Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2024 18:07

General

  • Target

    a1b1b79cb55fe601685b4c8cef29ff05d2e27e5dda9b9bd9d92b5258790dd1ce.exe

  • Size

    26KB

  • MD5

    b1d285f2920b52df533cefca953e7ef9

  • SHA1

    0736764baa53aa8f8543784d481c2b0fe2ce3767

  • SHA256

    a1b1b79cb55fe601685b4c8cef29ff05d2e27e5dda9b9bd9d92b5258790dd1ce

  • SHA512

    dfac344861eaddca3bcab60fb8304a559250cfeb598a8c768fa6461396c238f6ec579b8257461b5e7981c59ca59d6818f810ae8d00b8e2baab4dce3df2bc6da5

  • SSDEEP

    768:bf1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:bNfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1088
      • C:\Users\Admin\AppData\Local\Temp\a1b1b79cb55fe601685b4c8cef29ff05d2e27e5dda9b9bd9d92b5258790dd1ce.exe
        "C:\Users\Admin\AppData\Local\Temp\a1b1b79cb55fe601685b4c8cef29ff05d2e27e5dda9b9bd9d92b5258790dd1ce.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1600
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1704
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2516

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        10e927db6aae50e89fcb4d441d9e27e1

        SHA1

        6a2250c03aba8fe7a9c388742db5ac4e473fa178

        SHA256

        a68e60f5bc35fdb50525110f44ad636498278629d38a3854369e9a93ed70ee19

        SHA512

        1d6c8b2d48403d037fc31ffeee690ca956ed8595671e1400c8dad69347ac0749d94498b00feec325575d98d300c0694d0083ca7e2e72a124ff45e9f74dd09227

      • C:\Program Files\7-Zip\7zFM.exe

        Filesize

        956KB

        MD5

        4e0ff1a33ed3565a46a65ac80afb614a

        SHA1

        e7640d9a00e5252475d8a3f9b7c8bb6378689aa9

        SHA256

        9b32295d784a2c44949b5be7f34867a0bc53d29b16b5bd305362fbd1c85302ed

        SHA512

        e3d14027d330828cb85fbd3e1683404175d5e91347f65cf84db1a692295f1bb09213a96d21b63a47b29c7f3c4e38eb750a02cdac8fd4be1e23825565bfb209fc

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • F:\$RECYCLE.BIN\S-1-5-21-2248906074-2862704502-246302768-1000\_desktop.ini

        Filesize

        9B

        MD5

        95b3e5fe04e8423c49a7f69a5d13771f

        SHA1

        615b63fb8bf07dbb0565ffd492067309645064c9

        SHA256

        1663db9b496c87701f6c8f6721e92994ffdd747f949ab1070fd844c4d63fb916

        SHA512

        d9a0d342e84c32d4c0aee97be7b9a102963d1aeab7edd87b080548f7dd144d851c558e6706bec441534d8e188938655c2b551e358d342309677511404a34ce81

      • memory/1088-5-0x0000000003060000-0x0000000003061000-memory.dmp

        Filesize

        4KB

      • memory/1600-66-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1600-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1600-72-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1600-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1600-650-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1600-1825-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1600-14-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1600-2335-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1600-3285-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1600-7-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB