Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 07:20

General

  • Target

    7d6bc16ad22467f54bcd248dd4a4e7c6f5f11f7b84c04865f45d4dd2ab1ea406.exe

  • Size

    26KB

  • MD5

    eda47d85eb510a2d8971be2b41b00958

  • SHA1

    00fe13d26675d1b2a7d9c16928a219652b79f6a1

  • SHA256

    7d6bc16ad22467f54bcd248dd4a4e7c6f5f11f7b84c04865f45d4dd2ab1ea406

  • SHA512

    db540ade930a690066d8d5e4d823a17df70b0bea3428f5cd99b3b21c734238dbb7ecab26267606695bd3bece1ab60edc062384a924419981ae068e673d810ae7

  • SSDEEP

    768:RHkN1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:ifgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\7d6bc16ad22467f54bcd248dd4a4e7c6f5f11f7b84c04865f45d4dd2ab1ea406.exe
        "C:\Users\Admin\AppData\Local\Temp\7d6bc16ad22467f54bcd248dd4a4e7c6f5f11f7b84c04865f45d4dd2ab1ea406.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2860
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2912
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1356

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        0c9e9b8bd427bd7f6424e9ad00253316

        SHA1

        59b25bade3382d38b2169ec9d668aef20fb6dd30

        SHA256

        323872c922edaea2a4aac63b429596e97ee6dc91c377417d8f66bf97e0afa723

        SHA512

        bc5d7ef18ee3afc1a810d81afaf2bd85c3516424c1bbe91072dcc41e052b0a1fabf41afe4928b43b2b1e0e0a82319eb6044f0f1faee0d5203cba0d41bfaac999

      • C:\Program Files\7-Zip\7zFM.exe

        Filesize

        956KB

        MD5

        4cc2848caa1ae5af4f75cb87f1837737

        SHA1

        4892e7c149680a3db15c05a71357329e4e43dfdf

        SHA256

        a20fc5de3ca8d765d06a82c77ebd6208993a2c5fcdd665da767f0d2e5d130498

        SHA512

        0484f0af47c60c392d2d348d1297f5dc5536a01ee4abadf3e539ee6ee605e3881a36f23091931732aab0553502806c45b89ac451d2378413b9cc6c06be2a6577

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • F:\$RECYCLE.BIN\S-1-5-21-3452737119-3959686427-228443150-1000\_desktop.ini

        Filesize

        9B

        MD5

        c59aab012a570d8b20f60efcafb272be

        SHA1

        709df64d9a23340c6bc42f2bf8dfdca512bff2e0

        SHA256

        8a349242c7461f8fccc029421cd051ef8f140a8e3738d348a2354a3d5b9de220

        SHA512

        8c3f67dc02beaca59f0deaa4d8e33bc385b19df02d2a8b905b47148e21919f7d059f3883f02dad25a0d11dc807343390114753a7918171720d8cd72e84239e17

      • memory/1196-5-0x0000000002E20000-0x0000000002E21000-memory.dmp

        Filesize

        4KB

      • memory/2860-66-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2860-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2860-72-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2860-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2860-573-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2860-1825-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2860-2187-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2860-14-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2860-3285-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2860-7-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB