Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 15:14

General

  • Target

    71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe

  • Size

    362KB

  • MD5

    c5cb98fa669a0af45bd76c6ca5858c0a

  • SHA1

    73b95be38d968c05675bc239eac386ad5b810b55

  • SHA256

    71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c

  • SHA512

    b5f63a8cc78e12e83f0c667c85c043b5b7cb475d880ec1833c38e6b7f9e5241fced7a2015ec90e117b3dd0799a7d12fc7d6b5846e8569402ba7164138ed366b2

  • SSDEEP

    6144:3Fp9zU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:VpRU66b5zhVymA/XSRh

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe
        "C:\Users\Admin\AppData\Local\Temp\71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1F44.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2860
          • C:\Users\Admin\AppData\Local\Temp\71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe
            "C:\Users\Admin\AppData\Local\Temp\71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe"
            4⤵
            • Executes dropped EXE
            PID:2872
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2264
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2120

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        252KB

        MD5

        45176869ff4ca97755d08ffb45765b23

        SHA1

        365bf2c70a10602370bd8d149802927c52164cb6

        SHA256

        548d006a501826f362a576842cee94d5c94812dbd5e17f709cf3fd071a8ff837

        SHA512

        f88d8c681e934302d0df4735b0e7b730a26dc5e818c7c0a1d0440c84d1a6658a70a5d7b53845b9dfc776ed383a381b7f76c8c040018e1b6a8d21197d3b0d8569

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        472KB

        MD5

        88eb1bca8c399bc3f46e99cdde2f047e

        SHA1

        55fafbceb011e1af2edced978686a90971bd95f2

        SHA256

        42fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428

        SHA512

        149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728

      • C:\Users\Admin\AppData\Local\Temp\$$a1F44.bat

        Filesize

        722B

        MD5

        876c6041f89d140610ae2f70b0907017

        SHA1

        0371b9f05ac3be3cf54db3b6de48966545a773f4

        SHA256

        963e1c69612bccf4bf17e9f7c31a32f0e2698368ad4e171a7d57ffe7a3d25e76

        SHA512

        0a4ec20a43883a4241668ac2dff2879836945bdb05ad5efd29c0b47a98cdbe1add20ebbe70dff8b7690f1aca2af9e2e93e969d65d9a269f1a2c13d2b717e2fc0

      • C:\Users\Admin\AppData\Local\Temp\71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe.exe

        Filesize

        335KB

        MD5

        40ac62c087648ccc2c58dae066d34c98

        SHA1

        0e87efb6ddfe59e534ea9e829cad35be8563e5f7

        SHA256

        482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916

        SHA512

        0c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f

      • C:\Windows\Logo1_.exe

        Filesize

        27KB

        MD5

        f1bef7887eadcc719a4092978bf5929c

        SHA1

        c87bbfae9f8c990a9ef7abcbee695006fb97d03a

        SHA256

        78361883ed10c93e33dd13e2b56b8dc43d854f387dd809dbd75875ae4db89cf0

        SHA512

        3ffaa66e7c774fef7de06e689bb8a16d48a0702443573aa34dbdfdbba3661003db4d73cf6713a41cab87d6c967f60b02915c6dce46a33fe8294088b435f9e672

      • F:\$RECYCLE.BIN\S-1-5-21-1298544033-3225604241-2703760938-1000\_desktop.ini

        Filesize

        9B

        MD5

        27729a3995958245e2d6799df42e26e7

        SHA1

        dfe386f53277c8387b50122f3fda9bc2467815ba

        SHA256

        9313041e89d4585b2606afa4809b101e7e8a2c944d063a28c796b0c0f070b5f1

        SHA512

        ba9157cea7ca5c01b52e2a4a758f4e12e018990e49f1ece5fa6d83423f37a0a4dd5246d9b01e5e212d5e8c36a66a8d0e2645bc73753671295965a855a5028ec6

      • memory/1196-30-0x0000000002E10000-0x0000000002E11000-memory.dmp

        Filesize

        4KB

      • memory/2264-98-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2264-92-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2264-32-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2264-3311-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2264-39-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2264-2048-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2264-47-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2264-22-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2264-1851-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2264-577-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2864-0-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2864-40-0x0000000000220000-0x0000000000255000-memory.dmp

        Filesize

        212KB

      • memory/2864-17-0x0000000000220000-0x0000000000255000-memory.dmp

        Filesize

        212KB

      • memory/2864-21-0x0000000000220000-0x0000000000255000-memory.dmp

        Filesize

        212KB

      • memory/2864-15-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB