Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 07:37

General

  • Target

    9d65eef81447587fe9ff08d19655fe6341dec330452ee747eb75202c8c158ac4.exe

  • Size

    29KB

  • MD5

    88eb6c5cc5d926b429d3f62e5669fba7

  • SHA1

    7925b64a9277084a61dba995fd4221561bca2bb8

  • SHA256

    9d65eef81447587fe9ff08d19655fe6341dec330452ee747eb75202c8c158ac4

  • SHA512

    92f802970c8107a082151118301449ca3a6bc73fd59fbecb12dfa9786bef9a398cb3ee50e7d030af30069fd408cb828e1e178820251c88f5431c3180b8888019

  • SSDEEP

    384:sbb9w51Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRS/0z6B:4616GVRu1yK9fMnJG2V9dL

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\9d65eef81447587fe9ff08d19655fe6341dec330452ee747eb75202c8c158ac4.exe
        "C:\Users\Admin\AppData\Local\Temp\9d65eef81447587fe9ff08d19655fe6341dec330452ee747eb75202c8c158ac4.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2884
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2832
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1856

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              254KB

              MD5

              a51a7d0ebd9afdaa6cc60ef7d0973018

              SHA1

              8243cb6904e2e3db90accaca3df80d1d9f2d1ad2

              SHA256

              fbca29bc72a503448976fedcb4c2a80fee51b2ec02fc9ec5616f025c51ad2085

              SHA512

              ad6f8c4c98802890179b91e13d295afac2d1fbafd80b4b9ae277cb2aea6367cd1bc7903967ac84ef606176c2e40ca9a9dd8802aefb98dc1243024c098227a8c2

            • C:\Program Files\7-Zip\7zFM.exe

              Filesize

              959KB

              MD5

              0bc926dab638fb8fcc55cd69fb1d1da1

              SHA1

              5f65ddc779e24f3d411ba7c8b6ec74b451e859a6

              SHA256

              8aab232084f06ee5840b4a86829c4a0208007a15e236e6e4bec6acec5c1e19be

              SHA512

              5c7ae8eb3085aa2563ffeebb8f7daf65552ed451a7cd0d3e5572a9608dbebee47851f36dbb1fea7ca2ed2d3c2914e56e9fbd452a0d5ce1ed0ee375c71bd4e02c

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              474KB

              MD5

              906a03834d17e17f478bf09f017af5c7

              SHA1

              11242a40ec84440c0d6bcafb13a98484e7876b6d

              SHA256

              85810c87049bfebeae19f492b15408bd5996398124160f709120547820045446

              SHA512

              e3026dc7a005a8602d2eaa92743701f630269631aa5522ae0e5d0c501ec5bd56b9be2d53b4146a878daea189beccfe3cc0ffbb905208ec5a0d1f9986b7abadd3

            • F:\$RECYCLE.BIN\S-1-5-21-2297530677-1229052932-2803917579-1000\_desktop.ini

              Filesize

              8B

              MD5

              658d36413fa4de67d2edb254a0383bbf

              SHA1

              bd660e7319a5040c3af6edca0911a4ab4bdc33df

              SHA256

              0118c20e2d539544ae8e73767b080d41f4ff57be18407222143ebea26d6affa2

              SHA512

              f368a5a7d963fec63b9d599a1da34ae9eea37261f8c4d267d73624f5a36a0402f1f780317e094b240de3980a0a144929ea2076a23b134267cb0209b3172e1b7b

            • memory/1212-5-0x0000000002530000-0x0000000002531000-memory.dmp

              Filesize

              4KB

            • memory/2884-68-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2884-0-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2884-74-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2884-22-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2884-627-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2884-1827-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2884-16-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2884-2377-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2884-3287-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2884-9-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB