Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-04-2024 11:30

General

  • Target

    bf89ee7bea3b134c53442f46e50db69d941519359b303c4c72423ee171450a0a.exe

  • Size

    7.3MB

  • MD5

    9330c0fadacbbcc8dd91ecc1545ae2a6

  • SHA1

    94f47c1ee3d2676142da121a32a262427097486f

  • SHA256

    bf89ee7bea3b134c53442f46e50db69d941519359b303c4c72423ee171450a0a

  • SHA512

    9553cbfd72c8ee64d15cff002e75fbca1b1e9c935965c3c59e313caac320a66bc9bea391ef099875af731db64aee8be1d21ea3e0f40d90c097e072679443a7e9

  • SSDEEP

    98304:wmB9OWBVClfcaA1oZeSajfztbVCGQX4bME4bP8nQgMVQNKe5AJbI8D:wg9OHi1oZepfxUGGNQNKe

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3444
      • C:\Users\Admin\AppData\Local\Temp\bf89ee7bea3b134c53442f46e50db69d941519359b303c4c72423ee171450a0a.exe
        "C:\Users\Admin\AppData\Local\Temp\bf89ee7bea3b134c53442f46e50db69d941519359b303c4c72423ee171450a0a.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4616
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8608.bat
          3⤵
            PID:4724
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:804
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2880
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:4140

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          254KB

          MD5

          5fb694ecbaef4c0dbc2e7bc518550f95

          SHA1

          2f5c13851c068b6ab3395f9ea4f5d685f5bde652

          SHA256

          69c1afb6878ac4461a1725f33fa5bd3f4942b6cccdf9a695cbd4c1d3ce959542

          SHA512

          e1d9908f8fe26125f9735e54be97c08be95b8a970916b4dff2c65a79988e7b8a6fab96dcb7379b885918c460fca2b08e29032ddd7fdf48311f8ee5b73b6860cf

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          573KB

          MD5

          0f4644de76fc4208d5d881fd23aae25e

          SHA1

          8c46b99f7215cb23fbe3e2ad4c4dfaf6910e0802

          SHA256

          89d06fb3d417ba96dcb9066c9f4b97126a87472ec64adb517d76cf1d30ca70c3

          SHA512

          c731ae84c8fed86f9b86f2798a11b098672586338a599342ad5fa2bafe8ccb63e83292b36015eb47e53c2b0c8e8dc0a080387b7b14d19ba34cb8b4658cc3c15a

        • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

          Filesize

          639KB

          MD5

          8bb26e9fcfbbdbbc9221602a5b79c6c9

          SHA1

          b4e8b033f9ea5fee307f49cc17600459f7d2e274

          SHA256

          62cedb0af2d0bae545c154ef021c79e44d56c1f7a4b3772853bf4863085053bd

          SHA512

          10182f47c2c887975475d8c718dd265dfc238e4d5535c0e0c023cdab5f16126eef7d3241228453eefd71943d96ac6f2bb5a6f7e292418f9b661e5edbddd89db2

        • C:\Users\Admin\AppData\Local\Temp\$$a8608.bat

          Filesize

          722B

          MD5

          77258590db8fb08c960893977af776bb

          SHA1

          99755b036517c63bbc7376c8450ae3ada8b3e48a

          SHA256

          17ad87bd45af708345b4c045a696f7a499cd5bfcb20f28e1bba0b51b2abe232d

          SHA512

          91c88f595eb67ee6f2f8cd381c5ec7e677162280224100d6959414a2d198050089210a00a94a1e9f1ef86a5a44e572aa3eead3b453bad58ac488c5ffb360be9b

        • C:\Users\Admin\AppData\Local\Temp\bf89ee7bea3b134c53442f46e50db69d941519359b303c4c72423ee171450a0a.exe.exe

          Filesize

          7.3MB

          MD5

          172b6d29b3cdcdf2b0b14332eb216161

          SHA1

          7534c39aecd8a968c8cdf34db4cb388d999a3065

          SHA256

          3bb1c042bf917e6577be28edce3243628e9ce4245e9abbc2cc0196ccca26630c

          SHA512

          71e4e14c689974821c0bb80637a53cd5234df0111b809612ac810846fe2ba9d288da20141455b984dd842c8343166f807f8da51e74b66fbe3aec181db72806ce

        • C:\Windows\Logo1_.exe

          Filesize

          29KB

          MD5

          1d0bc41b21bb6c98d73c7f1ae0112ada

          SHA1

          c5ce0d2a9250fcc5c6db8cb885fb0fc240cc6592

          SHA256

          6a949b2880d6134bcd51ec556b319aad204d33e058bf572bfffeac77f5e92727

          SHA512

          16e1d37a92c0ad2f8479def373f2c60372a05b010a88320e50d30f10d35322525f61d1b921333dd18607691731d306cceec6cd9a4894d6c24a45a92492680b8f

        • F:\$RECYCLE.BIN\S-1-5-21-4092317236-2027488869-1227795436-1000\_desktop.ini

          Filesize

          9B

          MD5

          2be02af4dacf3254e321ffba77f0b1c6

          SHA1

          d8349307ec08d45f2db9c9735bde8f13e27a551d

          SHA256

          766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16

          SHA512

          57f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0

        • memory/804-25-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/804-32-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/804-35-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/804-18-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/804-1226-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/804-4751-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/804-4792-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/804-10-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/804-5230-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4616-0-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4616-9-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB