Analysis

  • max time kernel
    152s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 14:30

General

  • Target

    709c2154e0095071a9b930e9adaaf223e8b9a8c35cf4abd057132f852398883a.exe

  • Size

    3.8MB

  • MD5

    ef59eb1ae9fa24ebbc04e79db1dacb43

  • SHA1

    82cf3d321d0a088cff151557bf8094a5a0a6cdec

  • SHA256

    709c2154e0095071a9b930e9adaaf223e8b9a8c35cf4abd057132f852398883a

  • SHA512

    9b7ed6dadc9675bb4f7f3fd6936ca9248cbcd7b17ea6d88f7f96cdbb9b48c1729473dee1d269ada6d3b87760f64db1954209672506e7dc2b87785080fb0b3245

  • SSDEEP

    49152:H7C6IceThakUqE73rNjiST6fBQeZDx1AlpYzs/trqGHhol4j6krour:PT+Wi7ADD/hol4jDroI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3384
      • C:\Users\Admin\AppData\Local\Temp\709c2154e0095071a9b930e9adaaf223e8b9a8c35cf4abd057132f852398883a.exe
        "C:\Users\Admin\AppData\Local\Temp\709c2154e0095071a9b930e9adaaf223e8b9a8c35cf4abd057132f852398883a.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3868
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aFED2.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1708
          • C:\Users\Admin\AppData\Local\Temp\709c2154e0095071a9b930e9adaaf223e8b9a8c35cf4abd057132f852398883a.exe
            "C:\Users\Admin\AppData\Local\Temp\709c2154e0095071a9b930e9adaaf223e8b9a8c35cf4abd057132f852398883a.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4780
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --force-first-run
              5⤵
                PID:1188
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1804
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2888
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:3188
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=4008 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
          1⤵
            PID:4888
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=3672 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
            1⤵
              PID:2976
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5400 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
              1⤵
                PID:400
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5716 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                1⤵
                  PID:5092
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5352 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                  1⤵
                    PID:872
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=5528 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                    1⤵
                      PID:2176
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4812 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                      1⤵
                        PID:1468
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --mojo-platform-channel-handle=5992 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                        1⤵
                          PID:4152
                        • C:\Windows\system32\AUDIODG.EXE
                          C:\Windows\system32\AUDIODG.EXE 0x358 0x244
                          1⤵
                            PID:3980
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4504 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                            1⤵
                              PID:4304
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=4648 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                              1⤵
                                PID:1032
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5468 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                                1⤵
                                  PID:972

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Program Files\7-Zip\7z.exe

                                  Filesize

                                  570KB

                                  MD5

                                  4497fa373072a830b59d7308889b2520

                                  SHA1

                                  e5140ad661eeb20661ae6d0bab37261a38fe8b55

                                  SHA256

                                  4bc93b1612371cb592ee29dc2c724be7432f5cc82e4c070c7849648bb88865cd

                                  SHA512

                                  6628935fb781ff083d0906969baed0b08e8c334c71f0bae37387a6c8a13c04ccf80e1043b7e837ddec53d68b9b9e9d2ae4ad5eabc5274c1b091d6292bd7d5210

                                • C:\Users\Admin\AppData\Local\Temp\$$aFED2.bat

                                  Filesize

                                  722B

                                  MD5

                                  4afd4138fa1475a51824cad7a765d2ac

                                  SHA1

                                  7e988df5980132b0d49a5145873756654ae1ae46

                                  SHA256

                                  50ecb507cf8726c0b4d94e7a5eec18259ba6a6e8f2b20f9790ea6963dbb21245

                                  SHA512

                                  91b368ba4ee674a5ee0a65091257af8f24ec540c0e2ab0b8b1d2f7081bf3ab83d4b86ab67f95fa6b4c3606c47f47adab589d333279691d31b118fddeae43de15

                                • C:\Users\Admin\AppData\Local\Temp\709c2154e0095071a9b930e9adaaf223e8b9a8c35cf4abd057132f852398883a.exe.exe

                                  Filesize

                                  3.8MB

                                  MD5

                                  c0f5b9c8b35e6daa0097473ced22593f

                                  SHA1

                                  4a014e976cb892035ffdef1c52ed0b1fbdd2ef15

                                  SHA256

                                  11ef671b02f58a76ccdc2b9ab6d00994d371778cf97cf58adf02e04baf577d32

                                  SHA512

                                  01b0c06e9731b9b6e2097c71f46b4cf29e96dbe1a527abe5e46317002804298f14302b5212d3454f2abccca5d1883f973e04d59e3c0283e3783288e2ad0781d9

                                • C:\Windows\Logo1_.exe

                                  Filesize

                                  26KB

                                  MD5

                                  e7e34996ef1e5318580c8eb9d3a22cc2

                                  SHA1

                                  f9a8058a624f96bbdcb6cbecbc04ca4305f3a8e2

                                  SHA256

                                  113eece2f1372c1e9abac1fee62b85329158ca6afbe622f8e869fda2646fb92b

                                  SHA512

                                  3bf0febde83eb468032ddd6ce072adb72799c52d6754a8ff1fa76528b846358a20634cde958655988565180adb4b29f06c5f306f60ad95c16e69c70b91ae0b81

                                • F:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\_desktop.ini

                                  Filesize

                                  9B

                                  MD5

                                  72b7e38c6ba037d117f32b55c07b1a9c

                                  SHA1

                                  35e2435e512e17ca2be885e17d75913f06b90361

                                  SHA256

                                  e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6

                                  SHA512

                                  2bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a

                                • memory/1804-37-0x0000000000400000-0x0000000000434000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/1804-19-0x0000000000400000-0x0000000000434000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/1804-8-0x0000000000400000-0x0000000000434000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/1804-32-0x0000000000400000-0x0000000000434000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/1804-26-0x0000000000400000-0x0000000000434000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/1804-41-0x0000000000400000-0x0000000000434000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/1804-74-0x0000000000400000-0x0000000000434000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/1804-1015-0x0000000000400000-0x0000000000434000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/1804-1182-0x0000000000400000-0x0000000000434000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/1804-1977-0x0000000000400000-0x0000000000434000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/3868-0-0x0000000000400000-0x0000000000434000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/3868-10-0x0000000000400000-0x0000000000434000-memory.dmp

                                  Filesize

                                  208KB