Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 20:12

General

  • Target

    9358706abb9de475b9ca0dbeeae35933c62ab159e0324eeb528b3404f3b2fece.exe

  • Size

    281KB

  • MD5

    bb983785de709efd656ffabe94ee1737

  • SHA1

    6c0847c0eeb35d13e6b648ba0df9bf2d81b38080

  • SHA256

    9358706abb9de475b9ca0dbeeae35933c62ab159e0324eeb528b3404f3b2fece

  • SHA512

    a86f122be173cd2d380e4136ab81787208df1959c458ed592716b1978d284d87d93c6286fd60c6d5b1b2a5232f8c28e5f5972493bbd9875dd9b6da1beca7bb50

  • SSDEEP

    6144:IVfjmNZ4R9FEh4bBza+C+dDa62TdIGI1:y7+Z4RnbBzap+dDRwdg1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3344
      • C:\Users\Admin\AppData\Local\Temp\9358706abb9de475b9ca0dbeeae35933c62ab159e0324eeb528b3404f3b2fece.exe
        "C:\Users\Admin\AppData\Local\Temp\9358706abb9de475b9ca0dbeeae35933c62ab159e0324eeb528b3404f3b2fece.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3420
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a45D3.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:632
          • C:\Users\Admin\AppData\Local\Temp\9358706abb9de475b9ca0dbeeae35933c62ab159e0324eeb528b3404f3b2fece.exe
            "C:\Users\Admin\AppData\Local\Temp\9358706abb9de475b9ca0dbeeae35933c62ab159e0324eeb528b3404f3b2fece.exe"
            4⤵
            • Executes dropped EXE
            PID:3408
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:936
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:116
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4116

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              570KB

              MD5

              99ead5ed8fa5f58aa6a0b8151770f3b8

              SHA1

              3f4b62cc035da4d19210f81b4c5441508e420aa6

              SHA256

              d29ae85b57f01564e3f74f2344c2cf30da8d741ab3f2887887e81806ad73a832

              SHA512

              b2025db0b74f58f77fd13aa9877b315abdae08f89b9867fba7b6a1e63c87f0fc994365953405a558c0c5773cadadbd0033a6dc7caa94edd65a747c52df55319a

            • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

              Filesize

              481KB

              MD5

              1db5b390daa2d070657fbdb4f5d2cc55

              SHA1

              77e633e49df484b827080753514cc376749b0ceb

              SHA256

              d5fbaf5c0d8e313d4dad23b28cac4256c5dbed6ab3b0d797e2971f30c5e095ad

              SHA512

              68aa0152f5aae79a146c1813915fd16ec5454b285bd1781370923f97d6c147d53684192f7f4161e5c1a340959ec432ecaac127b0abe7d08f70c387e08ee4f617

            • C:\Users\Admin\AppData\Local\Temp\$$a45D3.bat

              Filesize

              722B

              MD5

              156421cd0512debfc4663137957c7415

              SHA1

              81abb7e00ca0f6d57e5a399ecb03d73738a9b5ef

              SHA256

              f28c242a15b072e1b83c02c9543a2ec8fe73814b153ee52c11d1c625a1735f3e

              SHA512

              0cfa338c3eba2af33c7469438a760d054d08caf8d8ca6e2f7d4ad71d634820ab805c94a21bc8dc76606920a549bfe5a44cdc8492c8e69a30679121135311ad56

            • C:\Users\Admin\AppData\Local\Temp\9358706abb9de475b9ca0dbeeae35933c62ab159e0324eeb528b3404f3b2fece.exe.exe

              Filesize

              255KB

              MD5

              f5f28237064364217dce18618786f0b5

              SHA1

              1862cb54429347651cd52d555a56e240d11ab14c

              SHA256

              ff01a872a745adb9228d93cc32f54680b9bf3fe9f4382edf1d5ccbfe3d75390d

              SHA512

              d7e17bf52441a0e65461c35d06a84d3fd1f4c80a9a21164529e5742df4f7a1e02e086b3e4c0e3467c15bddb2385c609f70f39d67296f9848b401bcf6f50f742f

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              e26e5eda1f7874ca6c93a5b4d8efbbb6

              SHA1

              284255407a126d6f7fd197a5c5923e7e1d9b9c7d

              SHA256

              402b2d0e37e22fca55530a573812ebb52038818136b3ce38fcf235c576eaff9f

              SHA512

              93ce1c0c00efd84c2635be3d17e498282c918411e12b82cf2ab1afe5ffccdf66a29b0e6a9eab8795d97f2ccb850b861a03361469424cf5f93b619e710ebc8d96

            • F:\$RECYCLE.BIN\S-1-5-21-1497073144-2389943819-3385106915-1000\_desktop.ini

              Filesize

              9B

              MD5

              95b3e5fe04e8423c49a7f69a5d13771f

              SHA1

              615b63fb8bf07dbb0565ffd492067309645064c9

              SHA256

              1663db9b496c87701f6c8f6721e92994ffdd747f949ab1070fd844c4d63fb916

              SHA512

              d9a0d342e84c32d4c0aee97be7b9a102963d1aeab7edd87b080548f7dd144d851c558e6706bec441534d8e188938655c2b551e358d342309677511404a34ce81

            • memory/936-32-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/936-19-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/936-26-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/936-12-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/936-37-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/936-41-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/936-1002-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/936-1165-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/936-1581-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/936-4716-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3420-8-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3420-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB