Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 17:23

General

  • Target

    4fe060591a94e671aab07bbad83e1780e88d32e85cb66cb329e710961fbad08f.exe

  • Size

    48KB

  • MD5

    618ce6572379d45e4178ec60654e62bf

  • SHA1

    de6a49c5e3ef4c267c72cbeaaa540a9ed3cfc8f6

  • SHA256

    4fe060591a94e671aab07bbad83e1780e88d32e85cb66cb329e710961fbad08f

  • SHA512

    5bb5136e2060977ae1b5e86233927a8c361e73bf0e8e895bc40b782b6d3c5be90f96cb8ab44a767b957cc90456a1e1b509aaed123cb1c1b8603464cb377ac1de

  • SSDEEP

    768:No1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL4AZR5wo/uDSw2MWKDGZAMxkEBJH:gfgLdQAQfcfymNxZRuhjWvx3H

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1376
      • C:\Users\Admin\AppData\Local\Temp\4fe060591a94e671aab07bbad83e1780e88d32e85cb66cb329e710961fbad08f.exe
        "C:\Users\Admin\AppData\Local\Temp\4fe060591a94e671aab07bbad83e1780e88d32e85cb66cb329e710961fbad08f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a53CB.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2920
          • C:\Users\Admin\AppData\Local\Temp\4fe060591a94e671aab07bbad83e1780e88d32e85cb66cb329e710961fbad08f.exe
            "C:\Users\Admin\AppData\Local\Temp\4fe060591a94e671aab07bbad83e1780e88d32e85cb66cb329e710961fbad08f.exe"
            4⤵
            • Executes dropped EXE
            PID:2420
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2896
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2592
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2696

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        cc1433855d3007b8e23db2928fab3e8b

        SHA1

        b5bfab4aa8291161fb06da630817341d93cccd6a

        SHA256

        322e7846f65b2bf5b6a1df6d589c7a90d04407fa996fd1aa6af7f231f332356e

        SHA512

        6fc0f2b100380d8d8c3ace949c9804bdebef60353c803ed8b38b381c8533d598fc91f14cdfd24c30cc0a349e5549b9d34bc585758d6fcfa055242bb2c4d2b3b1

      • C:\Users\Admin\AppData\Local\Temp\$$a53CB.bat

        Filesize

        722B

        MD5

        2671ba7bb2a86dbe50a65b7ffcb5b6b7

        SHA1

        667775d551faf9ed23d8cbaa1e66ba06c947fd52

        SHA256

        4f37c79322c9320c8c5a6aa3b895b9204ba60acf23ad32f698bcf657571842c2

        SHA512

        3b458ed370146d2c9e96dbba57a6e2b92f9e69d0101f4f5e11e4a3e2a98585a7fc1aa49390e31c3f8483c69edd9314bb74901d6bf1cd53db2124663628029c33

      • C:\Users\Admin\AppData\Local\Temp\4fe060591a94e671aab07bbad83e1780e88d32e85cb66cb329e710961fbad08f.exe.exe

        Filesize

        22KB

        MD5

        9f05a1e47a07e807206c2e47c87be7c2

        SHA1

        31ce0f93e0592da8baf892db134836a9a6c3d69a

        SHA256

        cbe9c78b4211741f1f3613b0e4165ed7c1bf969a67e110bc41fe646b5bb1e997

        SHA512

        f8f319c20e9339967d87fe92514a0fc61f7dda83fd9ade906db633339ac171a57d6c1518b913790a238343c038646c1c14dd02d265676b816eac69f0a4cdd016

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        8c1c53a89dbd4ed410752c8373d31d4d

        SHA1

        fffbcec8de5833946ef316bd404bac3f431a8200

        SHA256

        80f1db329507dc01cc19447634fd21e12779dcdf37e32c9b6d0e35fc2ff80f82

        SHA512

        4b42cd180f301a85d667bd02114ef4e3440df85241061e405fe4c7a481a8e90d675392e4597e505e176acecd1046aef8c8bf831092f4ab8f0d38836488cf0af9

      • F:\$RECYCLE.BIN\S-1-5-21-2461186416-2307104501-1787948496-1000\_desktop.ini

        Filesize

        9B

        MD5

        2be02af4dacf3254e321ffba77f0b1c6

        SHA1

        d8349307ec08d45f2db9c9735bde8f13e27a551d

        SHA256

        766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16

        SHA512

        57f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0

      • memory/1376-29-0x0000000002760000-0x0000000002761000-memory.dmp

        Filesize

        4KB

      • memory/2272-17-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2272-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2272-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2896-31-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2896-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2896-44-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2896-91-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2896-96-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2896-1849-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2896-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2896-3309-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB