Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 08:06

General

  • Target

    e635bf98baf98ea8ae6cb7883822e97e3431e58d62eb3b0e3c70a6ed4bf12198.exe

  • Size

    959KB

  • MD5

    b565af796220425277b816761ffc782a

  • SHA1

    696fcf1ce858e1625f410562cc07bb51f4cd55d4

  • SHA256

    e635bf98baf98ea8ae6cb7883822e97e3431e58d62eb3b0e3c70a6ed4bf12198

  • SHA512

    3e125f82aff5936a619828d11b62c188fd6dfa9a0fe45765e6335f660b075d432e6afb443f32c046db364bf5aaa0d9b3228faf55fcb1b603d94a90c58302e6fc

  • SSDEEP

    12288:+RKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:XBpDRmi78gkPXlyo0G/jr

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3380
      • C:\Users\Admin\AppData\Local\Temp\e635bf98baf98ea8ae6cb7883822e97e3431e58d62eb3b0e3c70a6ed4bf12198.exe
        "C:\Users\Admin\AppData\Local\Temp\e635bf98baf98ea8ae6cb7883822e97e3431e58d62eb3b0e3c70a6ed4bf12198.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4292
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7465.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2960
          • C:\Users\Admin\AppData\Local\Temp\e635bf98baf98ea8ae6cb7883822e97e3431e58d62eb3b0e3c70a6ed4bf12198.exe
            "C:\Users\Admin\AppData\Local\Temp\e635bf98baf98ea8ae6cb7883822e97e3431e58d62eb3b0e3c70a6ed4bf12198.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3532
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3104
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4920
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2200

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        df09154d238b2c299315548a636e7f5b

        SHA1

        5ebba8754c28c6e4e101e272cb3a70d9c3285cfb

        SHA256

        2ab95058e9c4dc0f0a0acff341f779de6b8e16c25fd6e916c8abf71d8bc766cb

        SHA512

        9e1faf4f48324c06030c6d29959cbf26cd0b201f0c1f40b88b8e41661e1716b9cf4ee0e75562d31dff6f8df8a270d9cd82bab44a68396dc66c386864dc25c684

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        573KB

        MD5

        613b2b34d08935308a08e662a2433f33

        SHA1

        a1fee41ca7640fa2a93c4dc1d42ae909811e54bf

        SHA256

        756b09de3a0cd640c363592dd641d63cea8fe7b6cbcd1cebe681db838b617e18

        SHA512

        1a7a30c453d2a12fc9b324f9ffda8ba313834de36b312770c331fffb6ef63326cf1270672945ca36fecf9761a74cba87f8a02733deff9b114e04eb1b53863518

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        639KB

        MD5

        cda7714d2ec36fbd5dfd358b3cc885ce

        SHA1

        410c57ed71630d168738f40cea3ccc65529b0ae1

        SHA256

        d2c7832ddb52cfbb750dfffae048fd9c6a9cf06a52b7de91a0be255dffadef4e

        SHA512

        89cc9f52ae02711a9f90f2ba8e6b62c8ac442b967903067e1f3c5c12ff3ca012b62b8af4e4e7c3762b4c3ee255826b509fdb064c0d2861a2c2953a02c4fc1714

      • C:\Users\Admin\AppData\Local\Temp\$$a7465.bat

        Filesize

        722B

        MD5

        1f9fa16979a1548ee6095ba88f26d635

        SHA1

        519410002a18f1287ed1a738a5c8ddc2d5ff5fa0

        SHA256

        b77d1d0dfee29e41841a13b315a73e2d8ac590d6ab1946201665dce165b8fe30

        SHA512

        e393e1ffe0894ab1075d17d254d366f12d5151c76f6aa291a547d373a8bfd157eb75dc2258c7ea45c92f35dfe69756cc48234adfa97f0b0d9828c4d4c7309a7c

      • C:\Users\Admin\AppData\Local\Temp\e635bf98baf98ea8ae6cb7883822e97e3431e58d62eb3b0e3c70a6ed4bf12198.exe.exe

        Filesize

        930KB

        MD5

        30ac0b832d75598fb3ec37b6f2a8c86a

        SHA1

        6f47dbfd6ff36df7ba581a4cef024da527dc3046

        SHA256

        1ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74

        SHA512

        505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        d038138380840e899b1414dfa1f38b82

        SHA1

        4dc358de1c238b35ecc4c3e56eb0d875ba8912ed

        SHA256

        0f50de7db09a67f51fed578776f5480b32cf914a521644c7615d0bf0f7b0de27

        SHA512

        9cd6c25d9422e20ef2247641170394387e4962148f999896a2cdfe0f40948fe7d2b192738ff8c1c7d45774da3c5609a8b3c8d4f6ae138140ea706c023c35e0c6

      • F:\$RECYCLE.BIN\S-1-5-21-4092317236-2027488869-1227795436-1000\_desktop.ini

        Filesize

        9B

        MD5

        2be02af4dacf3254e321ffba77f0b1c6

        SHA1

        d8349307ec08d45f2db9c9735bde8f13e27a551d

        SHA256

        766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16

        SHA512

        57f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0

      • memory/3104-26-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3104-32-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3104-36-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3104-19-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3104-43-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3104-1227-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3104-4031-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3104-4793-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3104-8-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/3104-5232-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4292-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4292-9-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB