Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-02-2024 15:37
Static task
static1
Behavioral task
behavioral1
Sample
ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe
Resource
win10v2004-20231215-en
General
-
Target
ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe
-
Size
26KB
-
MD5
b25cccb89a0feb7e3ac4eb3645bf1c37
-
SHA1
ed0cd628fa91638d991a89291181753d50f88fa6
-
SHA256
ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559
-
SHA512
47fbd2771fc26ba1aa6d143db5a0acc5658e8e93556d80f7b4b00728536c472d40b018974516fb1eb1e57fe868e50b83f240439d03e685a407f64253ff85e4f1
-
SSDEEP
768:Z4Mb1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:ZBfgLdQAQfcfymN
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\H: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\G: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\X: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\R: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\P: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\M: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\E: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\Z: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\S: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\Q: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\J: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\N: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\K: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\I: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\W: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\V: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\U: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\O: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\Y: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened (read-only) \??\T: ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Java\jre7\bin\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PowerPoint.en-us\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files\Microsoft Games\Minesweeper\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SAMPLES\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files\Windows Defender\en-US\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Windows Sidebar\de-DE\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\en-US\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe File created C:\Program Files (x86)\Common Files\Services\_desktop.ini ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2476 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 28 PID 1740 wrote to memory of 2476 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 28 PID 1740 wrote to memory of 2476 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 28 PID 1740 wrote to memory of 2476 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 28 PID 2476 wrote to memory of 2216 2476 net.exe 30 PID 2476 wrote to memory of 2216 2476 net.exe 30 PID 2476 wrote to memory of 2216 2476 net.exe 30 PID 2476 wrote to memory of 2216 2476 net.exe 30 PID 1740 wrote to memory of 1224 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 10 PID 1740 wrote to memory of 1224 1740 ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe"C:\Users\Admin\AppData\Local\Temp\ac46874a139a446869704fe65d08b5e4caceb0467e840f35b21d06d0cc6f1559.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2216
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5256d414acad201f700cec31610ad17de
SHA1284a7e0863f369f13eaef1dbd2f651096d199389
SHA2568dc531b35084568416946a8e8779b998412d93ab09d2c20c0af8f92a7a025a95
SHA5122861859aa6d2f5cf559553ace080f2f9a42b19f0434a837c9da488fb164d7b9f45df038d07ba2574b02a67fc5c49419e3e5f24993667af4a6338af43fbda832b
-
Filesize
570KB
MD575c7ab1427b90af4558c04888246e953
SHA1152e18f3ef28aa74e3f9d6462c3a16e823a6a054
SHA256f570ec2ddc6a9998b11aaa2946fe30387eec9ed16ebea442b3afab73d3a5a2fd
SHA512f0c21c0f4ccb3dd8676e3e44fcd36a2b172e3518bc9ddc645cac28a183123fa3eb5224124c708e95717042624bd0740be732a1313a3452289b6bc21172711a73
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
9B
MD558264a9f16a58b1b824a9dfaa3c3567b
SHA174a18cd7f6935ebe48f4f70ccbfe8e67e323dbed
SHA2560a4f13b0dac42f75324a405211c9c6a18a53a3930a8588e76b36d88fabbf2c32
SHA51236ec0a812d4e7c9f691a489873fd28baa795a76a9d34688f6bbac29901cf946d0d549a6ca39e4e198d663f6ab47d2497288138655adbc53bd1146f22b33a8c19