Analysis

  • max time kernel
    151s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 02:03

General

  • Target

    9bc6523996e66453589e1b9a2e25ce77e32f722440e9efeeb2d6dcce91beba72.exe

  • Size

    242KB

  • MD5

    bf0f9de0f764ec04473536f4897851c0

  • SHA1

    c488e58f545a005728b1551e7284c5affc7b565d

  • SHA256

    9bc6523996e66453589e1b9a2e25ce77e32f722440e9efeeb2d6dcce91beba72

  • SHA512

    c1c8c297e2c80449421d98df1bbf7ea4042145b65817802e9b872e60f980671bed0e7577a404f1700848c2c09f710595b172f5ecf3a44f2e2edc08aeabf239e9

  • SSDEEP

    3072:aftffjmNaB4TNcQPaHy4V8y47vRNZ2ix45eN9woY46x6gcf3IUkRxGAiY4x:aVfjmNaBUZPaS4VF4T52iW3ohgoA8

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1240
      • C:\Users\Admin\AppData\Local\Temp\9bc6523996e66453589e1b9a2e25ce77e32f722440e9efeeb2d6dcce91beba72.exe
        "C:\Users\Admin\AppData\Local\Temp\9bc6523996e66453589e1b9a2e25ce77e32f722440e9efeeb2d6dcce91beba72.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2236
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a4E01.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2912
          • C:\Users\Admin\AppData\Local\Temp\9bc6523996e66453589e1b9a2e25ce77e32f722440e9efeeb2d6dcce91beba72.exe
            "C:\Users\Admin\AppData\Local\Temp\9bc6523996e66453589e1b9a2e25ce77e32f722440e9efeeb2d6dcce91beba72.exe"
            4⤵
            • Executes dropped EXE
            PID:1144
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2984
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1632
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2560

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        533ce215a7c274602dc456ca375cef93

        SHA1

        76c502d7c45eca3fd96f6b04eb850e751bc785dd

        SHA256

        d70c9f73bbeed5cbc0df4a4d14bae68789f84d8092281337d2919322b288ce9c

        SHA512

        09d9dee36c48567921de4b7c31c4a822d5f9ed5e0b1cb0330031b320f40b5ba9b15e89dc37d52561094642c0ff16c14d32e81ed5b1dac06150fefbbd6f3365bf

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a4E01.bat

        Filesize

        722B

        MD5

        3cd194e1f07fabb397cabaa01424de53

        SHA1

        d1abf71f4b8ce153875f9c9dd14996615a3897a0

        SHA256

        e4ad898f0d3298ac1f15553392ad46572e598ada9634cbb8809593d605bdd5d5

        SHA512

        c803bbb40ff83852a5b4f17dfcdb371ce314d3413eaf896c4dc5493faaf533f6e3393ae1f1c59560632a884c4b5837fda32dd63704ed64760b3fa99a483020c6

      • C:\Users\Admin\AppData\Local\Temp\9bc6523996e66453589e1b9a2e25ce77e32f722440e9efeeb2d6dcce91beba72.exe.exe

        Filesize

        215KB

        MD5

        23a351591308d49bfe2625d302820715

        SHA1

        4787ceafc8492b09f85a1c8abb7e5d0c07f52e96

        SHA256

        7610b2c0bf22563e850e185864d9244eee94c853e6595cd18ac59b6d603af651

        SHA512

        cb266826f6ca3de75968dffebd2a3b480fd3348fa1c0b972851f1008540285cf93158555448446fb8b83f1fbff726221e05a3a18b11da0518ad65283d8eb8247

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        925efa8e6ec043b04fdaf9e6c9f95b9f

        SHA1

        4bb883e016bdeecc3f21b562df6364944b777ae3

        SHA256

        6513ef9968b68f982fb83460b5919e55470f514db71c3831c2ea5c7b3a2721db

        SHA512

        bf4978b5b10932de14d0c64566768708331f89a815f153323173506aecc296236a22d387b5caceba100c72b44e6b870e879f7350f1abce413bb92d54e70b133e

      • F:\$RECYCLE.BIN\S-1-5-21-3787592910-3720486031-2929222812-1000\_desktop.ini

        Filesize

        9B

        MD5

        72b7e38c6ba037d117f32b55c07b1a9c

        SHA1

        35e2435e512e17ca2be885e17d75913f06b90361

        SHA256

        e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6

        SHA512

        2bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a

      • memory/1240-30-0x00000000029D0000-0x00000000029D1000-memory.dmp

        Filesize

        4KB

      • memory/2236-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-12-0x00000000002B0000-0x00000000002E4000-memory.dmp

        Filesize

        208KB

      • memory/2236-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2984-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2984-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2984-91-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2984-97-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2984-208-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2984-1850-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2984-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2984-3310-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2984-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB