Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 17:32

General

  • Target

    4899397070cb1ff124ff7457b43e872fd6c3d06d854bfffb4d8cdc112f9db6cc.exe

  • Size

    26KB

  • MD5

    f2cd6007528300a8009ed1a42b1c2e95

  • SHA1

    94050956f9e353a5f9046945d7319cca5b312abe

  • SHA256

    4899397070cb1ff124ff7457b43e872fd6c3d06d854bfffb4d8cdc112f9db6cc

  • SHA512

    284a090449cc06f5eb0394431b213c6e8958a8fe5c884b89c7ab259c3f5fc9be84d024479d85603c05dc1d3801441e1a8a394963573a9b4ef0025acff61d136d

  • SSDEEP

    768:61ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:8fgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\4899397070cb1ff124ff7457b43e872fd6c3d06d854bfffb4d8cdc112f9db6cc.exe
        "C:\Users\Admin\AppData\Local\Temp\4899397070cb1ff124ff7457b43e872fd6c3d06d854bfffb4d8cdc112f9db6cc.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2360
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2936
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2728

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        56e508339984e36e9c97830b83585181

        SHA1

        afd30df8b41553d9d7ef18f576ee7ef18ced4452

        SHA256

        22c6e725220677df66e6d50263bcb238c7142f816725af54c371bc55975379bd

        SHA512

        6f4a7833fc4800b835ad4c1f5ddbf1955ba5df930cc63f3dfcf7664d2915accd384c0353a0290e5d3389b1500a118007d8270ff3092769e7afb261001702bcef

      • C:\Program Files\7-Zip\7zFM.exe

        Filesize

        956KB

        MD5

        d51ac4b4991841243159aafe9bc5a962

        SHA1

        a39e3e1749fc14a4df0fc3de1b256cc3d51f0e57

        SHA256

        4906f1140a9626605e1d715b3c9b7362a88207a783bd383ab7ae172e36d294ba

        SHA512

        ca87435a99163765308857086446cafc9f0aac5782cf0241fb72b36eb421271376cdda43a5dd548c655c7558a816c2f63ee4b331478ec532bca942cd160c03a5

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • F:\$RECYCLE.BIN\S-1-5-21-2444714103-3190537498-3629098939-1000\_desktop.ini

        Filesize

        9B

        MD5

        17dd96321b176e3561b64c6ca18fcc3e

        SHA1

        eeeb96d6ade3aae107d13dee64261ae3abe01ca9

        SHA256

        eea67eaefd0090abf13b8b67f5d4692e6d8364edb3627775a60c6d67962187e0

        SHA512

        d7cb68c3d7da341df9c36b5e778876fee0df4e60d546e0c6af1994a4dfae20ca576dc879d5f4f311b38cc780411aa905d347857e11b6c099282ff7cc8be1fe36

      • memory/1208-5-0x0000000002A90000-0x0000000002A91000-memory.dmp

        Filesize

        4KB

      • memory/2360-66-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2360-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2360-72-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2360-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2360-162-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2360-1825-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2360-14-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2360-3285-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2360-7-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB