Analysis

  • max time kernel
    154s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/02/2024, 04:35

General

  • Target

    0a7679004328a79219f7fb3fd8ed8d963cef83087ec48f15d6b2d9b678071c91.exe

  • Size

    29KB

  • MD5

    0086f4512f050a1a5a372f850fb466c7

  • SHA1

    d4dac6aff2b4487725c2024d60bbfb32c7053bcf

  • SHA256

    0a7679004328a79219f7fb3fd8ed8d963cef83087ec48f15d6b2d9b678071c91

  • SHA512

    4376d7f9fd5c4d3b686f093a8ca5466c8a6ef949631ab9931a815b6a7f6bd9cf07b2bcb50939bd9b72d9780de5d2ec3660bd6ca1069183890ee1d688a3ad3b7a

  • SSDEEP

    384:Nbbm/vJ3I31Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:pyJY316GVRu1yK9fMnJG2V9dHS8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3480
      • C:\Users\Admin\AppData\Local\Temp\0a7679004328a79219f7fb3fd8ed8d963cef83087ec48f15d6b2d9b678071c91.exe
        "C:\Users\Admin\AppData\Local\Temp\0a7679004328a79219f7fb3fd8ed8d963cef83087ec48f15d6b2d9b678071c91.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3080
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:984
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:4332

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        0dbee6fef458b4a2670eba94cd27fb6e

        SHA1

        fb22004584d3cca7947713d75e8c6cf881b1a315

        SHA256

        d24d1418c3de8eab00e1e512b43d1f80bb53bad9a145ccc206002846ea71dcf1

        SHA512

        29570948595490f1c34a5e376ffced3239bcdc7246d25d2fe9d66350f9fad7a1b704175a2cbd0be7da9c194a0aedf0f095a43a122027cceb332113d037616bf5

      • C:\Program Files\dotnet\dotnet.exe

        Filesize

        168KB

        MD5

        f3b33477937137c268d3c6bef6b62171

        SHA1

        9e44a494f435422a5a9a769ca9007e19748580e3

        SHA256

        0b12a0a148d2b467cba566504bd8742e768d269cff723809f59e1edee082ea28

        SHA512

        5b6bcfdd82c04b3cd39af51c2aaf73b66446d2f10948f3af99f249df9a354c9dd7b2d1c9ea4ac23a49c6275a2643d34a47bc700d9d12eb354f8eba527cdad917

      • F:\$RECYCLE.BIN\S-1-5-21-3073191680-435865314-2862784915-1000\_desktop.ini

        Filesize

        9B

        MD5

        62b5f4cbf35e0811170865d2c1b514b0

        SHA1

        eb9ab8cea4d5052efe5126141140269f2fc29e7b

        SHA256

        0c2b516efab7a741c31502cb6f7828de32cd4feb088b683d651225489f183bb3

        SHA512

        4632536c26324e72b20e87d53546ea1d012bc1f3457ce5d8e1b33dd3eebc41ad5e4a3d3f6a3a542d7ce103f95ca5a5a1973c6c036980f1e8860c6c5d93c5696f

      • memory/3080-28-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3080-19-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3080-24-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3080-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3080-13-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3080-989-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3080-1152-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3080-2955-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3080-5-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3080-4706-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB