Analysis

  • max time kernel
    149s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-04-2024 19:14

General

  • Target

    feabf3f547c6ef9a8b2d9aa6da9efd0cc8a62c556cc5a917ce37f257563b5ed2.exe

  • Size

    26KB

  • MD5

    b33185683e3f53117edefc60a364ab4e

  • SHA1

    8fab3933308327cc97f8748f10999e40b0c0037b

  • SHA256

    feabf3f547c6ef9a8b2d9aa6da9efd0cc8a62c556cc5a917ce37f257563b5ed2

  • SHA512

    dd9f61f2180882f342f49e8e7485f9d8b5b01d3041e2bb0a171245e4acd3a05511ccc9fe09a0697d9bef734953d4abee5af729239929fb4b011db0a8a6e18fd0

  • SSDEEP

    768:d1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:7fgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\feabf3f547c6ef9a8b2d9aa6da9efd0cc8a62c556cc5a917ce37f257563b5ed2.exe
        "C:\Users\Admin\AppData\Local\Temp\feabf3f547c6ef9a8b2d9aa6da9efd0cc8a62c556cc5a917ce37f257563b5ed2.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4436
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:448
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1912

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        2e9cc17befbe375aa790ed6997557fae

        SHA1

        307e8162842fb99fb7ce763b2a62e023e8c920bd

        SHA256

        8a01b7d72838f0e7446b83817f6df6fe747a08b07919fad7d393be4f2b2e061e

        SHA512

        d2c80a453c3994b8f2dff4c784c3d9fbd1eeef48c8a484a5d1710322773fa93bda44f32b5380fc7e19ee9eb4b160e9d8b06b7160efad0b765dd8430dc6da7cbd

      • C:\Program Files\dotnet\dotnet.exe

        Filesize

        170KB

        MD5

        4b7ed872f8aa05d159ddc8f724bb9776

        SHA1

        1e6230f84bfda266636acc95b332db23c2c02636

        SHA256

        890b610b88530cd5fb6dc9a65115117148b2fb31190c37a5582b2ab9327bdc63

        SHA512

        7d93891118982a355add95634b1dbb36fe9a94aba60210adfc83ccdf51d4812992961867ae12f716b21d78dda7842126af45e4cb9987c03a0269235c4dbd93be

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        636KB

        MD5

        2500f702e2b9632127c14e4eaae5d424

        SHA1

        8726fef12958265214eeb58001c995629834b13a

        SHA256

        82e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c

        SHA512

        f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c

      • F:\$RECYCLE.BIN\S-1-5-21-2177723727-746291240-1644359950-1000\_desktop.ini

        Filesize

        9B

        MD5

        72b7e38c6ba037d117f32b55c07b1a9c

        SHA1

        35e2435e512e17ca2be885e17d75913f06b90361

        SHA256

        e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6

        SHA512

        2bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a

      • memory/4436-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4436-5-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4436-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4436-18-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4436-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4436-1212-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4436-4780-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4436-5219-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB