Analysis

  • max time kernel
    149s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 18:07

General

  • Target

    a1b1b79cb55fe601685b4c8cef29ff05d2e27e5dda9b9bd9d92b5258790dd1ce.exe

  • Size

    26KB

  • MD5

    b1d285f2920b52df533cefca953e7ef9

  • SHA1

    0736764baa53aa8f8543784d481c2b0fe2ce3767

  • SHA256

    a1b1b79cb55fe601685b4c8cef29ff05d2e27e5dda9b9bd9d92b5258790dd1ce

  • SHA512

    dfac344861eaddca3bcab60fb8304a559250cfeb598a8c768fa6461396c238f6ec579b8257461b5e7981c59ca59d6818f810ae8d00b8e2baab4dce3df2bc6da5

  • SSDEEP

    768:bf1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:bNfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3528
      • C:\Users\Admin\AppData\Local\Temp\a1b1b79cb55fe601685b4c8cef29ff05d2e27e5dda9b9bd9d92b5258790dd1ce.exe
        "C:\Users\Admin\AppData\Local\Temp\a1b1b79cb55fe601685b4c8cef29ff05d2e27e5dda9b9bd9d92b5258790dd1ce.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4264
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4316
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:4028

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        10e927db6aae50e89fcb4d441d9e27e1

        SHA1

        6a2250c03aba8fe7a9c388742db5ac4e473fa178

        SHA256

        a68e60f5bc35fdb50525110f44ad636498278629d38a3854369e9a93ed70ee19

        SHA512

        1d6c8b2d48403d037fc31ffeee690ca956ed8595671e1400c8dad69347ac0749d94498b00feec325575d98d300c0694d0083ca7e2e72a124ff45e9f74dd09227

      • C:\Program Files\dotnet\dotnet.exe

        Filesize

        165KB

        MD5

        cdad2adb9ae1f1538e8bbcb20b175991

        SHA1

        4ff6d0c6372379a3ac5ab93b3ba69b5eee7d89bc

        SHA256

        0b362304913270867cfe6a9b73811cefc0ce242a28e5b0149bcae0eb65027d64

        SHA512

        fbe4507dfdd7e13bc4d301bb46317624eaffc8a485c87e6a9b8af65cf2d6583b67a2f04e4deea0d210fd9117c84f1e064a928400ba691e4bdf4001c7757221e6

      • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

        Filesize

        481KB

        MD5

        1db5b390daa2d070657fbdb4f5d2cc55

        SHA1

        77e633e49df484b827080753514cc376749b0ceb

        SHA256

        d5fbaf5c0d8e313d4dad23b28cac4256c5dbed6ab3b0d797e2971f30c5e095ad

        SHA512

        68aa0152f5aae79a146c1813915fd16ec5454b285bd1781370923f97d6c147d53684192f7f4161e5c1a340959ec432ecaac127b0abe7d08f70c387e08ee4f617

      • F:\$RECYCLE.BIN\S-1-5-21-3270530367-132075249-2153716227-1000\_desktop.ini

        Filesize

        9B

        MD5

        95b3e5fe04e8423c49a7f69a5d13771f

        SHA1

        615b63fb8bf07dbb0565ffd492067309645064c9

        SHA256

        1663db9b496c87701f6c8f6721e92994ffdd747f949ab1070fd844c4d63fb916

        SHA512

        d9a0d342e84c32d4c0aee97be7b9a102963d1aeab7edd87b080548f7dd144d851c558e6706bec441534d8e188938655c2b551e358d342309677511404a34ce81

      • memory/4264-27-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4264-23-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4264-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4264-18-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4264-978-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4264-1161-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4264-1705-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4264-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4264-4726-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4264-5-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB