Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2024 04:14

General

  • Target

    81550a8ad49f8d665f3e19a17d8f66370f2f0b9fc681a9cb7b4763e50dcf97a5.exe

  • Size

    26KB

  • MD5

    0da75b1f16c75906dabab47f2305940a

  • SHA1

    be8f14b374d5068547f204208c3a6fdd232f6398

  • SHA256

    81550a8ad49f8d665f3e19a17d8f66370f2f0b9fc681a9cb7b4763e50dcf97a5

  • SHA512

    f139bcffdebda7a54aa79b4f3bca36d1f5d11baa41e4984a64bf745a5b5d0adc7192f6a209affb70cc7289a9eaa0d209df24ba6eef546aba17ec76ff222df27a

  • SSDEEP

    768:voa1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:JfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1136
      • C:\Users\Admin\AppData\Local\Temp\81550a8ad49f8d665f3e19a17d8f66370f2f0b9fc681a9cb7b4763e50dcf97a5.exe
        "C:\Users\Admin\AppData\Local\Temp\81550a8ad49f8d665f3e19a17d8f66370f2f0b9fc681a9cb7b4763e50dcf97a5.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3052
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2524

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        d32a9535c961f4f4d0df238b477f3387

        SHA1

        94d896cb0e7cb63a84edab26ab8997697f348ef4

        SHA256

        1db9bc2caa243320968cdc848514cac1e0ee3914849ba99bb109ea2f4a96166d

        SHA512

        072db78d89f726fe7f4e72a7273410d3ba5d61988d5f380879055b16737edffa0f945ba8f1411c002fc430dfb0bf00e219ac6677bce026bf516d0d8767fd789e

      • C:\Program Files\7-Zip\7zFM.exe

        Filesize

        956KB

        MD5

        6993dbb0fbcb28ba09f00875fa822a6f

        SHA1

        0c54177601a2d212dc9cb4a5fb7562ce4388f4c7

        SHA256

        c835b7cd7802b5fc7ed537cdcd2574ec68288b7c01ea2e4fb03d1b09b344dd0b

        SHA512

        04af5921c35e3812c7f1dd7834922592b2ba8cba74a65507cdae200728f0b2393ab60d0df2d09c75eeb87b08ba3210417fc4d5f301efc45bbf428bfae20d111a

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • F:\$RECYCLE.BIN\S-1-5-21-2721934792-624042501-2768869379-1000\_desktop.ini

        Filesize

        8B

        MD5

        220b016e7845daf603a3a3771c3c49f6

        SHA1

        377795d24efb84b089f7c08a1c19513b7dedf7a8

        SHA256

        03bda6d81a53f20f3eeeafbb46c878f6da64fb54a17e4a4a81717e3bffdec467

        SHA512

        2e1a50d5374f2e7449b61e537e7efc248b876038e1619b58d544758f2590ef7c4232293acff9903d348eb04b5750e12406e9722b04256caab270ade5ef97d90c

      • memory/1136-5-0x0000000002D20000-0x0000000002D21000-memory.dmp

        Filesize

        4KB

      • memory/1640-66-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1640-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1640-72-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1640-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1640-575-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1640-1825-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1640-2197-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1640-14-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1640-3285-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1640-7-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB