Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/04/2024, 20:18

General

  • Target

    33dfc0fece5800a3ac3ec71324a6e2f8f8601c39b417570fd9f995a65661b49f.exe

  • Size

    484KB

  • MD5

    ed627d3fdb9e20e1efec35ec7452f0f2

  • SHA1

    1974408c40d8e7c983ee1c923b0d1cd3ff86b50b

  • SHA256

    33dfc0fece5800a3ac3ec71324a6e2f8f8601c39b417570fd9f995a65661b49f

  • SHA512

    ec7581ef41b88bc7cf8bc18c1a924edfeb2bff7599b1164cf342786979700a767c7de08d0e6b29e01053456b1a9c5140bb07684b3199a9246337935c4d704bc9

  • SSDEEP

    6144:KVfhguGz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fay7:EJgug1gL5pRTcAkS/3hzN8qE43fm78V

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\33dfc0fece5800a3ac3ec71324a6e2f8f8601c39b417570fd9f995a65661b49f.exe
        "C:\Users\Admin\AppData\Local\Temp\33dfc0fece5800a3ac3ec71324a6e2f8f8601c39b417570fd9f995a65661b49f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a254C.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2476
          • C:\Users\Admin\AppData\Local\Temp\33dfc0fece5800a3ac3ec71324a6e2f8f8601c39b417570fd9f995a65661b49f.exe
            "C:\Users\Admin\AppData\Local\Temp\33dfc0fece5800a3ac3ec71324a6e2f8f8601c39b417570fd9f995a65661b49f.exe"
            4⤵
            • Executes dropped EXE
            PID:2796
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3036
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2584
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2512

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        593ea4d29a2c8cc7997860a78ec16b97

        SHA1

        6f483c3337cee43fbf961fa9b3d774fa7d34b9df

        SHA256

        d398094d698da304ecbee6de7a3efb1f6f6bc4444437a88c5a70c97800a978f5

        SHA512

        51bb70206577ae687e787422f91b9901888cb92a80febbc18969f5b2e27760448a1df28ca30c33b798287e202b3804c92d78a8a9b6bea19670a3884cd3e36b7f

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        f9fc019eacb573ec828d2d9ff6a48318

        SHA1

        b91958dc8d178b6eeb35e829bab84d0fb12c2280

        SHA256

        bf9ba3df2bad76d15f4efe42c0c59f37b9454907958892df8ab996552658934e

        SHA512

        998ba7bc7cdd5df3e1acfda6f4f92ec9d27732e1e182177dff310f3c918f3be99626a3526bebdff5bb7eb980640434baf56e0f08bfd125168c0a9e37e7239305

      • C:\Users\Admin\AppData\Local\Temp\$$a254C.bat

        Filesize

        722B

        MD5

        502fc4168d696921f6ac98d634243cab

        SHA1

        79abaf2087fa3295746faf4a1d6e7d0f37c989b4

        SHA256

        5644de967858398636885cebde9a63bf7e4850ef16155d8249a98c6acff2e6c0

        SHA512

        ff144c9fcf516765d6e5a18e76fb86721451e5e35c583142d95f528183517875e0090ae80da7a116f0876fefce17bd7d664f097a3ebeceda43c17570f3438783

      • C:\Users\Admin\AppData\Local\Temp\33dfc0fece5800a3ac3ec71324a6e2f8f8601c39b417570fd9f995a65661b49f.exe.exe

        Filesize

        458KB

        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        2b50af7538425b388b0ecbfe37eb19c6

        SHA1

        08e2154d0eeb1424d2b642f5f7d85c572744240e

        SHA256

        2e134ba6187087992ed1b352ba599d248f6153959edaace04074e0f5ea70775f

        SHA512

        5cf3f14fc65879feb726248bfb1af4a836ce4ec3a077f2e2f6afe3462ee489305fe6ba8b501652079ab4df08ce920e4dcf0039cbe7ee5ea83afe11bbef20886a

      • F:\$RECYCLE.BIN\S-1-5-21-3452737119-3959686427-228443150-1000\_desktop.ini

        Filesize

        9B

        MD5

        a4e284afce5c2e93b509543e6064da82

        SHA1

        77a7ae3e38b05410dcf335f8abe1df4d7f0b141c

        SHA256

        f4460d1a85b2980fa2b8d329adda0fd330f8157d7afc2d7b1bad62453ff1dfe8

        SHA512

        8f2147ca54c96b0b05bf69a7919b5bf54b20036ba8336f6ba379c2abb0d31139a91d315130040ef1d06450dd624d8a8661396eb082407b8f7455be4d61351821

      • memory/1192-29-0x0000000002090000-0x0000000002091000-memory.dmp

        Filesize

        4KB

      • memory/3004-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3004-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3004-12-0x0000000000440000-0x0000000000474000-memory.dmp

        Filesize

        208KB

      • memory/3036-40-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-46-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-92-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-98-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-752-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-1851-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-2439-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-3311-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB