Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2024, 20:58

General

  • Target

    4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe

  • Size

    117KB

  • MD5

    a5d67bc9ee14ef1a35f01f0531f1f24d

  • SHA1

    6c518f8a5820abdb29285efbe7f13823fd973bcc

  • SHA256

    4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c

  • SHA512

    f14c4b3bfeb06c2c6fe3adf7ed4be46d98164fd2c04bb53fbdcd77c5298b4ccefc8eb28feee082a11bcb83773c3ae104ede1da766406a040f2096ac54fbf27f7

  • SSDEEP

    3072:bakF3pNJo/FQXy+uc//korlDFtNel3kaIFH/B0CyPvO3c0gCajNCg:jFpNJo/qi+k

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1064
      • C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe
        "C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a889.bat
          3⤵
          • Deletes itself
          PID:2924
          • C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe
            "C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe"
            4⤵
            • Executes dropped EXE
            PID:2728
          • C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe
            "C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe"
            4⤵
            • Executes dropped EXE
            PID:2144
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2648
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2736

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              252KB

              MD5

              7ab1e57f4c2bf1d2993bbced63b8a079

              SHA1

              338510e0e58fecb34db5af4fdd57c3196bcf492f

              SHA256

              746f3612c4431691580be5f3f45dac4a8782fd033b6cb6206903952cdbf381bf

              SHA512

              29f5acdc6bafde8fe6622d02b4bd67ca0362ec2dcd32f301a15f460516ec2a20fc3a2096a44c6719bb953debca53d14095355ff2585b4be01a8bfb4fdae5c617

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              472KB

              MD5

              88eb1bca8c399bc3f46e99cdde2f047e

              SHA1

              55fafbceb011e1af2edced978686a90971bd95f2

              SHA256

              42fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428

              SHA512

              149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728

            • C:\Users\Admin\AppData\Local\Temp\$$a889.bat

              Filesize

              721B

              MD5

              2b9f29129804cf6ff5727662a76f40b6

              SHA1

              b4b5512e0312188e69b4703a74785c46a3a2a15d

              SHA256

              0eed75b900ad5662f16614d3f11f7a2dad9764c184194c1708507b85025927fe

              SHA512

              ee40f471bf6c71b76e6fa828669e8a12b8c6284236820c035d0f6f1c7410445960be7d11a7326205f5827166a2567f348215a1095f2b718930f32a0b47800460

            • C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe.exe

              Filesize

              90KB

              MD5

              c8c3b8fb878ce29b75a69219abff4ccf

              SHA1

              e2e5d4feb0dff20ad1d83f72062f5816d365bc37

              SHA256

              4656a73e3e8ae7ab4dc9bcdcda922f18787978c758871c9bd51e4340d46e5113

              SHA512

              70c68e1c770cc806b2d2edf5d40cc86dd1781d8a01849cffc08a511133c1efcf892bd8a56dd4a7f8e307c46b038fff3a309ce9c1d78feb6190347ae6d77d6ad1

            • C:\Windows\rundl132.exe

              Filesize

              27KB

              MD5

              9920a0249e42429e36d021ee4928712d

              SHA1

              8484687015901fd29dfb9f66820654bfea218279

              SHA256

              86d714dc8443ae16c0f2a8d2698c5ec65598d5239bae01c9afe38f57dbf545c9

              SHA512

              2bebb557344467e98dc654dff83a00a65ca37ebccd922fab718c626c86243256023f8cdb48ee4675446bd9eded2ad72d9260ef2cda9fb9d7022dc04cad41e8e0

            • F:\$RECYCLE.BIN\S-1-5-21-2721934792-624042501-2768869379-1000\_desktop.ini

              Filesize

              9B

              MD5

              eed22d90d59cbfc76cc757d7c238a336

              SHA1

              fa10a168f65a1788ecfc6631ff8dcddbc534a27d

              SHA256

              f04d4e94a23081336a3eed6026a776692a44e29a28b200df129e4deb34593238

              SHA512

              b180f5199832146f98ba86eca73c9a1a19ef3582a028b3fcfc0c7c6c9563e5e13b3865f0875ee9c54af9188a5f83cc56fecc40873485c4ea76d8f95de6f63c1a

            • memory/1064-65-0x0000000002E90000-0x0000000002E91000-memory.dmp

              Filesize

              4KB

            • memory/2528-21-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/2528-70-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/2528-77-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/2528-84-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/2528-129-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/2528-135-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/2528-1647-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/2528-1888-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/2528-3347-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/2924-59-0x00000000024B0000-0x00000000024B1000-memory.dmp

              Filesize

              4KB

            • memory/3064-0-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/3064-12-0x0000000000220000-0x0000000000255000-memory.dmp

              Filesize

              212KB

            • memory/3064-16-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB