Analysis

  • max time kernel
    159s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 11:07

General

  • Target

    7e069f3a0a1c1bd23097d91accaf4126dffa0e5a7b14efe7b8da0ded6adc5027.exe

  • Size

    2.6MB

  • MD5

    1cb49bf9dae54493783351b0623ac4cd

  • SHA1

    697755b7fbad045cca3831bb7461b5792d48d828

  • SHA256

    7e069f3a0a1c1bd23097d91accaf4126dffa0e5a7b14efe7b8da0ded6adc5027

  • SHA512

    8020581ff8329cd694c3558611e2062adb11659a6ffaeb5d10a3d3edba31ca9166d68fbb7d881cf0c8a9a4894bb82c7dec20acf8da7aca9d80ae269aec435726

  • SSDEEP

    49152:d7z/kNFi/h9NgTDc4qSrA7jaT3wrEpv4tye85ORNRVZ/RQ+qCcP:1k/4NSB3z2yeJVu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3436
      • C:\Users\Admin\AppData\Local\Temp\7e069f3a0a1c1bd23097d91accaf4126dffa0e5a7b14efe7b8da0ded6adc5027.exe
        "C:\Users\Admin\AppData\Local\Temp\7e069f3a0a1c1bd23097d91accaf4126dffa0e5a7b14efe7b8da0ded6adc5027.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:452
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a41F6.bat
          3⤵
            PID:3908
            • C:\Users\Admin\AppData\Local\Temp\7e069f3a0a1c1bd23097d91accaf4126dffa0e5a7b14efe7b8da0ded6adc5027.exe
              "C:\Users\Admin\AppData\Local\Temp\7e069f3a0a1c1bd23097d91accaf4126dffa0e5a7b14efe7b8da0ded6adc5027.exe"
              4⤵
              • Executes dropped EXE
              PID:1508
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3380
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4816
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:3464
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4116,i,7064649017625232947,17746804975634116675,262144 --variations-seed-version --mojo-platform-channel-handle=1292 /prefetch:8
          1⤵
            PID:4524

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            251KB

            MD5

            872ef5cf73e3a3436d97d094749681c5

            SHA1

            3a7e38b772adcb924069ec9889ca207bd2186453

            SHA256

            5fd5716e17d7050442c4441da973e8be62ea365cd6e3b0950dbe65aaaea4ef3f

            SHA512

            fda62f9d01e521c40913f181eaf24733faf4a9e2d8fef03b077b7b10461869131e8ef57b8e8abe424474ba8854885bd47de39d546d6086a26786dbc5f5aaaf53

          • C:\Program Files\7-Zip\7z.exe

            Filesize

            570KB

            MD5

            e875de16585f3d4d054d72f3c675f351

            SHA1

            0f0a4a733c1dc4b9fb173f85681e170fafa6b747

            SHA256

            1ece66c1bbcfe85f9984fb2662a3d339b2cf5a0cacad85c889591b8044920906

            SHA512

            002317d911c985c8d561af198d21e4fc47d2d323319be7414be780e758fbf53dad829c8662bf2bdbec894e812ba6243850296b396b82d2058a86f4cddd5497d3

          • C:\Users\Admin\AppData\Local\Temp\$$a41F6.bat

            Filesize

            722B

            MD5

            d4242dcab2488bd1c230f5e3600c84f7

            SHA1

            e7024306d21bfb7694a6c626095bd87738644017

            SHA256

            7dad3edb2f708f95c0de137cb03662dcc2520a5b7ae3be1d138b758cb8cef3d8

            SHA512

            593c7948947f1552f231ebfcdb1477b5b3d09668f0903d91293cb6cc3c3e15ea223b203ad854d2966191be267fa4499c7eeab8c4748d30c85a880e3037408991

          • C:\Users\Admin\AppData\Local\Temp\7e069f3a0a1c1bd23097d91accaf4126dffa0e5a7b14efe7b8da0ded6adc5027.exe.exe

            Filesize

            2.6MB

            MD5

            b2325881235719ec1f79f87ab9e63c09

            SHA1

            a2ce4d03a287550d81dee38ba1aaae090408ecba

            SHA256

            0db49c7a8d3fff7d15a879aad40e5e01287b19cf6b2246e06c885f76fca9903a

            SHA512

            89cacdef7fe54406de8569a899d4f4b01d40a303cfe7589c704325c926ca01aacfb914179277b924c95a2cee4c9a22b85ecc4490a37d427009688cc7e44743eb

          • C:\Windows\Logo1_.exe

            Filesize

            26KB

            MD5

            2db19b4de1086672e1c1107f944f647e

            SHA1

            4c918b7dbcaadb59c7f838bedc4ef9034fc36bb1

            SHA256

            82a55133d343d77e5acce2adb945101c420429f3a7d23148a0c5a71d8863c56f

            SHA512

            48b110c6e75adfa07cd0244b6d158c45e7c171286723d565001429a6f46c5c0025787e67dd8e9cc3a34a8a8e516727b890e25e2b0b2375b1905b8784bd28076f

          • F:\$RECYCLE.BIN\S-1-5-21-1230272463-3683322193-511842230-1000\_desktop.ini

            Filesize

            9B

            MD5

            72b7e38c6ba037d117f32b55c07b1a9c

            SHA1

            35e2435e512e17ca2be885e17d75913f06b90361

            SHA256

            e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6

            SHA512

            2bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a

          • memory/452-0-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/452-8-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3380-26-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3380-32-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3380-36-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3380-19-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3380-43-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3380-1233-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3380-1241-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3380-1989-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3380-9-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3380-4872-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB