Analysis

  • max time kernel
    158s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 23:38

General

  • Target

    b8e13cf95a99252990797b70582a3f79025ae905028f2bd67dd558791d8f4267.exe

  • Size

    122KB

  • MD5

    5971748358e950a3cc34fb4833ee37ff

  • SHA1

    9e3e5d94e9665e1569a1959ec26abbde7bc578f6

  • SHA256

    b8e13cf95a99252990797b70582a3f79025ae905028f2bd67dd558791d8f4267

  • SHA512

    ac138afe765e67c7658163b96034b60c9b328c09af742342cd4709e1dbe624218dc006f54c673c27d5f4932647a5309f5b31f8e4360ff1dcdb5ee41fc67b9e1a

  • SSDEEP

    3072:aftffjmNoxND+qcfJUadDpArEbhZOkg9dn9myx:aVfjmNm+pJXdlArqHbqdn93x

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\b8e13cf95a99252990797b70582a3f79025ae905028f2bd67dd558791d8f4267.exe
        "C:\Users\Admin\AppData\Local\Temp\b8e13cf95a99252990797b70582a3f79025ae905028f2bd67dd558791d8f4267.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aA045.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Users\Admin\AppData\Local\Temp\b8e13cf95a99252990797b70582a3f79025ae905028f2bd67dd558791d8f4267.exe
            "C:\Users\Admin\AppData\Local\Temp\b8e13cf95a99252990797b70582a3f79025ae905028f2bd67dd558791d8f4267.exe"
            4⤵
            • Executes dropped EXE
            PID:2020
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2628
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2076
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2872

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        2778ad9e6aacad2241a99e7bd018bde0

        SHA1

        38915e38e2825f21bfe559ef5b15382f7fc38367

        SHA256

        eded432af34df84f3f4709ef344d5eff7a2f8ba9ebf4a0b42d165b699cdfda59

        SHA512

        385a8bae26a682bc971fa4fbc77b33fd18e7756b6e4dd3d68a9c8db5a20248b08dd35eb7e4d1647a272e94d5a32ed4598dd1eaafeff3b139bd45d55ef66a8e38

      • C:\Users\Admin\AppData\Local\Temp\$$aA045.bat

        Filesize

        722B

        MD5

        4ed210bd6ddb93b57a71c6926aef3469

        SHA1

        fa2d6ecec526c8a5e2c18f3e38e9c9c9179a0351

        SHA256

        14f0db577aa740276fd8becf0dca701281b47d021f14a25381e468684ebb7140

        SHA512

        8c07082a86f64468f6e2a211e85f8ccf8f4c840205b2fe604898f6363a01943da48be22d3a55a23d92a89a469fbf22bf0b9fbe8e20664052bd1839dfae62a0a5

      • C:\Users\Admin\AppData\Local\Temp\b8e13cf95a99252990797b70582a3f79025ae905028f2bd67dd558791d8f4267.exe.exe

        Filesize

        96KB

        MD5

        cf4e5eab6e1990aaae552f564837bda6

        SHA1

        1863a363ac7b66cb57cf4e9018ad17672271dfe3

        SHA256

        aa9edadfb3521b99b0642f10123855f1b81947af29ab549945e119202215d353

        SHA512

        46b251b232694c55d8b1d7bb52f3eb99a3a22a69abcceba093958a42e0ce23298b2a3ab2f90aa93fef7302cf704875e068ee2a4664bc2d53614fe44cf99cf13f

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        4877a7c5579b449f8d6849f3b1e687c5

        SHA1

        490e0bdd1b9f7fab574906a0bab2b049cfedec28

        SHA256

        2d43f63dac7f509fdf11d2f138375a594df082ddb17fddab7fb06d66bd49e93a

        SHA512

        714caf3c7892a31d9b0b3e37a22349c77e6d33d32ab8ed3c3bea9945b1cfbf8b92d049ff447a2cb649aa1a134b485aa2b8920598c242ff7f331d9409ec27fbc9

      • F:\$RECYCLE.BIN\S-1-5-21-406356229-2805545415-1236085040-1000\_desktop.ini

        Filesize

        9B

        MD5

        2be02af4dacf3254e321ffba77f0b1c6

        SHA1

        d8349307ec08d45f2db9c9735bde8f13e27a551d

        SHA256

        766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16

        SHA512

        57f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0

      • memory/1264-30-0x00000000029E0000-0x00000000029E1000-memory.dmp

        Filesize

        4KB

      • memory/2028-21-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2028-40-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2028-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2028-12-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2028-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2628-46-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2628-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2628-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2628-92-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2628-98-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2628-152-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2628-1851-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2628-1865-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2628-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2628-3312-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB