Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 19:14

General

  • Target

    feabf3f547c6ef9a8b2d9aa6da9efd0cc8a62c556cc5a917ce37f257563b5ed2.exe

  • Size

    26KB

  • MD5

    b33185683e3f53117edefc60a364ab4e

  • SHA1

    8fab3933308327cc97f8748f10999e40b0c0037b

  • SHA256

    feabf3f547c6ef9a8b2d9aa6da9efd0cc8a62c556cc5a917ce37f257563b5ed2

  • SHA512

    dd9f61f2180882f342f49e8e7485f9d8b5b01d3041e2bb0a171245e4acd3a05511ccc9fe09a0697d9bef734953d4abee5af729239929fb4b011db0a8a6e18fd0

  • SSDEEP

    768:d1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:7fgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\feabf3f547c6ef9a8b2d9aa6da9efd0cc8a62c556cc5a917ce37f257563b5ed2.exe
        "C:\Users\Admin\AppData\Local\Temp\feabf3f547c6ef9a8b2d9aa6da9efd0cc8a62c556cc5a917ce37f257563b5ed2.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1864
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2148

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              2e9cc17befbe375aa790ed6997557fae

              SHA1

              307e8162842fb99fb7ce763b2a62e023e8c920bd

              SHA256

              8a01b7d72838f0e7446b83817f6df6fe747a08b07919fad7d393be4f2b2e061e

              SHA512

              d2c80a453c3994b8f2dff4c784c3d9fbd1eeef48c8a484a5d1710322773fa93bda44f32b5380fc7e19ee9eb4b160e9d8b06b7160efad0b765dd8430dc6da7cbd

            • C:\Program Files\7-Zip\7zFM.exe

              Filesize

              956KB

              MD5

              e9933dc3af0a0a837f4267e40fa3f18e

              SHA1

              7223cd8a3f85206a78f1f104f6f36827e11fe886

              SHA256

              9fc0043e2562f94fdf7dfc61fa8e90aec692117a6e9c5986b67274d7088c4800

              SHA512

              4441ed54825ec275e3733f683a091626d6b2927ba29848523624456a6e49b8ba78ef0f7138091a5a6587d8537057f9488349251df3091df2ab99fe070c89c1cb

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              4cfdb20b04aa239d6f9e83084d5d0a77

              SHA1

              f22863e04cc1fd4435f785993ede165bd8245ac6

              SHA256

              30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

              SHA512

              35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

            • F:\$RECYCLE.BIN\S-1-5-21-406356229-2805545415-1236085040-1000\_desktop.ini

              Filesize

              9B

              MD5

              72b7e38c6ba037d117f32b55c07b1a9c

              SHA1

              35e2435e512e17ca2be885e17d75913f06b90361

              SHA256

              e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6

              SHA512

              2bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a

            • memory/1212-5-0x0000000002A00000-0x0000000002A01000-memory.dmp

              Filesize

              4KB

            • memory/2020-66-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2020-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2020-72-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2020-20-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2020-82-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2020-1825-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2020-14-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2020-3285-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2020-7-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB