Analysis

  • max time kernel
    159s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 04:15

General

  • Target

    10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe

  • Size

    227KB

  • MD5

    b9bdb0594a49677e64ac5a5beec8348e

  • SHA1

    0f84350b9ba434b249c833257520deeff77466ea

  • SHA256

    10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6

  • SHA512

    b04a9afa85fc735c7dfecd2dd6471b440b9b5315546fc50163ff5d45e558c7e011cd5d4979676ae31fa17d7b8452990469c307c7faf7020a4713eac5eec09918

  • SSDEEP

    6144:NluJZdeKzC/leySe8AIqpoHbnDns1ND9m:Nq/VyV8hEoHbI3A

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3460
      • C:\Users\Admin\AppData\Local\Temp\10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe
        "C:\Users\Admin\AppData\Local\Temp\10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3248
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a36BB.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:748
          • C:\Users\Admin\AppData\Local\Temp\10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe
            "C:\Users\Admin\AppData\Local\Temp\10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe"
            4⤵
            • Executes dropped EXE
            PID:4584
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1896
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2708
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1512

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        25b3ed073c6eb1f6870a091ab2e74028

        SHA1

        88ccb5573cabbed60b90585efe8d7d61225c0664

        SHA256

        baef82ba5027d379641cf98bebdad91fe9cdc384d00b544d5a3c557ef485f60e

        SHA512

        9e971f1c2ed4965a97d567bfb95ae5a3af7abbc523870407a245c82ea69d2c5eae9e5e02a186175a3c9e931ef05e10bbbab3ec8c67185cf3dc1515c07fdc7846

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        573KB

        MD5

        d78fcecca1dcd24a423af225a8b57483

        SHA1

        c77beeedd841ea7f544867b699c8dd06c3ebddaa

        SHA256

        593d4e6f4a1d3746ee72feba5a62ef00630bae475538544d1bb1f3dd9f766ec9

        SHA512

        758b0dc5e3f44974452ad3dffd637324db288e35065a9e48ccff00e1f08b818ce8053b21fcb8c23537707d0b241dcf4642d5b369a3d3230bc802443ab9bd6e5b

      • C:\Users\Admin\AppData\Local\Temp\$$a36BB.bat

        Filesize

        722B

        MD5

        b0029172c7b0666ebf6b47f3a156234b

        SHA1

        85f359f37612f716d4e14928cec497397ab67492

        SHA256

        45a7e01c5e2fadfa1a2cc08f83cf17c576093dbaac21e0ac98e23ec2ee62a637

        SHA512

        e48be2e9919226a2e111c6ce7d5f5936a7c0bdff38a12b6b6d05e3db31acf7b96291553819ad874aca3e044cca8135312120bdb62bf52eaa8527559b973c2d98

      • C:\Users\Admin\AppData\Local\Temp\10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe.exe

        Filesize

        198KB

        MD5

        e133c2d85cff4edd7fe8e8f0f8be6cdb

        SHA1

        b8269209ebb6fe44bc50dab35f97b0ae244701b4

        SHA256

        6c5e7d9c81a409e67c143cd3aed33bddc3967fa4c9ab3b98560b7d3bf57d093d

        SHA512

        701b7d1c7e154519d77043f7de09d60c1ff76c95f820fc1c9afca19724efb0847d646686053354156fd4e8a9dab1f29a79d3223f939a3ff1b3613770dc8603b1

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        9dd7227008c46cd63564dffada9010ec

        SHA1

        d516f5c9c6702e61e84b76427ad695d4ac2d9cf4

        SHA256

        409db129c788ac0c2c2ecb56cbf002433a6cb62dfd5aec765bd5bfbe4404cefe

        SHA512

        cbe65777df4b8af38792d726bb3b3709126930b5b46540dcb3cae6d433be6cd843ec51f3302fd2cfdd5690b9549c444d4ed992089695d13ab51221091877d649

      • F:\$RECYCLE.BIN\S-1-5-21-1230272463-3683322193-511842230-1000\_desktop.ini

        Filesize

        9B

        MD5

        2be02af4dacf3254e321ffba77f0b1c6

        SHA1

        d8349307ec08d45f2db9c9735bde8f13e27a551d

        SHA256

        766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16

        SHA512

        57f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0

      • memory/1896-26-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1896-19-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1896-33-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1896-36-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1896-10-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1896-1233-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1896-2018-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1896-4872-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3248-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3248-9-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB