Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2024, 18:14

General

  • Target

    e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe

  • Size

    227KB

  • MD5

    a67071bc1c09acf7a34a28f574e5958a

  • SHA1

    81cdc3cab1eab25e74dd3b09a9465f40ad8ea2ea

  • SHA256

    e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa

  • SHA512

    fb9554d217e77d3e56cae22b0c3c64810c0b852dbe90dff820e24a933f578a004fc2341996959a55b87b41faf01adc26b6ec2e5da260da890c7fab05b0066adc

  • SSDEEP

    6144:ERuJXbdeKzC/leySe8AIqpoHbnDns1ND9m:n/VyV8hEoHbI3A

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3416
      • C:\Users\Admin\AppData\Local\Temp\e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe
        "C:\Users\Admin\AppData\Local\Temp\e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:5036
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3076.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4244
          • C:\Users\Admin\AppData\Local\Temp\e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe
            "C:\Users\Admin\AppData\Local\Temp\e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe"
            4⤵
            • Executes dropped EXE
            PID:2284
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4852
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2464
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3844

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        ddc537b7c9cd3d94433461320a2fbb60

        SHA1

        429032645b563ee328c0effa6bd389d51db2309f

        SHA256

        9406d981729c2786d35db72096e2f3648ffc2fec213aa6090e657f5321e18b7b

        SHA512

        86b5ccd4d3244b16f381e7df56e72db8aa391041f3689bcd8994d535627780c907e987a6b06da4ef553a58c4b2f02176470c6980b5b7c2c6f5fcf9aa2a3e4b2c

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        573KB

        MD5

        035829ec15f01a14806a689e86606696

        SHA1

        b1bec399cb8c61c88e451daefd3bfa3102e2b88d

        SHA256

        656ae937b1f9a819f8e0544bf5c3bdfc603db67590726cdba5090e979a8938f0

        SHA512

        e24f80633208042213da41f5186c4ae1d3a3f79ceff805651dc762a027784ffa255f159a409be1a777a865bf78844b19ead8d8eadd9d3f3dce805f327f6d5290

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        639KB

        MD5

        12d781cb550497985727ae9ce2dd228f

        SHA1

        54a535f956adeacd170d90a89334d6947a2136a3

        SHA256

        74918337be31548b8e9df1ac3274a6169497df4013f46c9d22888a8992848841

        SHA512

        8fbb584c962d900a7b3ca84b0d9888b78ae7aefc4e49423f06eda29f4cdd732034c8bc3499ee41a0b7a7d5c31faebe30204f37c51658f7607f9ed39f5c43ee9a

      • C:\Users\Admin\AppData\Local\Temp\$$a3076.bat

        Filesize

        722B

        MD5

        0301b81d82b24e20b1bab144b448ef4e

        SHA1

        46f5cb0e0bc741c432d56f10cfc5445375c149ad

        SHA256

        9909a004c6a93a03f6271793bf27f3e864c536ffbbb45400f012a9e42f73b039

        SHA512

        0a9d63b5c5cfcc1dcac4b3c872a974d8f5f897a509a1b998b4fc8f3985774b16c7d324c6e88dca1b21af3b684d7fc17b1b2f1b31263a11b025d4fe8ddec7b2b6

      • C:\Users\Admin\AppData\Local\Temp\e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe.exe

        Filesize

        198KB

        MD5

        e133c2d85cff4edd7fe8e8f0f8be6cdb

        SHA1

        b8269209ebb6fe44bc50dab35f97b0ae244701b4

        SHA256

        6c5e7d9c81a409e67c143cd3aed33bddc3967fa4c9ab3b98560b7d3bf57d093d

        SHA512

        701b7d1c7e154519d77043f7de09d60c1ff76c95f820fc1c9afca19724efb0847d646686053354156fd4e8a9dab1f29a79d3223f939a3ff1b3613770dc8603b1

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        215689cb8f71685bce03d19ebf4d679c

        SHA1

        9cebc9b17a45cb1655de16f51b5ff258c6f97def

        SHA256

        404605db3e4590400023a1d6d2046ce45457ba97e413dec0fd7c6e031c909572

        SHA512

        4dc920d2962289f3e723130b2f243982029af87bf93acdef0af39dc15731456b100a6dd680948e581fe59c301e280482b9ab55f0cfca896810f28a717eaffc27

      • F:\$RECYCLE.BIN\S-1-5-21-2177723727-746291240-1644359950-1000\_desktop.ini

        Filesize

        9B

        MD5

        a4e284afce5c2e93b509543e6064da82

        SHA1

        77a7ae3e38b05410dcf335f8abe1df4d7f0b141c

        SHA256

        f4460d1a85b2980fa2b8d329adda0fd330f8157d7afc2d7b1bad62453ff1dfe8

        SHA512

        8f2147ca54c96b0b05bf69a7919b5bf54b20036ba8336f6ba379c2abb0d31139a91d315130040ef1d06450dd624d8a8661396eb082407b8f7455be4d61351821

      • memory/4852-26-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4852-32-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4852-36-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4852-19-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4852-1227-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4852-12-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4852-4794-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4852-5233-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/5036-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/5036-8-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB