Analysis

  • max time kernel
    100s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 23:32

General

  • Target

    54de4c499b9028e27bb30b9f867ba5c941f6236deffe4b4cc84eb7a7b5f45e74.exe

  • Size

    78KB

  • MD5

    955506b9bad41d4f9b2580c9c30ce008

  • SHA1

    c2a0307df64d5e503525bd096cb212d34b7d2f72

  • SHA256

    54de4c499b9028e27bb30b9f867ba5c941f6236deffe4b4cc84eb7a7b5f45e74

  • SHA512

    7e47fe5fd21f13f5a0e84fbb5481d683af9bd2fcb08e13100d8f138d60f2879718fa030576199ef526f679281d7d89a35e3038340cede6f9a12b023627dc7e9e

  • SSDEEP

    1536:3fgLdQAQfcfymNpQKt8fjqXnviYhb8x//LenDkBT/ri:3ftffjmNWUXnviYhb8t/LenDkBTDi

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1124
      • C:\Users\Admin\AppData\Local\Temp\54de4c499b9028e27bb30b9f867ba5c941f6236deffe4b4cc84eb7a7b5f45e74.exe
        "C:\Users\Admin\AppData\Local\Temp\54de4c499b9028e27bb30b9f867ba5c941f6236deffe4b4cc84eb7a7b5f45e74.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2108
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a17F4.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Users\Admin\AppData\Local\Temp\54de4c499b9028e27bb30b9f867ba5c941f6236deffe4b4cc84eb7a7b5f45e74.exe
            "C:\Users\Admin\AppData\Local\Temp\54de4c499b9028e27bb30b9f867ba5c941f6236deffe4b4cc84eb7a7b5f45e74.exe"
            4⤵
            • Executes dropped EXE
            PID:3004
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2992
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2572
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1972

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              3ac2a02ae8472cb0a798cb805d2e65c5

              SHA1

              d23e40f07a99ba35f9a720a946fedc0dac86a8da

              SHA256

              a93c98f0bc6d82fcf404eb0044ae952e511cfe81d54106da4eb4be25d58d6ccf

              SHA512

              8bd2e2194aa82ebc78fa89742002a39e595bfd11aef4e890ce146d07b8b27f4ab80e28f4d98018f87c5217a2da2471b4eac99b6ea5fb28c07d654497096f8667

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              4cfdb20b04aa239d6f9e83084d5d0a77

              SHA1

              f22863e04cc1fd4435f785993ede165bd8245ac6

              SHA256

              30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

              SHA512

              35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

            • C:\Users\Admin\AppData\Local\Temp\$$a17F4.bat

              Filesize

              722B

              MD5

              e126aad8fd04c187282a0c15ded3d517

              SHA1

              ed1f4789db55bed4dd1ee96e4de0955f174ce1cd

              SHA256

              df33f36c73469761ac6bea41f745d3c35ed141b81066b54833ec595604cae0f1

              SHA512

              f9a1598ac5dc36f228be16b765a774ec79cea0d669a7bfbce7864dfc82efcaf68193b55805c10adbfe2fdabf83bcb64c37a66b23fefdc807a2110d76cf04fc9e

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              5b4b652ee77ef4d70046838d30dc9cae

              SHA1

              afe3e77b108490d09c6f191c29ed69c0aa6105e7

              SHA256

              168ce3cb9563c08e2df7f382d6cbe8473a184bd3c7ce5a14398b41f39bc5be28

              SHA512

              55daffaa8bd61db5b34d68b8d0aaeee4457e4f17f5bc1b5cce61b5b3bea61511b51f17f15bf9e5fed43ef2d4c261cacb9afe366bc6301345dff807c5a02986a5

            • F:\$RECYCLE.BIN\S-1-5-21-2248906074-2862704502-246302768-1000\_desktop.ini

              Filesize

              9B

              MD5

              2be02af4dacf3254e321ffba77f0b1c6

              SHA1

              d8349307ec08d45f2db9c9735bde8f13e27a551d

              SHA256

              766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16

              SHA512

              57f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0

            • \Users\Admin\AppData\Local\Temp\54de4c499b9028e27bb30b9f867ba5c941f6236deffe4b4cc84eb7a7b5f45e74.exe

              Filesize

              52KB

              MD5

              ea602cfb7b4eb2f4192a192d97a71e28

              SHA1

              bd82fd34c60ca4a70f1153d0888c83207fd12403

              SHA256

              99a66e369f0cbebc727d38fc85c9e6ca39efad8b0c4983a7689118973a2ddcde

              SHA512

              e3609d2b07839f8f197933645cac5dd86363363a86a0af8107c0841298c3fb73d9dd6cac899c430b14e9e1b31e96d70b4c6d5a27be20e112ec06628862c8d3a6

            • memory/1124-30-0x0000000002D40000-0x0000000002D41000-memory.dmp

              Filesize

              4KB

            • memory/2108-15-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2108-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2108-16-0x00000000001B0000-0x00000000001E4000-memory.dmp

              Filesize

              208KB

            • memory/2992-35-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2992-21-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2992-42-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2992-48-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2992-94-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2992-100-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2992-1050-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2992-1853-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2992-3312-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3004-34-0x0000000000400000-0x000000000041B000-memory.dmp

              Filesize

              108KB