Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-04-2024 02:54

General

  • Target

    f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe

  • Size

    310KB

  • MD5

    ce025a42eda94a58a6aaa202438e2aa8

  • SHA1

    45ea4b3c5cea86aee66534b1f4217fe7b4065256

  • SHA256

    f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027

  • SHA512

    d646d158b826c419a19b518cba348f4838767d95643a92e8849830f4215f6bfe7fa4b5fa35fd0a51469f5039b3f9e165a6bb27b067166aba66d5f12d18a94bad

  • SSDEEP

    6144:MVfjmNuOlq5n5YW6eQXC+pdX55F8+f1u0kdzY1JGjJUxf6XEx4a5TFf3DxfpgVgt:O7+uhn5YWNQSkB55S+9u0kdzoGXsNf+G

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe
        "C:\Users\Admin\AppData\Local\Temp\f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1940
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1249.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2968
          • C:\Users\Admin\AppData\Local\Temp\f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe
            "C:\Users\Admin\AppData\Local\Temp\f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe"
            4⤵
            • Executes dropped EXE
            PID:2852
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2368
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3064
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2596

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        4ea1792890b16f7a7bd178c5de188d93

        SHA1

        13305c216a72caa23ee3a823056dfa308df5d671

        SHA256

        d82a2e28398235d01736e7f88716348755e59e303aa439f18edd053d7f4cb031

        SHA512

        94756da87e91df5e3442cf6712557b6c560026c779f1b5312b011c141c4870712ed70bfb201c1401386b8611c3040e7df41b2357cd095206a2d74a9d2d20a942

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a1249.bat

        Filesize

        722B

        MD5

        2412f1f9787b1eaf2fe629ea0d567e98

        SHA1

        f63111f8017da647ecae444441d114f03be50049

        SHA256

        76f1a73895619cd5db40a8b9bd03510f3d6706ff8c9c92abfa069087175462c6

        SHA512

        2cbf64a80ec84996c59a4f4c5363d61e0e9f867ea05a05b1eb2a6a4bdfeb00b5ea3fccc9bc38bc97f3fb2d1263b2547b4d69520e1da15b83a7e0d1035355b596

      • C:\Users\Admin\AppData\Local\Temp\f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe.exe

        Filesize

        283KB

        MD5

        e2ddf07f9cf45247f05a1d4e1e97965d

        SHA1

        b49bf09fd6847672edfcd8623485eded12114cf5

        SHA256

        a47809fa663a8adac60290a51bb3cfebd0c7eb9044b5be3849e849ff38e9b83d

        SHA512

        cd2f8e45ffc85c923781d32867a625cfecc937f0b10f0e196dac34331f5be865205d9a9dc610c88748c92d7aa32cb229165a857ad94ba414a7c182a35b24e43d

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        c5dacb5d9ba17498cc50e5e16665560a

        SHA1

        2c2e2612a06cfdc18cd7367148471d2dbe2a1521

        SHA256

        f4d821877f7f3f1faf39d6b4045baa2b12d8a6b8aeca6ee73f3c94e1df5180b3

        SHA512

        4882b0b45109388e5a520d62df85fac5f1212f7d79f4e5184322cec9093226b8c1725e6fd9d1e1ff460ae11301924ba4e15f4b0aa00bc13800f084faf1ef3ff1

      • F:\$RECYCLE.BIN\S-1-5-21-3452737119-3959686427-228443150-1000\_desktop.ini

        Filesize

        9B

        MD5

        5e45e0c42537212b4bfef35112ec91ba

        SHA1

        10c59c091fd35facc82bbc96938f118ce5a60546

        SHA256

        9f6b7a83161db36757e96dc40936aec1e5a9a41f9fca089f9cf5a4d695dd5ed5

        SHA512

        ee964e08687daa53fdc8e063402791acb104bd59f5d0f8a6d11d3e889db476315641c38032ade4177cd794b060f9fc4e6fd161989e452aae828c875c747e4bfb

      • memory/1200-30-0x00000000025A0000-0x00000000025A1000-memory.dmp

        Filesize

        4KB

      • memory/1940-16-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/1940-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1940-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1940-21-0x0000000000220000-0x0000000000254000-memory.dmp

        Filesize

        208KB

      • memory/2368-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2368-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2368-91-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2368-97-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2368-828-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2368-1850-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2368-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2368-2549-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2368-3310-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2368-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB