Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2024 20:43

General

  • Target

    b6c19141e70a6849a43b3ef9474d146e4c54cf25f523e614b1732d81485f4b57.exe

  • Size

    242KB

  • MD5

    cc11282b7f5bbdc002dbe35ea153fab2

  • SHA1

    8aaf783e56479d8f8b3d946eb941ee07c32e6210

  • SHA256

    b6c19141e70a6849a43b3ef9474d146e4c54cf25f523e614b1732d81485f4b57

  • SHA512

    36bcac606d5fb556f8a4656ddf652c41e0238811e213e579c0771037ab23017e0e2741742d32a57ae94da8624d95594cfe074bb4b8d13c34d05976365620bad3

  • SSDEEP

    3072:1sftffjmN/B4odcQPaHy4V8y47vRNZ2iL45uN9woY46x6a8fGIkkJxGAxYJ:iVfjmN/BjZPaS4VF4T52ikHohloAs

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3476
      • C:\Users\Admin\AppData\Local\Temp\b6c19141e70a6849a43b3ef9474d146e4c54cf25f523e614b1732d81485f4b57.exe
        "C:\Users\Admin\AppData\Local\Temp\b6c19141e70a6849a43b3ef9474d146e4c54cf25f523e614b1732d81485f4b57.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1848
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3F89.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:116
          • C:\Users\Admin\AppData\Local\Temp\b6c19141e70a6849a43b3ef9474d146e4c54cf25f523e614b1732d81485f4b57.exe
            "C:\Users\Admin\AppData\Local\Temp\b6c19141e70a6849a43b3ef9474d146e4c54cf25f523e614b1732d81485f4b57.exe"
            4⤵
            • Executes dropped EXE
            PID:3848
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1320
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:672
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1688

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        3663c1381766ef643154f7248cee081a

        SHA1

        d3391539358af56ef7ac65a5b87886e45e9bc42c

        SHA256

        0471b2b82fb08307f138b69649e69dd51864d5650e13d0dafe67d37d91288c29

        SHA512

        c3ed0a5d8b9eaa02efd030d4191849f5aa999e1585a47af66e8497ab494141488e97ca39289b412919f33faf78016c4e875522232c8f67bde995d968ecc7f6f7

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        b9f8e419ad6f08a56fa9d815bde02ffd

        SHA1

        8df2b9234fa20465c05bcdc6cfb7c21ca83724aa

        SHA256

        038188527c2871dcb922bbb93183cede3eab482a396a2c01bcc0c78fbba8c0e3

        SHA512

        e10ada046e8e17a66594a3b1f155f85beb24601a3daf0832bce1d3a1f0edca4e17f669ec278a7ea9b36e5912c777d81534f770f440b64147c932160c7eec4517

      • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

        Filesize

        481KB

        MD5

        1db5b390daa2d070657fbdb4f5d2cc55

        SHA1

        77e633e49df484b827080753514cc376749b0ceb

        SHA256

        d5fbaf5c0d8e313d4dad23b28cac4256c5dbed6ab3b0d797e2971f30c5e095ad

        SHA512

        68aa0152f5aae79a146c1813915fd16ec5454b285bd1781370923f97d6c147d53684192f7f4161e5c1a340959ec432ecaac127b0abe7d08f70c387e08ee4f617

      • C:\Users\Admin\AppData\Local\Temp\$$a3F89.bat

        Filesize

        722B

        MD5

        f0a379874db1cc986dca849c215f7224

        SHA1

        4f943cab54204df9dbb8ba45be8010e2f005cdd5

        SHA256

        68f57d159e39738f99516807c1a604b4147af88a75dae4854b99a84c989bf7c3

        SHA512

        48ce6f5e15ecab157c9c02ff12dfdece515be4fd062ef5a3c51d536ec793154436eef6bd71f7346dfb02bd9604053607b314bef09494187e868d40d8df494280

      • C:\Users\Admin\AppData\Local\Temp\b6c19141e70a6849a43b3ef9474d146e4c54cf25f523e614b1732d81485f4b57.exe.exe

        Filesize

        216KB

        MD5

        af36620e7fa6b04d5de0c3a7a0a68dac

        SHA1

        11fee214334ee1dde041418bbd4fe80ed4798c0f

        SHA256

        6c24b87acf2e25f0bd71a6e212dd906d629049d9ceee6e6f49253f01b729b05c

        SHA512

        b223e886177f4a5773a44d687ccce1571c78b8181076c3f656aab17566ae67165c1289d760b386c922ea254a4e659da26a216cab2caa43f7b08aba8a75735c9b

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        785fa6c3710afc18d7fdec70e3b9a469

        SHA1

        d2903f4fa74689c6b8a7e5e7c8d9c1791a71523d

        SHA256

        c0e031a2d0e39b141a0cf1c8384e190bc6fa0cc8f4e0f36cde97ac631f126c27

        SHA512

        00b7c2d17161542744b54ef5a770363a1de0a21805da3d1b1b169de28c4939b2bc67d4eaa7cee9b2c0c46d853109b5943295f39051b5a7ae7e1924e002db606f

      • F:\$RECYCLE.BIN\S-1-5-21-3270530367-132075249-2153716227-1000\_desktop.ini

        Filesize

        9B

        MD5

        20579de1c6702ea14f25df921a00274b

        SHA1

        fc7299007b5fb0580c7a3ef6ae0efd8aaf80a35f

        SHA256

        3eb24c26a19e67d7f499ccb30f78fc29bee126bafd13f41470223c1b8f2e1e4e

        SHA512

        e9a21ede4321b86e5d215d41321741f8db22b9eb92c1325026182c688311d5134041102a194d670abcbd182d2c91d5180ac9b7c9daaf9e41109a3b3d8e3c3d81

      • memory/1320-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1320-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1320-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1320-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1320-1008-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1320-1175-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1320-1811-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1320-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1320-4740-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1320-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1848-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1848-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB