Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-04-2024 18:32

General

  • Target

    27fcf71916ebd85194fad1fb86b48650ce4702a9b060ad026fbb7bc0ea91d41b.exe

  • Size

    248KB

  • MD5

    af9b0e452328b865bc689fae98a0af3c

  • SHA1

    2dcbb10f81984ccba9945a4b26c33daa56e7c9ba

  • SHA256

    27fcf71916ebd85194fad1fb86b48650ce4702a9b060ad026fbb7bc0ea91d41b

  • SHA512

    05b6d6b3e9892d24841657c9aa7eade636ead3e8b685b8931ed5665a403e1ac6a4110b0df314007652477cc0028dbdd10a7c6e7db4a48310a05c37fb32cee4a2

  • SSDEEP

    3072:+ftffjmN5uJIt622VgyheoNuKWElCvHJ0nCIg0PlXXgTh39lZvlqyjNgK1dAjYan:mVfjmN9p2VVhewuVkCfFL3v4ySK13ao4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\27fcf71916ebd85194fad1fb86b48650ce4702a9b060ad026fbb7bc0ea91d41b.exe
        "C:\Users\Admin\AppData\Local\Temp\27fcf71916ebd85194fad1fb86b48650ce4702a9b060ad026fbb7bc0ea91d41b.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4060
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a37E8.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:772
          • C:\Users\Admin\AppData\Local\Temp\27fcf71916ebd85194fad1fb86b48650ce4702a9b060ad026fbb7bc0ea91d41b.exe
            "C:\Users\Admin\AppData\Local\Temp\27fcf71916ebd85194fad1fb86b48650ce4702a9b060ad026fbb7bc0ea91d41b.exe"
            4⤵
            • Executes dropped EXE
            PID:1660
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:916
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4956
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4692

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        ae3b1317139020b3eac8708b069dd0e3

        SHA1

        aae70b82d683ca54f901a29f2d51f594ddc4db52

        SHA256

        db55243ffc0e23cca973ff661ef4320b5a16a6166009bd537be335162697f9f2

        SHA512

        259200f907ca4c5427ce3e855062e86867f3b091e5249053743fccfeee931b5390d1d0c491c378e92ef8ac1f40ac930973bbf17ae97e69d2d82ca2b759d713d7

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        2046465903795717baef2cad996b8ea4

        SHA1

        847edc2da82ea966cb8ad601581bb1b2a050082b

        SHA256

        314fdf43e48412ba4f45c3f64de407d225d0534d99b8a65eb85cc87a8dd5efb4

        SHA512

        c145f93e3cd09c4869a764c31dd1f3b1057f9233ee6aebb4d96c2ccacd9a0b3ec92fdced5f6a9396d435a03c0d5beac08808997dea9b2d9018293f98b96351e3

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        636KB

        MD5

        2500f702e2b9632127c14e4eaae5d424

        SHA1

        8726fef12958265214eeb58001c995629834b13a

        SHA256

        82e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c

        SHA512

        f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c

      • C:\Users\Admin\AppData\Local\Temp\$$a37E8.bat

        Filesize

        722B

        MD5

        2abd54d4a6926cc12eb6dceb87d58f7b

        SHA1

        4bbb379dda55385060e3a42d369d05b326ffbaa0

        SHA256

        6a5f05fecb0952316c7cb128ac097127d5ee233c9ce1fbf12232f24088d3ea94

        SHA512

        78f6ef674d9e61aefa00f891cffcb6b3798ed0d151380dcf20803a844f96fa80f0f9566710fbe7aa4b3550968ed8ff99cd342187c31141d0d3c6b1dc7c0c39a5

      • C:\Users\Admin\AppData\Local\Temp\27fcf71916ebd85194fad1fb86b48650ce4702a9b060ad026fbb7bc0ea91d41b.exe.exe

        Filesize

        221KB

        MD5

        fbbe7b8761890d48b2684650e628ee6f

        SHA1

        02165b12fee787377e18ee0d7cf6a02f0a63f6f5

        SHA256

        1edc4ec9b654020a1a426f50222d3b0ca46f63a2590a97aec5bf574660f32df8

        SHA512

        b2aa38025733bd83843b4772284d30d4a7414fe71a786e742da94f4b7b1b9e10e21784895bb2e43b3e45a55eee1011e8069f949bcb7006a3ba7ca5806cc559e0

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        2c13ef7da783a3c713fd38ba477d7207

        SHA1

        fbab6f31554a8db094c4c4a18fda9634ee3bcb27

        SHA256

        b3c23ddd0b2379f80be1433dc149817f6f2e8704bcc253d25e73c2a32188c494

        SHA512

        f62bbdaedd6fb6c370e5331e0df7c4ec14ca5db97dc58613de29a478675183b04fb5d5b8ebf180c7336adc8db08825a4eb2f7332726d9aca56ca5548c96f1d6e

      • F:\$RECYCLE.BIN\S-1-5-21-1132431369-515282257-1998160155-1000\_desktop.ini

        Filesize

        9B

        MD5

        2be02af4dacf3254e321ffba77f0b1c6

        SHA1

        d8349307ec08d45f2db9c9735bde8f13e27a551d

        SHA256

        766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16

        SHA512

        57f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0

      • memory/916-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/916-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/916-36-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/916-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/916-1226-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/916-4792-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/916-10-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/916-5231-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4060-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4060-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB