Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 10:23

General

  • Target

    ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4.exe

  • Size

    487KB

  • MD5

    40fba8c81a31f2d76c8582e45a52123e

  • SHA1

    06c7c518c0c4887aa81b4db4ca39a3c96506a74d

  • SHA256

    ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4

  • SHA512

    dc1191dd8967a9d03506ee1eb9cdb9f531d5c25c62ed1fa9529de31de7c92b8a86b37a9ee58231cfe5704e17c5cc7f9f51881ff2a3cfc32abd6f5682f5ff26ef

  • SSDEEP

    6144:XUuJoz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fayCV4:U1gL5pRTcAkS/3hzN8qE43fm78V

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1340
      • C:\Users\Admin\AppData\Local\Temp\ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4.exe
        "C:\Users\Admin\AppData\Local\Temp\ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aEC0.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2548
          • C:\Users\Admin\AppData\Local\Temp\ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4.exe
            "C:\Users\Admin\AppData\Local\Temp\ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4.exe"
            4⤵
            • Executes dropped EXE
            PID:2844
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2180
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2724

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        474KB

        MD5

        e96712cc2991fab37a21ceeeee83b1f6

        SHA1

        e7894f4029baf5faa81584bab7d20acb0feadf5f

        SHA256

        fc5ecf67ef00e72d234c1b58be4d807a7fa2603cf66085204bacabb796275153

        SHA512

        fd8ba411e0083b3120431f23f272daf3923c96c96a15f7f861565b4de85fce7bf5aafd42d15cf45c559b8e7192513a31b9167ec7c5b6f52823bf3dc20701a06e

      • C:\Users\Admin\AppData\Local\Temp\$$aEC0.bat

        Filesize

        721B

        MD5

        60c493f461180c2d92cfdfce91d1930a

        SHA1

        5ceddf69740558467ce63f5ac00ac954acc895bf

        SHA256

        0383d239f9342273915c47666ec5d30ff4e783429ae8f05a4935513711a6d3d9

        SHA512

        63c3fc8abb62404cfb258191d9559cf05b39bc93284dd72246aa3f0d49123c951443a3a5f77ac9e6d78ecc28e09fba9e8e2b67ae0ae84253d0f9be1a43e5e0c2

      • C:\Users\Admin\AppData\Local\Temp\ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4.exe.exe

        Filesize

        458KB

        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        abd597f85b4c46b3a4ef95ae1d8ae5a7

        SHA1

        8baccced6bbfc312df2e849a3ec6be673bff4eab

        SHA256

        b48d639e5cde89949427acf034bb6552302405c56a554159f78e174779a1115c

        SHA512

        8506b3d2dc36b5ae95e8a1b4290c53928bc749701ae8daa50eb0335a79d11a229ec54139f6db76edaa621e7777e2015496fde00d55cb73340a3bd5f097258e1e

      • F:\$RECYCLE.BIN\S-1-5-21-3627615824-4061627003-3019543961-1000\_desktop.ini

        Filesize

        9B

        MD5

        7ef570b2b21e58fd906ef1a980d64425

        SHA1

        18502489f652e74f8972bbfa100d5c163d719ab7

        SHA256

        c3ce1b9216b58ac7d9ed3b93e5e3a1d6a2473b53b5bc1f008a621def49517055

        SHA512

        e1175d861a79d62b85cd18661375f1c956dcc97e958765dc225f3aa4b0f0100ca9e17b9c61f5e18fc2a96e5167c0563f60645033aff1be1ec2f372c1b9a8b35f

      • memory/1340-29-0x0000000002D10000-0x0000000002D11000-memory.dmp

        Filesize

        4KB

      • memory/2188-16-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2188-12-0x0000000000270000-0x00000000002A6000-memory.dmp

        Filesize

        216KB

      • memory/2188-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2820-31-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2820-38-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2820-44-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2820-90-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2820-96-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2820-851-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2820-1849-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2820-2496-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2820-3309-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2820-21-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB