Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/02/2024, 20:32

General

  • Target

    94956697c35b9d21fdac9fc8f726997e3587fca64342719c1ae3334a742a572d.exe

  • Size

    44KB

  • MD5

    d4fef69072cfc347a36c66220ff58ce1

  • SHA1

    07b8cfa5d6d04d21d4483a6de4934eb0745f1df9

  • SHA256

    94956697c35b9d21fdac9fc8f726997e3587fca64342719c1ae3334a742a572d

  • SHA512

    0991b53164505a44361188d11e83484da5ac42a91ddf1343a7b06be044d47dc2bad39063426e256ec7db6c3b20ad520ebed73aabe1885afd1eb43df0f6c5a58e

  • SSDEEP

    768:7Bv1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLZLofwNWzRs50Zi9zPR:vfgLdQAQfcfymNFLofgWzRUz5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3508
      • C:\Users\Admin\AppData\Local\Temp\94956697c35b9d21fdac9fc8f726997e3587fca64342719c1ae3334a742a572d.exe
        "C:\Users\Admin\AppData\Local\Temp\94956697c35b9d21fdac9fc8f726997e3587fca64342719c1ae3334a742a572d.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4684
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5DDF.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1596
          • C:\Users\Admin\AppData\Local\Temp\94956697c35b9d21fdac9fc8f726997e3587fca64342719c1ae3334a742a572d.exe
            "C:\Users\Admin\AppData\Local\Temp\94956697c35b9d21fdac9fc8f726997e3587fca64342719c1ae3334a742a572d.exe"
            4⤵
            • Executes dropped EXE
            PID:2308
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 800
              5⤵
              • Program crash
              PID:2716
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3004
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5076
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2948
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2308 -ip 2308
        1⤵
          PID:2520

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          251KB

          MD5

          f7e897352daac85694c089b44de3f54a

          SHA1

          ad637e5a5fc8954ad2fa39d7594e9046b010d574

          SHA256

          3bf52fe0c574c2ea394c25b2430435e6bdd238e10cff9ccea1b91f1637ae4dac

          SHA512

          1895a36db6d8a9391b2d2e54f6217aa5afc92e2d384a8b8d0c08380e493393434ee1b60e493ad29e3c0a005d422b933bfa4d73cf2ecf515f14426b3cb689413a

        • C:\Program Files\MeasureUnpublish.exe

          Filesize

          494KB

          MD5

          da264ff5cc6c5204f12630ec4e144df9

          SHA1

          d18b516f12b5d5b04dad54ab2b40cd77bf42a232

          SHA256

          a699a1471baf5a979dd37d080531c135221b53f4f88f8d7beafb3dad9f8d2bc2

          SHA512

          5c0c6c84bfab4a363fb8bf29b9595daa0724ccc337a5cb81a47ed46ba736f9fc621f25f9b7096d377bed53fad377299e0f4d487cf3b676f3ce0b707f707f5d23

        • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

          Filesize

          481KB

          MD5

          1db5b390daa2d070657fbdb4f5d2cc55

          SHA1

          77e633e49df484b827080753514cc376749b0ceb

          SHA256

          d5fbaf5c0d8e313d4dad23b28cac4256c5dbed6ab3b0d797e2971f30c5e095ad

          SHA512

          68aa0152f5aae79a146c1813915fd16ec5454b285bd1781370923f97d6c147d53684192f7f4161e5c1a340959ec432ecaac127b0abe7d08f70c387e08ee4f617

        • C:\Users\Admin\AppData\Local\Temp\$$a5DDF.bat

          Filesize

          722B

          MD5

          0c140a5f42c10b0e49145ff85ea8ee5b

          SHA1

          41974a4064539745ac718feec8c19986704c7aa8

          SHA256

          19d8770d24985a98ad123be069307ad8aa2d206bdc539e41b7bb07cbf7e7e7a6

          SHA512

          238f8596af4f5fe6ae4cbd90a5b6b72efaac6a58ccd2c7f70e223f0f61fbf35b0d7b39aedfc129a44712125006ae9a3a6f2c4eba0f95223c350d4ca0d596144d

        • C:\Users\Admin\AppData\Local\Temp\94956697c35b9d21fdac9fc8f726997e3587fca64342719c1ae3334a742a572d.exe.exe

          Filesize

          17KB

          MD5

          52aeb90ffda1ebca8bd42a1aef07160c

          SHA1

          537599d33cb291faaf393f8c8c5606e464c0ddc5

          SHA256

          52afb92c13901e960558661c781d6f33f9463191cac88372789198be27ba640a

          SHA512

          470e70fa1c7ae76e82d6dfd078b44e4c5dc5b0a0c3cacfd31b3fec5c951b27e4b9f6244523b72d7cb0fd5320f36a16225e03a7326337430724d0c10c2cd192a1

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          197d3bb40f2af7277a4fef58b91f17d4

          SHA1

          33e404deb5e5c8bea2003ec9c6e866885224b49d

          SHA256

          58c5dbc5a1badf666e035480826af07d769b70254b54b3d648e90d4f94508971

          SHA512

          85e9c967ec5299bf5899f0e9ce49e903f958a4cd56dc73a1aba1f9d45b4afb7227d655904325f06d8fdb7337bd265deca868b828f2deec6388a7faad4c226980

        • F:\$RECYCLE.BIN\S-1-5-21-3316742141-2240921845-2885234760-1000\_desktop.ini

          Filesize

          9B

          MD5

          62b5f4cbf35e0811170865d2c1b514b0

          SHA1

          eb9ab8cea4d5052efe5126141140269f2fc29e7b

          SHA256

          0c2b516efab7a741c31502cb6f7828de32cd4feb088b683d651225489f183bb3

          SHA512

          4632536c26324e72b20e87d53546ea1d012bc1f3457ce5d8e1b33dd3eebc41ad5e4a3d3f6a3a542d7ce103f95ca5a5a1973c6c036980f1e8860c6c5d93c5696f

        • memory/2308-18-0x00000000745D0000-0x0000000074D80000-memory.dmp

          Filesize

          7.7MB

        • memory/2308-19-0x00000000006F0000-0x00000000006F8000-memory.dmp

          Filesize

          32KB

        • memory/2308-20-0x00000000745D0000-0x0000000074D80000-memory.dmp

          Filesize

          7.7MB

        • memory/3004-40-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3004-29-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3004-35-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3004-44-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3004-8-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3004-1006-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3004-1169-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3004-4720-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3004-22-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4684-0-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4684-9-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB