Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 14:09

General

  • Target

    0f77b210634c4cd2a42fe6086edfc850d6ea489ae3aa2b22191adbf29e8f9527.exe

  • Size

    67KB

  • MD5

    2ecc79afb43a544d6e8dd60a55cc78e3

  • SHA1

    accc6a7da5f9af9f056766365f4c77b24e18ca99

  • SHA256

    0f77b210634c4cd2a42fe6086edfc850d6ea489ae3aa2b22191adbf29e8f9527

  • SHA512

    6d18e47ce22de2aae5b43afca57923266de662bbe6eb8eacaee4ffa68a42fe148e7a43fa6a44366695972271af9430d2d01908a13e39beac4cce6c0c77089048

  • SSDEEP

    768:ID1ODKAaDMG8H92RwZNQSw+IlJIJJREIOAEeF1afl0zGF7UvTHArFg2zN5d44ZO:IZfgLdQAQfhJIJ0IO61IFQGg2zt4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3448
      • C:\Users\Admin\AppData\Local\Temp\0f77b210634c4cd2a42fe6086edfc850d6ea489ae3aa2b22191adbf29e8f9527.exe
        "C:\Users\Admin\AppData\Local\Temp\0f77b210634c4cd2a42fe6086edfc850d6ea489ae3aa2b22191adbf29e8f9527.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3784
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4A86.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3120
          • C:\Users\Admin\AppData\Local\Temp\0f77b210634c4cd2a42fe6086edfc850d6ea489ae3aa2b22191adbf29e8f9527.exe
            "C:\Users\Admin\AppData\Local\Temp\0f77b210634c4cd2a42fe6086edfc850d6ea489ae3aa2b22191adbf29e8f9527.exe"
            4⤵
            • Executes dropped EXE
            PID:2208
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3536
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1832
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1932

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        29a95e0568072695f5b30b0cbb9fe5d7

        SHA1

        9612403e6e8c729e82273e8d56c11763f7be4673

        SHA256

        0677fc0ed20f72e55962077240d752810c3ffa5a8f8d276e4abc77d4cef31c35

        SHA512

        fe28b8057d403dc6081f9c727f33e8675e8db62793b42d18f08c693f24d00e0f1d017337b97517d20f0e261b716f72eb720c8a15e1a3ddbff127e17d367442c5

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        c82d3751deff4dcbf3b202e148e69c9a

        SHA1

        5a22c3c0a4580c91966000b6d389c8d1106d5df1

        SHA256

        b4a6116d5ea7e13dcee2fadf60927e49a93af8f5277ebcc3188fa2996e2325fd

        SHA512

        9da860f2b4c90aadda5eef3943f55d556cb30704e0f88b4cf8499ecdc0af289e3d0aaaa75c288dcc6c75eec9884c6d9a58a9c151976308eb451f096c02735cd7

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        636KB

        MD5

        d82ffc872aed7c85cf936dcdcc2e6372

        SHA1

        50ca56cb4a429ce1532afaa2732f61833fc2b54f

        SHA256

        a487733710d946abff1a93a23ae6bbafd6c0800bc78e4d5e3cac36e2a14ddace

        SHA512

        0b0031418275c6be01f7757111058cd5bd3e5f4862e0631e2e28c5e7ffbb271446abdc2a88a7953ae55112799bc4a051becc2b14491e0d1760e336498665cc8b

      • C:\Users\Admin\AppData\Local\Temp\$$a4A86.bat

        Filesize

        722B

        MD5

        e6de2d79c8fc5f73afa4a00d99c7f7b4

        SHA1

        b3746a2e099e8d8cd0e0414bea44fb8b9d00504b

        SHA256

        927212fb08f09a6867ff5a84096b61656b73eb681f0f97fa2e32dc0e1496a286

        SHA512

        74814b7cec1ea132db843a0a857f5a8a9e6878858ee052329ebb7b14a0a561409034192a715927f2e34cff1f6cb54b341a2ef85e419cd8b8d959500d51288d10

      • C:\Users\Admin\AppData\Local\Temp\0f77b210634c4cd2a42fe6086edfc850d6ea489ae3aa2b22191adbf29e8f9527.exe.exe

        Filesize

        40KB

        MD5

        ae6ae7519ae4cdb466127ba8ccd565c3

        SHA1

        8ab6f54478ff8a37961a666d6abe7e1e9d62dd77

        SHA256

        63b2931842aafb63e40d9963835afbc5a7f1d005e75baa190827d3cc7ad8b5cc

        SHA512

        67a3a903356008a84a464a2f1abaae4e335405e0e051f2db1ced6ddf186ff90ae86baf6b1318a0e1b9a3f9f4df1cd2118809630bc7712b35e2fce12913e903fd

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        02513439d21e3e6a85ba70845b79380e

        SHA1

        6377c51d7d2310f217cf4c16400555aa3f47492a

        SHA256

        04ab851dfbcbdc28bfb6b00e372ae20578e97f67d396057630fa4a76301df812

        SHA512

        131b8683ae29daba7589b638a483df6a672ef6ea3010507beb639f1c58639324fff95fb4cca76c0ad825a53a8ab6bef789fda6b5f313238513ee0196e9ab6177

      • F:\$RECYCLE.BIN\S-1-5-21-2288054676-1871194608-3559553667-1000\_desktop.ini

        Filesize

        9B

        MD5

        72b7e38c6ba037d117f32b55c07b1a9c

        SHA1

        35e2435e512e17ca2be885e17d75913f06b90361

        SHA256

        e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6

        SHA512

        2bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a

      • memory/3536-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3536-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3536-36-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3536-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3536-1060-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3536-1227-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3536-4792-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3536-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3536-5231-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3784-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3784-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB