Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21/02/2024, 04:35

General

  • Target

    0a7679004328a79219f7fb3fd8ed8d963cef83087ec48f15d6b2d9b678071c91.exe

  • Size

    29KB

  • MD5

    0086f4512f050a1a5a372f850fb466c7

  • SHA1

    d4dac6aff2b4487725c2024d60bbfb32c7053bcf

  • SHA256

    0a7679004328a79219f7fb3fd8ed8d963cef83087ec48f15d6b2d9b678071c91

  • SHA512

    4376d7f9fd5c4d3b686f093a8ca5466c8a6ef949631ab9931a815b6a7f6bd9cf07b2bcb50939bd9b72d9780de5d2ec3660bd6ca1069183890ee1d688a3ad3b7a

  • SSDEEP

    384:Nbbm/vJ3I31Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:pyJY316GVRu1yK9fMnJG2V9dHS8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\0a7679004328a79219f7fb3fd8ed8d963cef83087ec48f15d6b2d9b678071c91.exe
        "C:\Users\Admin\AppData\Local\Temp\0a7679004328a79219f7fb3fd8ed8d963cef83087ec48f15d6b2d9b678071c91.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2052
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2068
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1576

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              254KB

              MD5

              0dbee6fef458b4a2670eba94cd27fb6e

              SHA1

              fb22004584d3cca7947713d75e8c6cf881b1a315

              SHA256

              d24d1418c3de8eab00e1e512b43d1f80bb53bad9a145ccc206002846ea71dcf1

              SHA512

              29570948595490f1c34a5e376ffced3239bcdc7246d25d2fe9d66350f9fad7a1b704175a2cbd0be7da9c194a0aedf0f095a43a122027cceb332113d037616bf5

            • C:\Program Files\7-Zip\7zFM.exe

              Filesize

              959KB

              MD5

              e38c4d39a6f73e6dc047a580731b671f

              SHA1

              5fe398e2fc08f4eb9d7da8ea6b91024c5090aef9

              SHA256

              c7514ee0d20692bcc7f1179b48f92084272ae11579c826a9812ff2db23f50675

              SHA512

              43a4eb74c292618ae81fd4db042895a413bd3fc73dd2690689829b906e0236c7385e75a981f94e610afe1eb2424f51c38346591b18695a2786ae4a81505e6b47

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              474KB

              MD5

              c8b2d3d2c4fcb13036393bc45124ae57

              SHA1

              9838477b6e2c4937473b8fd65efe8b1947517f25

              SHA256

              0a1aad05cf47b553f6a166b92d96edc7705fbcc764fe56cdacb6b8ef8da7e6f7

              SHA512

              a4ae2582cf4312d0116a86f0c6500a0c5d5559103b435fcb1f4a1ddfa52ec92b505b0e4b93f237b3ff60b7305408deccd394f8ea3769527d02de2c9ac2bc7f5e

            • F:\$RECYCLE.BIN\S-1-5-21-452311807-3713411997-1028535425-1000\_desktop.ini

              Filesize

              9B

              MD5

              62b5f4cbf35e0811170865d2c1b514b0

              SHA1

              eb9ab8cea4d5052efe5126141140269f2fc29e7b

              SHA256

              0c2b516efab7a741c31502cb6f7828de32cd4feb088b683d651225489f183bb3

              SHA512

              4632536c26324e72b20e87d53546ea1d012bc1f3457ce5d8e1b33dd3eebc41ad5e4a3d3f6a3a542d7ce103f95ca5a5a1973c6c036980f1e8860c6c5d93c5696f

            • memory/1248-5-0x00000000029D0000-0x00000000029D1000-memory.dmp

              Filesize

              4KB

            • memory/2052-14-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2052-20-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2052-66-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2052-72-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2052-80-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2052-0-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2052-1825-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2052-7-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2052-3285-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB