eab5e83ccfe5a0bb7b59e028cc5fa2f4e77868051e305d83c709711ff77

        SHA512

        d73e3832777341a4176dbd9988002ec94a32f162492e869a8c03d9bb10f1833821f99e15710e9fc103a2820c862cf14a0b990d7c7c09150bb14618a7c93ca5fd

      • memory/1188-43-0x00000000025D0000-0x00000000025D1000-memory.dmp

        Filesize

        4KB

      • memory/2192-16-0x0000000000230000-0x0000000000264000-memory.dmp

        Filesize

        208KB

      • memory/2192-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2192-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3068-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3068-58-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3068-104-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3068-110-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3068-919-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3068-1863-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3068-52-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3068-2894-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3068-3323-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3068-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB