Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2024 19:31

General

  • Target

    fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe

  • Size

    2.6MB

  • MD5

    8b37dc8f3721f16ea530ebc711de945a

  • SHA1

    3d47c97027014f7977d0839f448ba9d4bc2a1e24

  • SHA256

    fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c

  • SHA512

    a4ec5dcad0cbb7aa0883ee864b5dcf5472eba47208a551775db4a3d4e270d6b8afd0de3c44590c260b2b52ef667e5515eb737c1b9dac9c93bfd8c864f74eea3b

  • SSDEEP

    49152:P/UmZmV7AEf88T1mn3b5GkxS9IaZ83TqUzbvgLow/KwyzGW4FIwxAvf/x/aPDTDH:0mYvf14/xQ83TiLQ5S09kh

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1348
      • C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe
        "C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2172
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2716
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a8353.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2988
            • C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe
              "C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe"
              4⤵
              • Executes dropped EXE
              PID:2932

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        770e80db366145f997b81f8040496869

        SHA1

        4d924c50b0c714b97047df34a0bd4adaf2de6a83

        SHA256

        dccf1246394aab3657a9ebd19ebd4150b9420f438bd50e40aafbc8ac8d51ebdb

        SHA512

        754b5ee9fdcc4614ad626ece4d684fdc2f4b20d5c20042dba268f4c7b1c913b2b707ac1903bfb85a79598975e4b6ab4eb508660a242cb9feb2196d6368a6ff8d

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        1a0dbecba0dbb963c2f3b0448796d47a

        SHA1

        5c0b5d378d3614fe984ce2915b5720886992da0c

        SHA256

        1ea2fb84177a921bc3df4763c3da53a970e192f93f6175d09696ded019e50cf8

        SHA512

        8e25dc08fa6f280a6bc1ccacb1ce665ab055b5d539f8915915fc7536c90185a221cb0c50a02d34b521b871b8487a155b9c40a5f25df87306e1df24ca7e96da25

      • C:\Users\Admin\AppData\Local\Temp\$$a8353.bat

        Filesize

        722B

        MD5

        0fa3b797134a9ea7aed086b91be80e60

        SHA1

        9a6b3ecf72255fcd80c1ceba50bc739098ddd0d2

        SHA256

        37d41faf1235a50ad188c5f16b1b83ee5f518358efb8db379a7cc1a861a04d22

        SHA512

        c58db3840dcecee1a5182436023b669cf9b2d38425df6bcfe34b888aee6ce147b64829c2f361dc48920e786bbd03d1710172f31e4d3f9f6a9c8f0b673c094219

      • C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe.exe

        Filesize

        2.6MB

        MD5

        4a358dcc5f694c5b6ef1c864340e2b36

        SHA1

        a3953dbb397a1f8f6eabc74d6bc7e3c02b05c2ba

        SHA256

        856c881883dce3d2bb16eb63d29c5d73a648d9bc7981b4224d550d50bc2526a9

        SHA512

        947c1b9570a8d3ff846a275226b883ad3766b25cc11afbe7d338e5c04089c814d2711f292ab8d1e373e50e2b583489695c9b89479fb5379220438d9efcc92620

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8758044db9fce67ea2ad542f86e69e57

        SHA1

        60cc4d25ea4e17f676e8ac8be10b9dfe2f7ed67d

        SHA256

        0c91b552dc6db19b6711e32cb8c9c604b60dc9d674be06cccb6adf08b4dbd82d

        SHA512

        411737be53feaef0829190b6610c729b925949bcc0b4a65063ab393acb1a92c577093e6377a373704ce54d27a593f2faddc23c80c660638f7c304a93f1972c93

      • F:\$RECYCLE.BIN\S-1-5-21-3427588347-1492276948-3422228430-1000\_desktop.ini

        Filesize

        9B

        MD5

        593130a35dad97776f4a5d8af38d4ec6

        SHA1

        d3673081d997fe2057dd0e2ce152af5369692767

        SHA256

        479ae218866e5c40d1a0e41c1e380e6c9be107e86bc4e465be1d87f77e5741e5

        SHA512

        083d63f2813ea37e914a8764a32fd2953ed74c25690696007a82f4e55ada3fcaca8c362762fb114b101840c801a522aaac2ba958a8a66e3fb86e08ccaf5e73c3

      • memory/1348-29-0x00000000025B0000-0x00000000025B1000-memory.dmp

        Filesize

        4KB

      • memory/1700-40-0x00000000003A0000-0x00000000003D4000-memory.dmp

        Filesize

        208KB

      • memory/1700-17-0x00000000003A0000-0x00000000003D4000-memory.dmp

        Filesize

        208KB

      • memory/1700-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1700-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2840-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2840-47-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2840-92-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2840-98-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2840-248-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2840-1851-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2840-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2840-3311-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2840-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB