Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2024 10:23

General

  • Target

    ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4.exe

  • Size

    487KB

  • MD5

    40fba8c81a31f2d76c8582e45a52123e

  • SHA1

    06c7c518c0c4887aa81b4db4ca39a3c96506a74d

  • SHA256

    ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4

  • SHA512

    dc1191dd8967a9d03506ee1eb9cdb9f531d5c25c62ed1fa9529de31de7c92b8a86b37a9ee58231cfe5704e17c5cc7f9f51881ff2a3cfc32abd6f5682f5ff26ef

  • SSDEEP

    6144:XUuJoz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fayCV4:U1gL5pRTcAkS/3hzN8qE43fm78V

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3340
      • C:\Users\Admin\AppData\Local\Temp\ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4.exe
        "C:\Users\Admin\AppData\Local\Temp\ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a23B4.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1608
          • C:\Users\Admin\AppData\Local\Temp\ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4.exe
            "C:\Users\Admin\AppData\Local\Temp\ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4.exe"
            4⤵
            • Executes dropped EXE
            PID:2208
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4436
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1152
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1192

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        573KB

        MD5

        be4b2a3fb86bb1b0a1e8355a222bf6c4

        SHA1

        72d6e1c9e8266ac9c447c7b37d7c70cf306a0437

        SHA256

        d0b8790d59863565a155a8cc85fba09186a0f12d1f0d6288cf4817cf24e563ce

        SHA512

        ea26e5d2e8dec4d455e05346955e51ed9dcaee644b8f6e7d3704dc8064a42379739c098261ba2ddce6197f6b3cc99ccf2b664f2eb93abbaababe1a383afca80f

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        639KB

        MD5

        8c24f57e8169cb30b43a16a13aad3e15

        SHA1

        d3d0c15c85d32f552f5f4eff910667046d886596

        SHA256

        ad49a43e57cff5d23ed2e5467974579f711015fa6fd80196991e873a94f37801

        SHA512

        28a856a62a7cd6af5fd50811421a665bb7fe2c1d41bc2675de6cdbc4b33d2b308e568d27daf7f738923bdb6f812bd1f2db7eeccb629fe2ffe56921655093a645

      • C:\Users\Admin\AppData\Local\Temp\$$a23B4.bat

        Filesize

        722B

        MD5

        2f8ac43971ab6795b481cb7bda435c5c

        SHA1

        7b239fc71de7bba089aa1c9d76eb4019dfd22772

        SHA256

        d6b6a2367384584bcc1df5501b2bb92ce82ff71691b180147cf2a342a9fc88f6

        SHA512

        fabaf0b9d6a42bf8163ebc18892f7e946a3e8eee59de545570cba1efd5c601185ae4dd8fd5886811e79b5446761766327c5612815aa4ccc640d1c12a4b39f67d

      • C:\Users\Admin\AppData\Local\Temp\ce76ab31a2da9203d75333f34351528ef102cabc075af94a4a88a096ee4871d4.exe.exe

        Filesize

        458KB

        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        abd597f85b4c46b3a4ef95ae1d8ae5a7

        SHA1

        8baccced6bbfc312df2e849a3ec6be673bff4eab

        SHA256

        b48d639e5cde89949427acf034bb6552302405c56a554159f78e174779a1115c

        SHA512

        8506b3d2dc36b5ae95e8a1b4290c53928bc749701ae8daa50eb0335a79d11a229ec54139f6db76edaa621e7777e2015496fde00d55cb73340a3bd5f097258e1e

      • F:\$RECYCLE.BIN\S-1-5-21-1132431369-515282257-1998160155-1000\_desktop.ini

        Filesize

        9B

        MD5

        7ef570b2b21e58fd906ef1a980d64425

        SHA1

        18502489f652e74f8972bbfa100d5c163d719ab7

        SHA256

        c3ce1b9216b58ac7d9ed3b93e5e3a1d6a2473b53b5bc1f008a621def49517055

        SHA512

        e1175d861a79d62b85cd18661375f1c956dcc97e958765dc225f3aa4b0f0100ca9e17b9c61f5e18fc2a96e5167c0563f60645033aff1be1ec2f372c1b9a8b35f

      • memory/2552-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2552-8-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4436-26-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4436-32-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4436-36-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4436-19-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4436-1226-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4436-4792-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4436-10-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4436-5231-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB