Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 19:04

General

  • Target

    62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe

  • Size

    102KB

  • MD5

    09c837ceca7ccafa51bae89286c39589

  • SHA1

    685cbe4fbc9d8c12cc5c91dab3efbb967484ba3d

  • SHA256

    62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a

  • SHA512

    5b66fab1a83a8ab656f778bcf7dc4a1bcbd598de7ec5ce4839467772a2fef7622dc375aaabb503b205e47fb35e9abf7a98d459af4e5bbda09338093200f24094

  • SSDEEP

    1536:IzyEjBfgLdQAQfcfymNf5ddKPVRo7SbceOwMIN3uz+XzyEjAJgV3n2CL:3WftffjmNf+OSnGIN3uz+++3D

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3352
      • C:\Users\Admin\AppData\Local\Temp\62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe
        "C:\Users\Admin\AppData\Local\Temp\62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5FC3.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4512
          • C:\Users\Admin\AppData\Local\Temp\62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe
            "C:\Users\Admin\AppData\Local\Temp\62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2456
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:580
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2220
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4728

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              a6efd71aa3b8b5733480eecc85a9e1dc

              SHA1

              ccfe95b3ff7f234e6a34b7924a825c2a78423513

              SHA256

              249be1c0499608a858b492c634b8d7d964b649846a9c25bcc95d4f5be1ad4cc3

              SHA512

              cfc506131361a353f4564015773ba9574f5a2f05603e1fb8409eec838f8b141a7c40bc89395758de4848ee99ba495a5c7e9d9ee1f5e57b1816c1d9cfd37a1d47

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              570KB

              MD5

              0eb87a7e251ec1a90d772b0a0535098d

              SHA1

              14a0afcdcfe0843088f3d227dba4d824293839e1

              SHA256

              b9ee14226ae84dbfd6081b3453647b3cfaf88a15f933e8fa63a08520ae7466e8

              SHA512

              3b1f7de49eee34413c6c96ae15f23bd73b0e04272cbe32d3ab0d6ce66e9dd7a52241c90f51687095b8c34d918cb6b0cea372ab38a7afee8df36c64b1c15999e8

            • C:\Users\Admin\AppData\Local\Temp\$$a5FC3.bat

              Filesize

              722B

              MD5

              2a1f484fb03ec7ac92e8f54baeea7458

              SHA1

              3f0a7a6e30dcafc7a836972ccc02c74ead00ae94

              SHA256

              339adebc069ec097a97e3aeda8251da6cea50895c64ed2b50b527ed29f6c3c53

              SHA512

              77eab88ad5fecf0267c9efffc9c6ca9a6c073ecbcc84b3106b0e202b76ee522f60f6cd78ae0945c8fc1e9e2c2dd45991978a58391911bb17e9fa1f391482046e

            • C:\Users\Admin\AppData\Local\Temp\62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe.exe

              Filesize

              76KB

              MD5

              091d33fa9ef01c4b9eabf79eb43fc863

              SHA1

              93ce4e8222366f280caca14fdc2a53a8d9be33b8

              SHA256

              2a84bd7ea030f3e0470ecaacfba7dac49101001bf2f2d1060f3b87bfb0720bcd

              SHA512

              d7f425572fa8d7f34dc9b7e4eed2d46f402c578a9d6345b861686b5dc36a199881f61e8b0a64580293e7092469cb27cf9bb7ffd96fa32d3b1a4ad80b7ee03366

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              fd4695e08721cc6675c933713f265822

              SHA1

              ebff89bafa84a8382277d3f03d3bda495540cc5d

              SHA256

              6a79200a29104f247d9734e6c7993ed5883cb5f7ba55353c1ddc242d323be622

              SHA512

              fc3b76725189835a975dad6d8ffc9e86966500f315d7de6e3b4b6da647b5d253671102b0ddabd5eec65fbf3f11adbda567e5ac0c06ace65bbaf20e29e228fefc

            • F:\$RECYCLE.BIN\S-1-5-21-2727153400-192325109-1870347593-1000\_desktop.ini

              Filesize

              9B

              MD5

              ac7ef6d7fcd23c228941057dc1a38427

              SHA1

              aec0bc6ea51cea8edb23dd9ea7be81f113f42493

              SHA256

              fd687092833ff2ed530a5ba6d4cebe3c1e5f6c318da1610320743cc7e073a740

              SHA512

              6cf8518e3448d5f19775ac462fab31aac662f0386ed2aeae85b2b5591ee3092f25527beb74592f1c1e4a20f6488277b429c9f46e783937c4bb9f7439ffb6c4f3

            • memory/580-33-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/580-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/580-26-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/580-37-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/580-42-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/580-10-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/580-404-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/580-1175-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/580-4562-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/580-4741-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4496-8-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4496-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB