Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 12:10

General

  • Target

    cacb5c40115d587333c6966a9a769bea0d6cf3ed0fe77292b4377724f337a2ca.exe

  • Size

    5.7MB

  • MD5

    4fbfb8e5adf1ce3d692b211d586684d5

  • SHA1

    b0a72bd7e8c2b1d3d3d3d4b8cad05eca85954db5

  • SHA256

    cacb5c40115d587333c6966a9a769bea0d6cf3ed0fe77292b4377724f337a2ca

  • SHA512

    509816168390c54f944dfca42baa74a7128f53c56dd7448912f9be19abbd3d595c53bebfa1dcd4162bf8c2bd6c3b9c30c55e93eb85d0c07ebeb0c77c0a14b151

  • SSDEEP

    49152:nPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTPBJ:fKUgTH2M2m9UMpu1QfLczqssnKSk

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1340
      • C:\Users\Admin\AppData\Local\Temp\cacb5c40115d587333c6966a9a769bea0d6cf3ed0fe77292b4377724f337a2ca.exe
        "C:\Users\Admin\AppData\Local\Temp\cacb5c40115d587333c6966a9a769bea0d6cf3ed0fe77292b4377724f337a2ca.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2216
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aF6C.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          PID:2780
          • C:\Users\Admin\AppData\Local\Temp\cacb5c40115d587333c6966a9a769bea0d6cf3ed0fe77292b4377724f337a2ca.exe
            "C:\Users\Admin\AppData\Local\Temp\cacb5c40115d587333c6966a9a769bea0d6cf3ed0fe77292b4377724f337a2ca.exe"
            4⤵
            • Executes dropped EXE
            PID:2700
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3048
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2116
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2620

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              254KB

              MD5

              fa083a8d2b6cb85c0085b8a9549c73ad

              SHA1

              ef1433b6454981b42881caad54e7448519dd272a

              SHA256

              ee7c084daf1a9ce345d913c436df6cf776a41df819dee31324c7158322d85325

              SHA512

              65da9dafac1cef3bde73ff70feb67f630da712d467f108717e357427edfdf8ee0bef452523e2a80ad2d00db2770d9e596a0117a50279959d329885ff4a40ca2d

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              474KB

              MD5

              deef5629f996ce278bce0b117b005d4a

              SHA1

              aff56f382688eafef359eeb69124ae4210681805

              SHA256

              eb89044a80660f8218d13a1da59accca1b4cb41048fc68358c728a2374960966

              SHA512

              b9a3f8255887c756c1d78988b73ecdf08dd6b22fc52b3bb2bf92c5d73d5e3d1dd97d704be0e23daf2593606ef799568f6f1ce14a97abae66f243f35c6b3659ac

            • C:\Users\Admin\AppData\Local\Temp\$$aF6C.bat

              Filesize

              721B

              MD5

              eaa36758da7588e0cfd7275779b0b165

              SHA1

              7776798a248a9b80a66269234a2070daaa7badc3

              SHA256

              5897d06daee3569d1f318d056ac56a59605dc1f07dc13c8cd887d9278b584ab9

              SHA512

              49de1d3033f98ae1b211e6a96ff1c8c25f0d420aaf4f7cbe7613956c85bdb0bdc3711675d895352984b69c03bf39d7cd5cf059e4962f24ad7f65bf228253f5b0

            • C:\Users\Admin\AppData\Local\Temp\cacb5c40115d587333c6966a9a769bea0d6cf3ed0fe77292b4377724f337a2ca.exe.exe

              Filesize

              5.7MB

              MD5

              ba18e99b3e17adb5b029eaebc457dd89

              SHA1

              ec0458f3c00d35b323f08d4e1cc2e72899429c38

              SHA256

              f5ee36de8edf9be2ac2752b219cfdcb7ca1677071b8e116cb876306e9f1b6628

              SHA512

              1f41929e6f5b555b60c411c7810cbf14e3af26100df5ac4533ec3739a278c1b925687284660efb4868e3741305098e2737836229efc9fe46c97a6057c10e677c

            • C:\Windows\Logo1_.exe

              Filesize

              29KB

              MD5

              485cb5b83f27dbc59c722daa3caf858f

              SHA1

              faa7c3517969995a34897cc79236f85f2c01d59f

              SHA256

              6cc84f9f66a5928707b42d4e08e9eb603fef6a85e9308f9320f63003cf145f4b

              SHA512

              22a37e3368109cb6565d64070360fecf481bc71afd52a2b9a35cad42d33e35cea763795628cfa0fd7146b206e846a272200f91938705ee87b7bafde524082ecf

            • F:\$RECYCLE.BIN\S-1-5-21-3627615824-4061627003-3019543961-1000\_desktop.ini

              Filesize

              9B

              MD5

              95b3e5fe04e8423c49a7f69a5d13771f

              SHA1

              615b63fb8bf07dbb0565ffd492067309645064c9

              SHA256

              1663db9b496c87701f6c8f6721e92994ffdd747f949ab1070fd844c4d63fb916

              SHA512

              d9a0d342e84c32d4c0aee97be7b9a102963d1aeab7edd87b080548f7dd144d851c558e6706bec441534d8e188938655c2b551e358d342309677511404a34ce81

            • memory/1340-29-0x0000000002D10000-0x0000000002D11000-memory.dmp

              Filesize

              4KB

            • memory/2216-0-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2216-16-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2216-17-0x0000000000440000-0x0000000000476000-memory.dmp

              Filesize

              216KB

            • memory/3048-38-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/3048-44-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/3048-90-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/3048-96-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/3048-934-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/3048-1849-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/3048-31-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/3048-2992-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/3048-3309-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/3048-21-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB