Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-01-2024 19:31

General

  • Target

    fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe

  • Size

    2.6MB

  • MD5

    8b37dc8f3721f16ea530ebc711de945a

  • SHA1

    3d47c97027014f7977d0839f448ba9d4bc2a1e24

  • SHA256

    fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c

  • SHA512

    a4ec5dcad0cbb7aa0883ee864b5dcf5472eba47208a551775db4a3d4e270d6b8afd0de3c44590c260b2b52ef667e5515eb737c1b9dac9c93bfd8c864f74eea3b

  • SSDEEP

    49152:P/UmZmV7AEf88T1mn3b5GkxS9IaZ83TqUzbvgLow/KwyzGW4FIwxAvf/x/aPDTDH:0mYvf14/xQ83TiLQ5S09kh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3572
      • C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe
        "C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3036
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4853.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4056
          • C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe
            "C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe"
            4⤵
            • Executes dropped EXE
            PID:676
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1936
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4976
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2596

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        770e80db366145f997b81f8040496869

        SHA1

        4d924c50b0c714b97047df34a0bd4adaf2de6a83

        SHA256

        dccf1246394aab3657a9ebd19ebd4150b9420f438bd50e40aafbc8ac8d51ebdb

        SHA512

        754b5ee9fdcc4614ad626ece4d684fdc2f4b20d5c20042dba268f4c7b1c913b2b707ac1903bfb85a79598975e4b6ab4eb508660a242cb9feb2196d6368a6ff8d

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        1e01d1160ba6e43d35de151fd823151e

        SHA1

        aa378c2982b0fa49a83d04e0f7bebfe1113fd4bc

        SHA256

        a93e95c61e248218eb6cd565a920c93f42d33366e1615da351c5e4309ee9fa76

        SHA512

        faf4fa464b333397505d0221fd5c31b4d9559f0880256f67dd52470d9add4c56386494fa0f233faace154ea022cd9f78e5a25f5335e2f62170e18edc9a09dbe7

      • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

        Filesize

        481KB

        MD5

        d9a20f38778ddec5c48e2acde4956248

        SHA1

        fe41d404f38c2d570cd55158524d450f5ed50da3

        SHA256

        f39c91803fd8d891849aa7b16cd6f82fa4a3b0eaf12d6699127206f48dbf9c63

        SHA512

        c879087690924c702a818643329c7c8c2fae5fae3d9a2c6b1c5eb608f3c899ba4bd4708cde9565e957b669c09fa8ab11ad289128bc5871dd85fe4fa90c31e4b4

      • C:\Users\Admin\AppData\Local\Temp\$$a4853.bat

        Filesize

        722B

        MD5

        4e69f01d157f7befd0bf566708b5be08

        SHA1

        2edac29ba0ee6b8180bdcd9e961b9e4abde636c4

        SHA256

        da57ece2b203d64891321b279faa501967035cfd6af4eaa12fa681e412802d90

        SHA512

        5d1c8810b0e3288fb3096a6397df3ed817c7da12d5748f4448d72deb1056e039e68f7a99edbf4f0e366df0251c0aafc234489f358cf93a303d17a3fca215a1a9

      • C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe.exe

        Filesize

        2.6MB

        MD5

        4a358dcc5f694c5b6ef1c864340e2b36

        SHA1

        a3953dbb397a1f8f6eabc74d6bc7e3c02b05c2ba

        SHA256

        856c881883dce3d2bb16eb63d29c5d73a648d9bc7981b4224d550d50bc2526a9

        SHA512

        947c1b9570a8d3ff846a275226b883ad3766b25cc11afbe7d338e5c04089c814d2711f292ab8d1e373e50e2b583489695c9b89479fb5379220438d9efcc92620

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8758044db9fce67ea2ad542f86e69e57

        SHA1

        60cc4d25ea4e17f676e8ac8be10b9dfe2f7ed67d

        SHA256

        0c91b552dc6db19b6711e32cb8c9c604b60dc9d674be06cccb6adf08b4dbd82d

        SHA512

        411737be53feaef0829190b6610c729b925949bcc0b4a65063ab393acb1a92c577093e6377a373704ce54d27a593f2faddc23c80c660638f7c304a93f1972c93

      • F:\$RECYCLE.BIN\S-1-5-21-3803511929-1339359695-2191195476-1000\_desktop.ini

        Filesize

        9B

        MD5

        593130a35dad97776f4a5d8af38d4ec6

        SHA1

        d3673081d997fe2057dd0e2ce152af5369692767

        SHA256

        479ae218866e5c40d1a0e41c1e380e6c9be107e86bc4e465be1d87f77e5741e5

        SHA512

        083d63f2813ea37e914a8764a32fd2953ed74c25690696007a82f4e55ada3fcaca8c362762fb114b101840c801a522aaac2ba958a8a66e3fb86e08ccaf5e73c3

      • memory/1936-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1936-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1936-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1936-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1936-1002-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1936-1165-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1936-2007-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1936-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1936-4716-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1936-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB