Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2024 05:54

General

  • Target

    b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe

  • Size

    203KB

  • MD5

    9f6b12e00540dbe57a6cbe8cb92760f2

  • SHA1

    80216567175994a7bfbae9c6452e17bf5bee689e

  • SHA256

    b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620

  • SHA512

    0e8e9b98dc6291b7e493a3b5d8fffe11f29b06b0639890a85828d265e4d459ec3fce3ad9e5720f9a258d49dfd5cd309a2d5ab985079b7990a03a6b1ac767dd4c

  • SSDEEP

    3072:C5ftffjmNqfJlhxZ8sHlZgte98JmvSxEyyyyyyyyyCyyyyyyyyFfHZ8sHlZgteTz:MVfjmN2hvn98gKxs5nT80

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1156
      • C:\Users\Admin\AppData\Local\Temp\b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe
        "C:\Users\Admin\AppData\Local\Temp\b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1D12.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2996
          • C:\Users\Admin\AppData\Local\Temp\b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe
            "C:\Users\Admin\AppData\Local\Temp\b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2552
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 548
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:2920
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3016
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2672
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2572

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        0bc939802f6370e31e3c5a2b37a042dd

        SHA1

        3cf5ebf377e7800f6d067c4e4252b5cb82ab93ac

        SHA256

        6477fbcbd79105f68d23dc4fe2b5df7005315c0156a2e3070085b1a24754e0dd

        SHA512

        9ab7e4356f588364da9f766ff30be721f63cc3ba49e173213930da17e3197f69d5377cda69179d2940f0c3396c86ec26bcfa47986726f23564949f38e4661b80

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a1D12.bat

        Filesize

        722B

        MD5

        46d23dc0755defcc30a5b0f27f7e47c5

        SHA1

        bcd4a159c936497e98fdb89dd073bbf86eae9c5f

        SHA256

        092208f18fce03c04231a62125d4337d4f40a343e65d6413ef218ae9e0bd50f8

        SHA512

        a0e295c65d5c63e80a247d676f3a1b5719abf272093df5cc12d382b67797c3debcb4a923961a612ca8ad775a3ae8d8c800677a2909d094a75acd714e03106b6d

      • C:\Users\Admin\AppData\Local\Temp\b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe.exe

        Filesize

        177KB

        MD5

        ae4b536a121cbceb0c3b9e1d059d2e9a

        SHA1

        3d6111940d17f5112e90683ce4b07d105063dedc

        SHA256

        4e996ebb9bf0d5db1747e6c4a2dc8b7ce8e01054f308d195fe17390199846f49

        SHA512

        b16a2c734447be37f5255fcef1aa63503b82baddcbadf74e10202bb68a51c9d67e516eed62cc73724c0d9a1ecfea0fe166dee3769ccfd51f274e3b99beadbde5

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        119755ef4a3af58f4b8d218b4721cb3f

        SHA1

        34b7f1492b66a8fa9b129dc2f7d25f3325b3ff0d

        SHA256

        3f53e4310df7acaa22e0faa1e96de491263c2edaf8169f1bee19855107bce965

        SHA512

        f0c9e53feee60c5df384aaf58c0892c7108ac0d8961bda32ea3e88e1107ce630377ecdbbeb7e81daacd13abb4b800f6f45e4395e07d1723edba2e9e88588743f

      • F:\$RECYCLE.BIN\S-1-5-21-2248906074-2862704502-246302768-1000\_desktop.ini

        Filesize

        9B

        MD5

        72b7e38c6ba037d117f32b55c07b1a9c

        SHA1

        35e2435e512e17ca2be885e17d75913f06b90361

        SHA256

        e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6

        SHA512

        2bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a

      • memory/1156-36-0x0000000002F00000-0x0000000002F01000-memory.dmp

        Filesize

        4KB

      • memory/2552-47-0x0000000074710000-0x0000000074DFE000-memory.dmp

        Filesize

        6.9MB

      • memory/2552-28-0x0000000010470000-0x00000000104A2000-memory.dmp

        Filesize

        200KB

      • memory/2552-29-0x0000000074710000-0x0000000074DFE000-memory.dmp

        Filesize

        6.9MB

      • memory/2892-16-0x0000000000290000-0x00000000002C4000-memory.dmp

        Filesize

        208KB

      • memory/2892-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2892-39-0x0000000000290000-0x00000000002C4000-memory.dmp

        Filesize

        208KB

      • memory/2892-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3016-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3016-54-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3016-99-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3016-105-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3016-1655-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3016-1858-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3016-46-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3016-3317-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3016-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB