Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2024, 09:32

General

  • Target

    9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe

  • Size

    65KB

  • MD5

    05519e4a69513066aa4ffb59c85de4f5

  • SHA1

    c567d3929cce4a8a87840c59b765e49566d07609

  • SHA256

    9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0

  • SHA512

    c7dbfd4a2bfeb1ab297dc6805228ff92ff734ff5925aec3305a1c4749d506faa8e74e23e9f76b4ad01689a121bb2a26d388ce78ab6823729dda2fa283e7c7e30

  • SSDEEP

    768:91ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLScTJelfnkDei50rW4NL6U4ccm8VzH:bfgLdQAQfcfymN3QxnkCi5AHN7QlGp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3460
      • C:\Users\Admin\AppData\Local\Temp\9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe
        "C:\Users\Admin\AppData\Local\Temp\9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:636
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB815.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5000
          • C:\Users\Admin\AppData\Local\Temp\9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe
            "C:\Users\Admin\AppData\Local\Temp\9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe"
            4⤵
            • Executes dropped EXE
            PID:3572
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:440
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4404
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2132

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              fa7ae05cf35d71ba680cd6dffd53ba52

              SHA1

              62f31b701a2fa16061ee2712ad5cbc6417d916d5

              SHA256

              b9f83f9956111e5e0776d42aa1d02b9e8b84d3dc3306b2204e53b47ed028db4d

              SHA512

              ee9e5fcab10c628a6c3924fb49dc9cb3a7e72f8b8d9f3da93fd80716b1d5b64b94ee7b41d60940d3a061ee3fef0fa2ffcb1fe73073a7a034a0ef58fec4de619d

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              570KB

              MD5

              62617ee8c33c17e7e5156826cd46f2b9

              SHA1

              24c2f8bbaa4ba184e7800e419c420ab6849ab64e

              SHA256

              6cd8cd3d810f6782b31e24c5f160569fcd4300c3ffaabe3af5cba9e285aeadb6

              SHA512

              e906ed6e83de7c3bfe148475ad552d6df5c2b678976d81227ba9e0a0afc8c52ec59590270e20dea28c900b1fe68d9e04cd7c9faeba937c06860a45b3d4e20591

            • C:\Users\Admin\AppData\Local\Temp\$$aB815.bat

              Filesize

              722B

              MD5

              da1451fbe7679f42edbc5571bc8f9731

              SHA1

              3f3d9d1dd0f4c175f2153721888757cc813bbadb

              SHA256

              690609a43e449e4372c3bb000c7241f073ce1040bf86c6f1597eea3876934a03

              SHA512

              b5def8bae24b93123436b37e5c0f177fd3eb1db87621f628e39c0d2c132e5b9e73952db409b7c39b544c1cf78610296803c7c9a4be66d6fce0b062a776f52e85

            • C:\Users\Admin\AppData\Local\Temp\9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe.exe

              Filesize

              39KB

              MD5

              e1ba4837d11007ae1866d0527cec1cde

              SHA1

              2e0da0891650399be9534d4fc3d4c06a3f28bb52

              SHA256

              9eedb873d71b3c8497758d104341a540f62bd91188f3666c92308138942ed68a

              SHA512

              44f71205f5b2358aeaa954496546913ae39c23fefa6ce28a9d0928202a5c6336ea129f0dbbc0bfb7dd2517bd98beb1fc044e8631623a1324be56c1345d2d7919

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              f878c3e002fc64fc029d371a5c5bc1d6

              SHA1

              31b5ed73fba38414f6626c786565fbb9ec698d8e

              SHA256

              5a43b8da19ec861695c81731883cd5d0871b2bf5490b2647747bd0da8a02718c

              SHA512

              bab67eeab6e63536803e8838d9e4f987f2258939aaac0ad0d8bca4a611a86f9855d07a49a235cd3a93831cd41a13d5e6548c79a1e15989e04d448972bed1f311

            • F:\$RECYCLE.BIN\S-1-5-21-3538781373-1545967067-4263767959-1000\_desktop.ini

              Filesize

              9B

              MD5

              d69146fa3f15be895e219a620fdd153b

              SHA1

              fa21485227046ccf2d7638b4236f749862dd4b64

              SHA256

              406651396485eef0c407fc8241aeaa805a311294cdf7abb18ca20e8540694652

              SHA512

              b0509216c0bd6ad432374c98f3fc2f2919d9353e4bccf510b20e0cbbf8a0fdf77ccdeff786df0305f83f22865794cc675537e51de5a1478fc8431999566701c0

            • memory/440-32-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/440-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/440-26-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/440-37-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/440-41-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/440-8-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/440-377-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/440-1165-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/440-2212-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/440-4717-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/636-10-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/636-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB