Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2024 04:45

General

  • Target

    dc266e56ea3f4a30862083ea50a7103e4274ad4914d6d000ab88f46efe0cdfae.exe

  • Size

    5.7MB

  • MD5

    3c18d0890a3c8dd4e536fb64b1c4e6b3

  • SHA1

    3327e9354250a4838f6d04961cc3af25af4bc165

  • SHA256

    dc266e56ea3f4a30862083ea50a7103e4274ad4914d6d000ab88f46efe0cdfae

  • SHA512

    33e8eb0554eaf4432ef3ada555e0a056198d23eb0a2a50c6ef30b020a56015f07106ad1e91e7287bcc57fe75ac4d9419e89fe3ce658c0d0c16012e47cd1994bb

  • SSDEEP

    49152:GPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTPBJ:YKUgTH2M2m9UMpu1QfLczqssnKSk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3448
      • C:\Users\Admin\AppData\Local\Temp\dc266e56ea3f4a30862083ea50a7103e4274ad4914d6d000ab88f46efe0cdfae.exe
        "C:\Users\Admin\AppData\Local\Temp\dc266e56ea3f4a30862083ea50a7103e4274ad4914d6d000ab88f46efe0cdfae.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2548
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a2FBB.bat
          3⤵
            PID:4708
            • C:\Users\Admin\AppData\Local\Temp\dc266e56ea3f4a30862083ea50a7103e4274ad4914d6d000ab88f46efe0cdfae.exe
              "C:\Users\Admin\AppData\Local\Temp\dc266e56ea3f4a30862083ea50a7103e4274ad4914d6d000ab88f46efe0cdfae.exe"
              4⤵
              • Executes dropped EXE
              PID:4744
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:876
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1512
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2272

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          254KB

          MD5

          b972986ddc5ad7e3b78622aaec4ae4c0

          SHA1

          07ec90600067df6a2264a189ad2179175fc48798

          SHA256

          cef76ca308c743c0da4d0adc190484f0a08dcb4a4b87946beef0cd9d2c8915a5

          SHA512

          aeba6991cd7bbc8731468d94455f3abf564e76cab681d023089b17cda58229fdab97c39e001081887a2c5efb0969d15fac9fab2657075dfc768448aeb4825023

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          573KB

          MD5

          13257d0f99234c552f5366105bda5965

          SHA1

          04f0a6c539d94a50212986d6c980c03363998794

          SHA256

          67f262a67d59106ec94ad9797c2e263eb8daa44966fa8fce95857a240e24a597

          SHA512

          a37980a5c1b803dd8e065e9637e755944175c2c909b48dce1add91a506b8fec9776ab397246061d225365d04998c25b39f34798ae4eeed7a1366e40d0f6cd57c

        • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

          Filesize

          639KB

          MD5

          cda7714d2ec36fbd5dfd358b3cc885ce

          SHA1

          410c57ed71630d168738f40cea3ccc65529b0ae1

          SHA256

          d2c7832ddb52cfbb750dfffae048fd9c6a9cf06a52b7de91a0be255dffadef4e

          SHA512

          89cc9f52ae02711a9f90f2ba8e6b62c8ac442b967903067e1f3c5c12ff3ca012b62b8af4e4e7c3762b4c3ee255826b509fdb064c0d2861a2c2953a02c4fc1714

        • C:\Users\Admin\AppData\Local\Temp\$$a2FBB.bat

          Filesize

          722B

          MD5

          1083d15d425e7b3420c581fdfb4ebc39

          SHA1

          cb3dd169ff5c220b370cba964405e4b9d1c2c7ee

          SHA256

          64f4ec8100d6ef9ffca2945fe910016511c3d3ec5c89bddcd9ea3885e9632fbd

          SHA512

          e6595195eda5f2814ceab92ba89a7e88b66e28c482b89459a1f559f32ae837d16e36e146a6d26c2a5e1dbe24611834961ef90a86be391eecf5681ea61a21ea7f

        • C:\Users\Admin\AppData\Local\Temp\dc266e56ea3f4a30862083ea50a7103e4274ad4914d6d000ab88f46efe0cdfae.exe.exe

          Filesize

          5.7MB

          MD5

          ba18e99b3e17adb5b029eaebc457dd89

          SHA1

          ec0458f3c00d35b323f08d4e1cc2e72899429c38

          SHA256

          f5ee36de8edf9be2ac2752b219cfdcb7ca1677071b8e116cb876306e9f1b6628

          SHA512

          1f41929e6f5b555b60c411c7810cbf14e3af26100df5ac4533ec3739a278c1b925687284660efb4868e3741305098e2737836229efc9fe46c97a6057c10e677c

        • C:\Windows\Logo1_.exe

          Filesize

          29KB

          MD5

          dac673b75fd1f13a8f885a8ca5252a58

          SHA1

          809080cb9ecc0d4978b724a48ca3e9fb6d65d11a

          SHA256

          ca09ca81af02465f58f3c9037f9d3ec216a9cb41f876bc64ca9a13d7b0558a2c

          SHA512

          cc5336c6a7cf8189de065ea93420015c62ccfa3c7fa5cf1f9e02d8d25ae551c64353eac54c502d02568d0f2fd0706be7098e41f163c1d1b684955d601323610c

        • F:\$RECYCLE.BIN\S-1-5-21-1132431369-515282257-1998160155-1000\_desktop.ini

          Filesize

          9B

          MD5

          7ef570b2b21e58fd906ef1a980d64425

          SHA1

          18502489f652e74f8972bbfa100d5c163d719ab7

          SHA256

          c3ce1b9216b58ac7d9ed3b93e5e3a1d6a2473b53b5bc1f008a621def49517055

          SHA512

          e1175d861a79d62b85cd18661375f1c956dcc97e958765dc225f3aa4b0f0100ca9e17b9c61f5e18fc2a96e5167c0563f60645033aff1be1ec2f372c1b9a8b35f

        • memory/876-26-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/876-32-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/876-36-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/876-19-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/876-102-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/876-1227-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/876-4792-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/876-12-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/876-5231-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2548-0-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2548-8-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB