Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 07:39

General

  • Target

    dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32.exe

  • Size

    1.8MB

  • MD5

    3d5416970f3fe74fd85d89f4875c014e

  • SHA1

    965c38a8264a2bd3d6a831be87c6111e936d3e33

  • SHA256

    dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32

  • SHA512

    0037d7c6d6cd15134ca4544d4dfba8b6f5eb5e6f2a15ffbd382a7beab26bbe9f81cc488eb8d6048b218fa13f65c56508de6370bb864a7a0a7cd17c08b6dab0d7

  • SSDEEP

    49152:y5QixbpVndRcpfqwYO3u2XoKNLlMDEe/pmVS/F0jD:Ktdnfnwp3oOLuB/3/uD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3492
      • C:\Users\Admin\AppData\Local\Temp\dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32.exe
        "C:\Users\Admin\AppData\Local\Temp\dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3732
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3170.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Users\Admin\AppData\Local\Temp\dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32.exe
            "C:\Users\Admin\AppData\Local\Temp\dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2296
            • \??\c:\1c60666c408f59b110e190326e\install.exe
              c:\1c60666c408f59b110e190326e\.\install.exe
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:3804
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:732
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2796
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2224

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\1c60666c408f59b110e190326e\eula.1031.txt

              Filesize

              4KB

              MD5

              e4d0b7bab20e3e617748fe424b2d9301

              SHA1

              506cb57c9a89d40118ffb32087cc2398e3603d7b

              SHA256

              cc4d7b568a2ca4c4fd0fb5a6ae0adecfcdd300f33aa873a6dec50b8cd0c83568

              SHA512

              080112914a821c2cf06c2a5a2e33ca7a5917711e13aaf3ee040f23aa93e6a602419c8c7e1b7f042114119b019e2b427325ebb68739d2a445aa7030433f7f180b

            • C:\1c60666c408f59b110e190326e\install.exe

              Filesize

              549KB

              MD5

              520a6d1cbcc9cf642c625fe814c93c58

              SHA1

              fb517abb38e9ccc67de411d4f18a9446c11c0923

              SHA256

              08966ce743aa1cbed0874933e104ef7b913188ecd8f0c679f7d8378516c51da2

              SHA512

              b92a32b27d6e6187c30d8018d7e0a35bde98dc524eabcd7709420b499778159e2872db04a3f2dfacf016d0e6d97b8175920e83fa28804609786828e52f058ff0

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              b0af51e8bc75faa3f30ff07677619cd0

              SHA1

              c39d09f2780d039a87889fd1e6174ea7f521af3b

              SHA256

              44852a7fdd6ac6dc4ca746fe4aa11fd790025e46d844cf3e467d2b0bf50b3cec

              SHA512

              29c3fe8355919d751a05e8fbbb94392e4f0b40581cc91b69d60a6a6f16c601c0ce0d0f3b1c7c1edd1cbac310502fab9447bcf25cf98b88382dc02e35f87c9cc4

            • C:\Program Files\CompressPing.exe

              Filesize

              449KB

              MD5

              d41fade5f4cf2b89afa04975e416c7cf

              SHA1

              f25e2aac4562e818616155f38bb3b3bb6af938df

              SHA256

              79e8c10932e37853c4bb8c32d444ce7afc2722c2f8df8f4e9759f3937da33639

              SHA512

              f4a34b0e4b3ccce1afb6e8d81efa1afe9d1aff49a953aef493ce89228c88f52bec80f331fb7f40b36c371e7406f49420d5a5c126dd0f19e6f3928999d6d09efd

            • C:\Users\Admin\AppData\Local\Temp\$$a3170.bat

              Filesize

              722B

              MD5

              6cb9c738ca1c39533df0ae9581282ad6

              SHA1

              fb018a0a67520af7d699a917df08356f57878f71

              SHA256

              81176146dfc7d30f84769dcf4794db27677239752e5b4b7a430014fc4f35dae3

              SHA512

              2e6fdfc09b5eccfbc927dbab022d4385d8494fcacfd7585ec1c0f68b5a8bfe190f37408928cc8d5d2b0cb04495737f6d2f38de1ffde7e4c956902ed3d99a83f7

            • C:\Users\Admin\AppData\Local\Temp\dcd4726af94b089eea1d955ab3b682c9808722b37afc5de8689749c43092ac32.exe.exe

              Filesize

              1.7MB

              MD5

              b936f0f378b9a35489353e878154e899

              SHA1

              56719288ab6514c07ac2088119d8a87056eeb94a

              SHA256

              c6a7e484f4d84883bc1205bccea3114c0521025712922298ede9b2a1cd632357

              SHA512

              acdf7b464a258b3ae3015c808d0e08a697ba3209662faa9b18c1aee882bf236dc725f6c3425cb6f9e10d8ab5cbb82ac118ff947a4b9ec6f91c2e150b0beef70f

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              d1626ba2142ca68d3de95e7a4b56e26c

              SHA1

              5723f02aeee28da492324f09476bd021b431d9c8

              SHA256

              39e73bbf526ef79248c556a1f48253c2696ca4e4b95d35d71052c6ec5f82bc1e

              SHA512

              1e78cce93c5189ef1dc29a8d2f12a4afd09a0a9faad3662e439860d4f03d0ec1666b61b0737c4b8ec56dcb2619e5b8bbf35df5a3674b282106f129bf78859670

            • F:\$RECYCLE.BIN\S-1-5-21-566096764-1992588923-1249862864-1000\_desktop.ini

              Filesize

              8B

              MD5

              658d36413fa4de67d2edb254a0383bbf

              SHA1

              bd660e7319a5040c3af6edca0911a4ab4bdc33df

              SHA256

              0118c20e2d539544ae8e73767b080d41f4ff57be18407222143ebea26d6affa2

              SHA512

              f368a5a7d963fec63b9d599a1da34ae9eea37261f8c4d267d73624f5a36a0402f1f780317e094b240de3980a0a144929ea2076a23b134267cb0209b3172e1b7b

            • \??\c:\1c60666c408f59b110e190326e\eula.1033.txt

              Filesize

              9KB

              MD5

              99c22d4a31f4ead4351b71d6f4e5f6a1

              SHA1

              73207ebe59f6e1073c0d76c8835a312c367b6104

              SHA256

              93a3c629fecfd10c1cf614714efd69b10e89cfcaf94c2609d688b27754e4ab41

              SHA512

              47b7ec5fed06d6c789935e9e95ea245c7c498b859e2c0165a437a7bf0006e447c4df4beeb97484c56446f1dae547a01387bea4e884970380f37432825eb16e94

            • \??\c:\1c60666c408f59b110e190326e\globdata.ini

              Filesize

              1KB

              MD5

              0a6b586fabd072bd7382b5e24194eac7

              SHA1

              60e3c7215c1a40fbfb3016d52c2de44592f8ca95

              SHA256

              7912e3fcf2698cf4f8625e563cd8215c6668739cae18bd6f27af2d25bec5c951

              SHA512

              b96b0448e9f0e94a7867b6bb103979e9ef2c0e074bcb85988d450d63de6edcf21dc83bb154aafb7de524af3c3734f0bb1ba649db0408612479322e1aa85be9f4

            • \??\c:\1c60666c408f59b110e190326e\install.ini

              Filesize

              843B

              MD5

              0da9ab4977f3e7ba8c65734df42fdab6

              SHA1

              b4ed6eea276f1a7988112f3bde0bd89906237c3f

              SHA256

              672621b056188f8d3fa5ab8cd3df4f95530c962af9bb11cf7c9bd1127b3c3605

              SHA512

              1ef58271cdedbdc53615631cc823483f874c89c2d62e0678de9d469a82bd676eb8abd34656caa5128b7edb0eb24dbf0992e5e571a97f7782c933b2be88af3144

            • \??\c:\1c60666c408f59b110e190326e\install.res.1033.dll

              Filesize

              89KB

              MD5

              9edeb8b1c5c0a4cd3a3016b85108127d

              SHA1

              9ec25485a7ff52d1211a28cca095950901669b34

              SHA256

              9bf7026a47daab7bb2948fd23e8cf42c06dd2e19ef8cdea0af7367453674a8f9

              SHA512

              aa2f6dde0aa6d804bcadc169b6d48aad6b485b8e669f1b0c3624848b27bcd37bd3dd9073bddc6bde5c0dd3bc565fd851e161edb0efe9fcaa4636cdcaaec966db

            • \??\c:\1c60666c408f59b110e190326e\vc_red.msi

              Filesize

              227KB

              MD5

              e0951d3cb1038eb2d2b2b2f336e1ab32

              SHA1

              500f832b1fcd869e390457ff3dc005ba5b8cca96

              SHA256

              507ac60e145057764f13cf1ad5366a7e15ddc0da5cc22216f69e3482697d5e88

              SHA512

              34b9c5ed9dd8f384ecf7589e824c3acc824f5f70a36517d35f6d79b0296fbccb699c3ec1e86e749d34643934bf2e20a9c384a5586d368af9887b7c2cede9bfb8

            • \??\c:\1c60666c408f59b110e190326e\vcredist.bmp

              Filesize

              5KB

              MD5

              06fba95313f26e300917c6cea4480890

              SHA1

              31beee44776f114078fc403e405eaa5936c4bc3b

              SHA256

              594884a8006e24ad5b1578cd7c75aca21171bb079ebdc4f6518905bcf2237ba1

              SHA512

              7dca0f1ab5d3fd1ac8755142a7ca4d085bb0c2f12a7272e56159dadfa22da79ec8261815be71b9f5e7c32f6e8121ecb2443060f7db76feaf01eb193200e67dfd

            • memory/732-61-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/732-826-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/732-1521-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/732-1217-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/732-54-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/732-68-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/732-73-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/732-78-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/732-82-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/732-10-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3732-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3732-8-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3804-62-0x0000000003010000-0x0000000003011000-memory.dmp

              Filesize

              4KB

            • memory/3804-49-0x0000000003010000-0x0000000003011000-memory.dmp

              Filesize

              4KB