Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2024, 18:13

General

  • Target

    27be22589a1f20622b7fe435e609382b46c7fed57e85ae540670313fac634ee8.exe

  • Size

    1.7MB

  • MD5

    13a79e4f83ad3a38222778f6bd4265ef

  • SHA1

    c12024059ee8fed82a05ea3e2706ed8875324843

  • SHA256

    27be22589a1f20622b7fe435e609382b46c7fed57e85ae540670313fac634ee8

  • SHA512

    ecae2c9ff7173828c1398c925252d66de8ae598a820e7f08791b5aeccc2aa6a894c3b118fc7dda596e1a0dc3d2d6573b03e766001a585d3eca7389bde41f65b7

  • SSDEEP

    49152:M7qO9791XV68jeHlGIwMrc4eEgEX6it3MHII4bzu0:GNXdglGIwMrxe/EqiwIIIv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3572
      • C:\Users\Admin\AppData\Local\Temp\27be22589a1f20622b7fe435e609382b46c7fed57e85ae540670313fac634ee8.exe
        "C:\Users\Admin\AppData\Local\Temp\27be22589a1f20622b7fe435e609382b46c7fed57e85ae540670313fac634ee8.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:924
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a76E5.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2084
          • C:\Users\Admin\AppData\Local\Temp\27be22589a1f20622b7fe435e609382b46c7fed57e85ae540670313fac634ee8.exe
            "C:\Users\Admin\AppData\Local\Temp\27be22589a1f20622b7fe435e609382b46c7fed57e85ae540670313fac634ee8.exe"
            4⤵
            • Executes dropped EXE
            PID:3288
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:768
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:224
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4248

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              7ef2913fc272a57a19fcf8462455aa97

              SHA1

              f39caed4f4bad2eaa6c7830771c42227bc1831f4

              SHA256

              e8629b61eb536fd383d308f941b792af2be1744c87bcadb83e5bce5b35e1394a

              SHA512

              6af4857c1b41f65fb826f81beca5df0f68b314c865813ece879dd32f353a7adbe4d2f9ca0c3af2e447338e74fd45e3669ded0c21f1c99f3d9641b389d03d1c02

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              570KB

              MD5

              c6105dcd0bea25a20bc055f582b9ffd1

              SHA1

              8c0f8584be913f06a39443a60f32edd80eaf740b

              SHA256

              021a02646fa073494f1df66ebb42cd9b72549ca53396e13797a6dddb65cc2b1a

              SHA512

              dacbcacb68bd5bfe795561493f1a9921fded748e1a29887b3551c520719af2d3c6d5a207d594b0a8a509f4c93c3994990020e71a8ef04cb199153320b138763e

            • C:\Users\Admin\AppData\Local\Temp\$$a76E5.bat

              Filesize

              722B

              MD5

              98a80475d258119a25b7b65159e5f6bf

              SHA1

              8c7829a9aa26fd02de8c537572d3f3fd31fe7603

              SHA256

              d6575ee06eca0a5ab5f319716730c60c5581304df75a1a0ed164c44d42e16a37

              SHA512

              70422cb9859d413835d06337f0ffccc28569abc17df512e6c4f084bb417e33b6e96a8fda449acda517653fd9ef2a50c15c0edb0c3f286c3f200991a927a1ccad

            • C:\Users\Admin\AppData\Local\Temp\27be22589a1f20622b7fe435e609382b46c7fed57e85ae540670313fac634ee8.exe.exe

              Filesize

              1.7MB

              MD5

              f3692e38be0935bb1ad2f415e4b64a92

              SHA1

              85c0b55bcc6a88d713322ecdca111e68d6cf0bf6

              SHA256

              27b4a545868f9d8fe33e9955f75a95de4249a41b2065e324d27eb2760a4842bc

              SHA512

              c92d4fd2a7f08590fb5be17bed597ced274262675bc69c1b6804f07c047da8f4381f9601fd41f13bd0117da58d1c13fe8a9d748fd379bde7e8e056d9e0ea3b1d

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              0901dc82d2fca942701b9f12bc1fd530

              SHA1

              6913b4c6a6ce2c7e162e986fe74cb5c135af37ac

              SHA256

              3bb60e8cfe0ffd2e771c2382401f634b2194d8883a42716bc46cf132ac163150

              SHA512

              9b1913e0641f72b7d1e9f8066266a50f1c4ee5ec0ea7432ece057f6db8636d9eaa507d5137f796015d27511563a75093890bd4b5d54d3c1dac750eab658a6c41

            • F:\$RECYCLE.BIN\S-1-5-21-513485977-2495024337-1260977654-1000\_desktop.ini

              Filesize

              9B

              MD5

              a7058e06d084fd947f7dddc2897ebb22

              SHA1

              400bcc9cc3cbab99b910b4696cc0163ba8713226

              SHA256

              da0976fbb0588170763cb9b0d9b3ce23b0ff3e7cc146ecf1840a40e7655f1287

              SHA512

              4921df984df8d792e9cde40d30fd19e315b2af1b034966c6fc397ef92e3cb25cfa258400758277e9ec01b5609f3041ba42c8e5911b79eff5a08843a91ad9c9c9

            • memory/768-32-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/768-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/768-26-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/768-10-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/768-37-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/768-41-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/768-374-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/768-1175-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/768-4742-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/924-9-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/924-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB