Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 07:39

General

  • Target

    dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32.exe

  • Size

    1.8MB

  • MD5

    3d5416970f3fe74fd85d89f4875c014e

  • SHA1

    965c38a8264a2bd3d6a831be87c6111e936d3e33

  • SHA256

    dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32

  • SHA512

    0037d7c6d6cd15134ca4544d4dfba8b6f5eb5e6f2a15ffbd382a7beab26bbe9f81cc488eb8d6048b218fa13f65c56508de6370bb864a7a0a7cd17c08b6dab0d7

  • SSDEEP

    49152:y5QixbpVndRcpfqwYO3u2XoKNLlMDEe/pmVS/F0jD:Ktdnfnwp3oOLuB/3/uD

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1296
      • C:\Users\Admin\AppData\Local\Temp\dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32.exe
        "C:\Users\Admin\AppData\Local\Temp\dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1908
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a4692.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2536
          • C:\Users\Admin\AppData\Local\Temp\dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32.exe
            "C:\Users\Admin\AppData\Local\Temp\dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2468
            • \??\c:\b38500a8a0e38a301948cf7d\install.exe
              c:\b38500a8a0e38a301948cf7d\.\install.exe
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: GetForegroundWindowSpam
              PID:2492
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2380
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2668
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2724

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        b0af51e8bc75faa3f30ff07677619cd0

        SHA1

        c39d09f2780d039a87889fd1e6174ea7f521af3b

        SHA256

        44852a7fdd6ac6dc4ca746fe4aa11fd790025e46d844cf3e467d2b0bf50b3cec

        SHA512

        29c3fe8355919d751a05e8fbbb94392e4f0b40581cc91b69d60a6a6f16c601c0ce0d0f3b1c7c1edd1cbac310502fab9447bcf25cf98b88382dc02e35f87c9cc4

      • C:\Users\Admin\AppData\Local\Temp\$$a4692.bat

        Filesize

        722B

        MD5

        fd22ed5e6e72e1cfaddfec058aebb3b2

        SHA1

        1c4ac4e0eabd704fb6c9743bb94ac3770a46c184

        SHA256

        8da53a91da995d072c0ca04f3c29248a9f94ab65b57d66b3a91a25cd20ad086b

        SHA512

        3af65ec1eadc8d35ec4d272733e6321958b30465138385b5c408ee2200e2be387cb7aa3855494358b273f730805da19a59a8d5fd8391d24196da94fb30397d3d

      • C:\Users\Admin\AppData\Local\Temp\dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32.exe.exe

        Filesize

        1024KB

        MD5

        cba890bad2d19ecc3b2fff0283e81487

        SHA1

        01725d9dab493529879526ba8d50efc02d6d49a7

        SHA256

        695017bb8225d25f3e35c5cca600fbd87460ade57bc4996e593628a35f85bebd

        SHA512

        05453acb2d4e71150ac4e2b849673e00caf95de895b098a6ce29a9df493360618fe2a012981e3ac5cd6f3ebe3447cd74987af14db5cf804770228b77279f336c

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        d1626ba2142ca68d3de95e7a4b56e26c

        SHA1

        5723f02aeee28da492324f09476bd021b431d9c8

        SHA256

        39e73bbf526ef79248c556a1f48253c2696ca4e4b95d35d71052c6ec5f82bc1e

        SHA512

        1e78cce93c5189ef1dc29a8d2f12a4afd09a0a9faad3662e439860d4f03d0ec1666b61b0737c4b8ec56dcb2619e5b8bbf35df5a3674b282106f129bf78859670

      • C:\b38500a8a0e38a301948cf7d\eula.1031.txt

        Filesize

        17KB

        MD5

        9147a93f43d8e58218ebcb15fda888c9

        SHA1

        8277c722ba478be8606d8429de3772b5de4e5f09

        SHA256

        a75019ac38e0d3570633fa282f3d95d20763657f4a2fe851fae52a3185d1eded

        SHA512

        cc9176027621a590a1d4f6e17942012023e3fabc3316bc62c4b17cd61ce76bf5cf270bd32da95dba7ddf3163e84114be1103a6f810ca1a05d914712895f09705

      • F:\$RECYCLE.BIN\S-1-5-21-2461186416-2307104501-1787948496-1000\_desktop.ini

        Filesize

        8B

        MD5

        658d36413fa4de67d2edb254a0383bbf

        SHA1

        bd660e7319a5040c3af6edca0911a4ab4bdc33df

        SHA256

        0118c20e2d539544ae8e73767b080d41f4ff57be18407222143ebea26d6affa2

        SHA512

        f368a5a7d963fec63b9d599a1da34ae9eea37261f8c4d267d73624f5a36a0402f1f780317e094b240de3980a0a144929ea2076a23b134267cb0209b3172e1b7b

      • \??\c:\b38500a8a0e38a301948cf7d\eula.1033.txt

        Filesize

        9KB

        MD5

        99c22d4a31f4ead4351b71d6f4e5f6a1

        SHA1

        73207ebe59f6e1073c0d76c8835a312c367b6104

        SHA256

        93a3c629fecfd10c1cf614714efd69b10e89cfcaf94c2609d688b27754e4ab41

        SHA512

        47b7ec5fed06d6c789935e9e95ea245c7c498b859e2c0165a437a7bf0006e447c4df4beeb97484c56446f1dae547a01387bea4e884970380f37432825eb16e94

      • \??\c:\b38500a8a0e38a301948cf7d\globdata.ini

        Filesize

        1KB

        MD5

        0a6b586fabd072bd7382b5e24194eac7

        SHA1

        60e3c7215c1a40fbfb3016d52c2de44592f8ca95

        SHA256

        7912e3fcf2698cf4f8625e563cd8215c6668739cae18bd6f27af2d25bec5c951

        SHA512

        b96b0448e9f0e94a7867b6bb103979e9ef2c0e074bcb85988d450d63de6edcf21dc83bb154aafb7de524af3c3734f0bb1ba649db0408612479322e1aa85be9f4

      • \??\c:\b38500a8a0e38a301948cf7d\install.ini

        Filesize

        843B

        MD5

        0da9ab4977f3e7ba8c65734df42fdab6

        SHA1

        b4ed6eea276f1a7988112f3bde0bd89906237c3f

        SHA256

        672621b056188f8d3fa5ab8cd3df4f95530c962af9bb11cf7c9bd1127b3c3605

        SHA512

        1ef58271cdedbdc53615631cc823483f874c89c2d62e0678de9d469a82bd676eb8abd34656caa5128b7edb0eb24dbf0992e5e571a97f7782c933b2be88af3144

      • \??\c:\b38500a8a0e38a301948cf7d\vc_red.msi

        Filesize

        227KB

        MD5

        e0951d3cb1038eb2d2b2b2f336e1ab32

        SHA1

        500f832b1fcd869e390457ff3dc005ba5b8cca96

        SHA256

        507ac60e145057764f13cf1ad5366a7e15ddc0da5cc22216f69e3482697d5e88

        SHA512

        34b9c5ed9dd8f384ecf7589e824c3acc824f5f70a36517d35f6d79b0296fbccb699c3ec1e86e749d34643934bf2e20a9c384a5586d368af9887b7c2cede9bfb8

      • \??\c:\b38500a8a0e38a301948cf7d\vcredist.bmp

        Filesize

        5KB

        MD5

        06fba95313f26e300917c6cea4480890

        SHA1

        31beee44776f114078fc403e405eaa5936c4bc3b

        SHA256

        594884a8006e24ad5b1578cd7c75aca21171bb079ebdc4f6518905bcf2237ba1

        SHA512

        7dca0f1ab5d3fd1ac8755142a7ca4d085bb0c2f12a7272e56159dadfa22da79ec8261815be71b9f5e7c32f6e8121ecb2443060f7db76feaf01eb193200e67dfd

      • \Users\Admin\AppData\Local\Temp\dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32.exe

        Filesize

        1.7MB

        MD5

        b936f0f378b9a35489353e878154e899

        SHA1

        56719288ab6514c07ac2088119d8a87056eeb94a

        SHA256

        c6a7e484f4d84883bc1205bccea3114c0521025712922298ede9b2a1cd632357

        SHA512

        acdf7b464a258b3ae3015c808d0e08a697ba3209662faa9b18c1aee882bf236dc725f6c3425cb6f9e10d8ab5cbb82ac118ff947a4b9ec6f91c2e150b0beef70f

      • \b38500a8a0e38a301948cf7d\install.exe

        Filesize

        549KB

        MD5

        520a6d1cbcc9cf642c625fe814c93c58

        SHA1

        fb517abb38e9ccc67de411d4f18a9446c11c0923

        SHA256

        08966ce743aa1cbed0874933e104ef7b913188ecd8f0c679f7d8378516c51da2

        SHA512

        b92a32b27d6e6187c30d8018d7e0a35bde98dc524eabcd7709420b499778159e2872db04a3f2dfacf016d0e6d97b8175920e83fa28804609786828e52f058ff0

      • \b38500a8a0e38a301948cf7d\install.res.1033.dll

        Filesize

        89KB

        MD5

        9edeb8b1c5c0a4cd3a3016b85108127d

        SHA1

        9ec25485a7ff52d1211a28cca095950901669b34

        SHA256

        9bf7026a47daab7bb2948fd23e8cf42c06dd2e19ef8cdea0af7367453674a8f9

        SHA512

        aa2f6dde0aa6d804bcadc169b6d48aad6b485b8e669f1b0c3624848b27bcd37bd3dd9073bddc6bde5c0dd3bc565fd851e161edb0efe9fcaa4636cdcaaec966db

      • memory/1296-65-0x0000000002710000-0x0000000002711000-memory.dmp

        Filesize

        4KB

      • memory/1908-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1908-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1908-17-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2380-74-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2380-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2380-67-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2380-81-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2380-86-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2380-131-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2380-138-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2380-492-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2380-1890-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2492-75-0x00000000001D0000-0x00000000001D1000-memory.dmp

        Filesize

        4KB

      • memory/2492-60-0x00000000001D0000-0x00000000001D1000-memory.dmp

        Filesize

        4KB