Analysis

  • max time kernel
    149s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-04-2024 23:00

General

  • Target

    8e4b5f65aa8f1d0977228dfb35af719036e4b92380b0427ab42d52543764b23b.exe

  • Size

    66KB

  • MD5

    7ab603a67916126a3aba6422571fb17d

  • SHA1

    916578457c05927c9b2d61f51ff90e85b2be0cad

  • SHA256

    8e4b5f65aa8f1d0977228dfb35af719036e4b92380b0427ab42d52543764b23b

  • SHA512

    f02bccf3f6ce384f32a68acef037a82a3963563d5e74ae2c72a5dcafc36f2b603a65aef5c11a777ff6d7c957f9bb32d4c777e0417b0d71932e9c91ce961f578e

  • SSDEEP

    1536:AfgLdQAQfcfymNDSVHaxgzwjY/3kPYzcPBGRE/mZ:AftffjmNDmHaxgE2cP0RE/mZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3464
      • C:\Users\Admin\AppData\Local\Temp\8e4b5f65aa8f1d0977228dfb35af719036e4b92380b0427ab42d52543764b23b.exe
        "C:\Users\Admin\AppData\Local\Temp\8e4b5f65aa8f1d0977228dfb35af719036e4b92380b0427ab42d52543764b23b.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3428
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a47C7.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4588
          • C:\Users\Admin\AppData\Local\Temp\8e4b5f65aa8f1d0977228dfb35af719036e4b92380b0427ab42d52543764b23b.exe
            "C:\Users\Admin\AppData\Local\Temp\8e4b5f65aa8f1d0977228dfb35af719036e4b92380b0427ab42d52543764b23b.exe"
            4⤵
            • Executes dropped EXE
            PID:1132
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1072
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2876
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2636

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        cda983865cb5bc2fb26463c9ade2dd8a

        SHA1

        32ab4ef3cf07513f5b32ba6650edcf7768312756

        SHA256

        5fb9c04c3be90ae86e88c4c300cf2041b78208d7e0bed62610a93a8ad6ed955e

        SHA512

        0d04f9fee47568c34ba4cda8e165dcebe345755d27b33d8ea0e963ed117e86a094562da447967764193bc93ee244cc4f1a0e6e610ee32d310a1c2e38d1712df9

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        d10fac9bb06189907219a49b311a1058

        SHA1

        7760745b247bcc0824660b8ff175e29441c1e18a

        SHA256

        d2438b7f46534f188096ecde9648ad929f4cd5f974bf32de9e347895beae1681

        SHA512

        ef1849405adf00bef2845c236de1d8d29ae89de7f81dd535f898a64a60e6bd3d9097c3961bb1d8c059d45125cbdefeab64a543903e939d933ead9a339c538255

      • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

        Filesize

        481KB

        MD5

        1db5b390daa2d070657fbdb4f5d2cc55

        SHA1

        77e633e49df484b827080753514cc376749b0ceb

        SHA256

        d5fbaf5c0d8e313d4dad23b28cac4256c5dbed6ab3b0d797e2971f30c5e095ad

        SHA512

        68aa0152f5aae79a146c1813915fd16ec5454b285bd1781370923f97d6c147d53684192f7f4161e5c1a340959ec432ecaac127b0abe7d08f70c387e08ee4f617

      • C:\Users\Admin\AppData\Local\Temp\$$a47C7.bat

        Filesize

        722B

        MD5

        77d2248a6f640f3df3a13a51ebe2efb8

        SHA1

        83dd971010d102e1eff46ef6b0a797b85b335c45

        SHA256

        16e35830585c51f4bad97fe756a7cd10b2f85e4c9365a0406923300b62ca7cee

        SHA512

        248c8e3f3d0ff3ca6cc9378a68549bcf524911b06db72db8a1766c7785078b6af2618dbfb95190e015d93f4a8df1726824d1e38ede57f049b49c3995fa10500f

      • C:\Users\Admin\AppData\Local\Temp\8e4b5f65aa8f1d0977228dfb35af719036e4b92380b0427ab42d52543764b23b.exe.exe

        Filesize

        40KB

        MD5

        20bf33a80e41cfdec90f94c4f7417305

        SHA1

        7534ee093dbb13379d49310304be54c4a66007db

        SHA256

        046aab6b6008e5d790eeebc31b65f1ee9c8ab4a6a0834cf57ab4679e1e5e86c1

        SHA512

        07eacb0fb738fce7d1195b908fe7aa64bac9ee9b17fe8814a8829eec2696f75646681689f2cba6cdf19822cce80de4c4bd1e7ea283f94d9d5eefbb81337e5b2b

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        c04efdf02f4d903a4ee4c73836f2bb3d

        SHA1

        dee65b553a1df85217908ca97f6be42c5375d5e7

        SHA256

        fca152c317c907959fd230389d37d3b1f6edaa178154a64a53ee94834e843c30

        SHA512

        cf96bab4a6f53042b2e21b03c3a971a77622be1f7ce667c9ef1d93d72508a9634480a8b56b157d82deca1577d40feca192c64eaf1372b28853b09a5f06e4e55c

      • F:\$RECYCLE.BIN\S-1-5-21-983155329-280873152-1838004294-1000\_desktop.ini

        Filesize

        8B

        MD5

        5f100629144d81dc74c26a0981eb2a00

        SHA1

        712df1d52fbbd6d84660a9e0c2d53e2b9568bcb8

        SHA256

        f669f4c43954e911517da8935526966d527e04c88f50563d928ddfc21897d5f5

        SHA512

        c0ed3cb7eba4e7a0195c0ca982f9d2903a2173375b0c2fd23286d9366dd3b097207564b1c1d26fdc7b86ab30345e9cf5909b7b3ceb1a73ebd70c5d1446a824ef

      • memory/1072-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1072-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1072-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1072-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1072-767-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1072-1175-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1072-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1072-4740-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1072-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3428-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3428-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB