Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 15:20

General

  • Target

    1f0122b79f2122e7b9cd5c531d61aa1e36300507cf27c52408bef8cecfcb482e.exe

  • Size

    26KB

  • MD5

    2d1e848bfd42688f44b109b992bb7fdb

  • SHA1

    ade756ef259f5f8a48d0b9d6c9963ce356412c2b

  • SHA256

    1f0122b79f2122e7b9cd5c531d61aa1e36300507cf27c52408bef8cecfcb482e

  • SHA512

    2bef05be8f7fc19f8aa96f1d6a0ffe37ad8d1aa59df9be8f91ac2260d1340f576d7f081cbe263f07fa46a1a7acdc921b5a30b7448d57d45da88f400ecf919ad4

  • SSDEEP

    768:Zgl1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:qDfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1132
      • C:\Users\Admin\AppData\Local\Temp\1f0122b79f2122e7b9cd5c531d61aa1e36300507cf27c52408bef8cecfcb482e.exe
        "C:\Users\Admin\AppData\Local\Temp\1f0122b79f2122e7b9cd5c531d61aa1e36300507cf27c52408bef8cecfcb482e.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2252
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2560

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              c929d9da585b675cf8ade6d1998a694b

              SHA1

              7d3e35d83d135bd3d795f2065da51ed085026a9e

              SHA256

              e134d9a07dfa4a215cf799442d5ef26f48cdfe7e225320c7a64e0bac63b76ba4

              SHA512

              45c2d2ece49ba45b9fdca6f6b02fe746fce7df08589f5701b8553d9419a322c16ee25feb7252c2001d5b0d0a4ae5f0dabe72a31e9d5318c61782bc6feea6f813

            • C:\Program Files\7-Zip\7zFM.exe

              Filesize

              956KB

              MD5

              4b9b60a11642179b7b9c23c4e7dc9cdd

              SHA1

              f0819440754012f9989a08718a3ecad0da733295

              SHA256

              3675ba2afb9e0014b43abdf6a4dce9cef794e44af0989ff7a243602f272c3ed1

              SHA512

              cb7b5ca86888f9225d02bdaf11426bca77f77bbafb79687a993712f5dc66f0c31e4cdef0d2a1aaedf43d734cc0deab09367e2f78ff7e6357a516135f9e126e93

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              4cfdb20b04aa239d6f9e83084d5d0a77

              SHA1

              f22863e04cc1fd4435f785993ede165bd8245ac6

              SHA256

              30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

              SHA512

              35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

            • F:\$RECYCLE.BIN\S-1-5-21-2721934792-624042501-2768869379-1000\_desktop.ini

              Filesize

              9B

              MD5

              b2c5a70d0c0f7486eb7bcd691664669b

              SHA1

              0be0eb4afb44c300b16181ffb981db5d2e6563e8

              SHA256

              3369ac2d9926df9466c914d7bafae58764696319b1584f9f83202267db0f8799

              SHA512

              5d9ec62e9872989b928f4372fe35a4fec4ab6ae308a2d0191b487cfa1bdca276bb5ac54c7d3ba59d081128dcfb40252e40089e03ca4600ee428714a322628d14

            • memory/1132-5-0x00000000024E0000-0x00000000024E1000-memory.dmp

              Filesize

              4KB

            • memory/2252-66-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2252-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2252-72-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2252-20-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2252-828-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2252-1825-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2252-14-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2252-2958-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2252-3285-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2252-7-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB