Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2024, 10:32

General

  • Target

    90e10647ce8c4c11effcce183bda6846e3a4ec037a166961dfb652730a1cf285.exe

  • Size

    2.3MB

  • MD5

    5e9498d15b4e0b9f6e97eaac62d5aec0

  • SHA1

    82afc72b3c6c7c10e297ad293d5d12c959735822

  • SHA256

    90e10647ce8c4c11effcce183bda6846e3a4ec037a166961dfb652730a1cf285

  • SHA512

    d6b23e4ce5572666cb8a3ce33f0274677ab36bbe70ca0b341ee057b78f4d65ec99f0197cc412b2fd2ff84286bb6a0a3fc293297c969c2c0cc3a48db257e3b09d

  • SSDEEP

    49152:/7KQN2skpzPXDFBjWRJTCAIHuDeeaJ98mjRC9YC2Ns+/X0h54GEewKk:262bz/5YvpI2eey98CRC4L0ZRbk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\90e10647ce8c4c11effcce183bda6846e3a4ec037a166961dfb652730a1cf285.exe
        "C:\Users\Admin\AppData\Local\Temp\90e10647ce8c4c11effcce183bda6846e3a4ec037a166961dfb652730a1cf285.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4720
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a77DF.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4192
          • C:\Users\Admin\AppData\Local\Temp\90e10647ce8c4c11effcce183bda6846e3a4ec037a166961dfb652730a1cf285.exe
            "C:\Users\Admin\AppData\Local\Temp\90e10647ce8c4c11effcce183bda6846e3a4ec037a166961dfb652730a1cf285.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3736
            • \??\c:\0ef4f3eb56f0d59590659ce2f2176d\install.exe
              c:\0ef4f3eb56f0d59590659ce2f2176d\.\install.exe
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:4068
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4036
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4048
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2352

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\0ef4f3eb56f0d59590659ce2f2176d\eula.1031.txt

              Filesize

              17KB

              MD5

              9147a93f43d8e58218ebcb15fda888c9

              SHA1

              8277c722ba478be8606d8429de3772b5de4e5f09

              SHA256

              a75019ac38e0d3570633fa282f3d95d20763657f4a2fe851fae52a3185d1eded

              SHA512

              cc9176027621a590a1d4f6e17942012023e3fabc3316bc62c4b17cd61ce76bf5cf270bd32da95dba7ddf3163e84114be1103a6f810ca1a05d914712895f09705

            • C:\0ef4f3eb56f0d59590659ce2f2176d\install.exe

              Filesize

              835KB

              MD5

              e015a2d8890e2a96a93ca818f834c45b

              SHA1

              30bda2b4464b1c41210cba367e444aed56502360

              SHA256

              dc1ba9cb15d0808dc2d80ce13acfa0b07acdfcfe2cdf94da47e0e570e7345f6d

              SHA512

              20a80b50486e938b92f3aef85e59307f644b69dc5d1edee38038182b57caf636f5f1909959f6fafcfc2e915010d2b3d230cba8300fbc0f63ee2ee3ad8ad64123

            • C:\0ef4f3eb56f0d59590659ce2f2176d\install.res.1033.dll

              Filesize

              88KB

              MD5

              43fb29e3a676d26fcbf0352207991523

              SHA1

              c485159b01baa676167c414fd15f1026e3ae7c14

              SHA256

              4107f4813bc41ed6a6586d1ba01a5c3703ed60c2df060cba6791f449f3689de7

              SHA512

              ad748c63d912e194bb5be42f6db192b22f59f760e0536118dfa963fe29001e7fe635d035f31d86aa5e77a1d4f7ceabf27b03645d0037f147293af1e32eab57a4

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              6651318eb7c5c6a8955de87943e3a503

              SHA1

              b88de96822ee0b214e3259fa9c4b9f4ddc8527b6

              SHA256

              c32efefaaae02b78a7ea43be3c724f6d46a931329499b758bd1b2665b5376d81

              SHA512

              a1e793e8a14edaac22e89aabeb1b64f8b0d05658eb48d12a8afea623e6bccd11ea2e6ea3403b1c939e43afa93987e349ab002a71af956b1bcbaabf31ff129de7

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              570KB

              MD5

              39345fc320aefe38308e4d6725050f23

              SHA1

              9c039376d6f3c4114a9915ac69f25bdda2551739

              SHA256

              a3cf7320a5e0d2b2eb3b3117a5e32c3b56e978fb50020c0cbbcebd25c4f072c7

              SHA512

              17c894e097124e02a763613a4c3a256e09c27ab7dbbb5fd0d8a20f81393244d4e2d116fac6310649a09b913c9b41d205212d1a85a278b8d2b71b0f7d1598d709

            • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

              Filesize

              636KB

              MD5

              2500f702e2b9632127c14e4eaae5d424

              SHA1

              8726fef12958265214eeb58001c995629834b13a

              SHA256

              82e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c

              SHA512

              f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c

            • C:\Users\Admin\AppData\Local\Temp\$$a77DF.bat

              Filesize

              722B

              MD5

              edcdb84881f06d1a0d82a95240343ccf

              SHA1

              6278566608dd546cec5f20eaeb6a21c1c53d384d

              SHA256

              8e7628f72703977e86988df56f37c70ae7893bc14615e1c1b9ed585e788b4b98

              SHA512

              741ca0f83039685f0b39b7f5c7212e32483ccfd46b61432981a20f71d2abd01c1d7233075da1e35c4a3f6c64488ce57d38650e004b5bd5e3eb603e04e2455c61

            • C:\Users\Admin\AppData\Local\Temp\90e10647ce8c4c11effcce183bda6846e3a4ec037a166961dfb652730a1cf285.exe.exe

              Filesize

              2.3MB

              MD5

              a31dc1a74f1dee5caf63aec8ebb5fe20

              SHA1

              5580072a056fdd50cdf93d470239538636f8f3a9

              SHA256

              baaaeddc17bcda8d20c0a82a9eb1247be06b509a820d65dda1342f4010bdb4a0

              SHA512

              fc65d9c85503ff2a3444a6b57abe376ad78d8f476ebbc1d51e7f4bbbbc7e3a3ae1fdf4d00ef9198e4f9a356585fbdff1d932ffd95606a575dfc192fb26e40cf9

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              41c3ae502ac3065fac7c639a05593328

              SHA1

              81500852b1480a245658fb7f250f8dbd82e6e569

              SHA256

              9ce87edbb8127ef12a7f5b72dddf75cdcbd52db86ecd3e145bc6af50e53b3722

              SHA512

              481f808dea1c39b0d4c8812ed0aa7ece07426718bd594134977c9097fac5e3237496ea0276f66d345434d01003ff8d60727017bc815830230b38e8cb8248818e

            • F:\$RECYCLE.BIN\S-1-5-21-355664440-2199602304-1223909400-1000\_desktop.ini

              Filesize

              9B

              MD5

              7ef570b2b21e58fd906ef1a980d64425

              SHA1

              18502489f652e74f8972bbfa100d5c163d719ab7

              SHA256

              c3ce1b9216b58ac7d9ed3b93e5e3a1d6a2473b53b5bc1f008a621def49517055

              SHA512

              e1175d861a79d62b85cd18661375f1c956dcc97e958765dc225f3aa4b0f0100ca9e17b9c61f5e18fc2a96e5167c0563f60645033aff1be1ec2f372c1b9a8b35f

            • \??\c:\0ef4f3eb56f0d59590659ce2f2176d\eula.1033.txt

              Filesize

              9KB

              MD5

              99c22d4a31f4ead4351b71d6f4e5f6a1

              SHA1

              73207ebe59f6e1073c0d76c8835a312c367b6104

              SHA256

              93a3c629fecfd10c1cf614714efd69b10e89cfcaf94c2609d688b27754e4ab41

              SHA512

              47b7ec5fed06d6c789935e9e95ea245c7c498b859e2c0165a437a7bf0006e447c4df4beeb97484c56446f1dae547a01387bea4e884970380f37432825eb16e94

            • \??\c:\0ef4f3eb56f0d59590659ce2f2176d\globdata.ini

              Filesize

              1KB

              MD5

              0a6b586fabd072bd7382b5e24194eac7

              SHA1

              60e3c7215c1a40fbfb3016d52c2de44592f8ca95

              SHA256

              7912e3fcf2698cf4f8625e563cd8215c6668739cae18bd6f27af2d25bec5c951

              SHA512

              b96b0448e9f0e94a7867b6bb103979e9ef2c0e074bcb85988d450d63de6edcf21dc83bb154aafb7de524af3c3734f0bb1ba649db0408612479322e1aa85be9f4

            • \??\c:\0ef4f3eb56f0d59590659ce2f2176d\install.ini

              Filesize

              843B

              MD5

              0da9ab4977f3e7ba8c65734df42fdab6

              SHA1

              b4ed6eea276f1a7988112f3bde0bd89906237c3f

              SHA256

              672621b056188f8d3fa5ab8cd3df4f95530c962af9bb11cf7c9bd1127b3c3605

              SHA512

              1ef58271cdedbdc53615631cc823483f874c89c2d62e0678de9d469a82bd676eb8abd34656caa5128b7edb0eb24dbf0992e5e571a97f7782c933b2be88af3144

            • \??\c:\0ef4f3eb56f0d59590659ce2f2176d\vc_red.msi

              Filesize

              236KB

              MD5

              d53737cea320b066c099894ed1780705

              SHA1

              d8dc8c2c761933502307a331660bd3fb7bd2c078

              SHA256

              be6288737ea9691f29a17202eccbc0a2e3e1b1b4bacc090ceee2436970aec240

              SHA512

              0af685e4ffb9f7f2e5b28982b9cf3da4ee00e26bd05e830d5316bce277dc91dfee3fe557719ab3406ad866d1ce72644e7a5400dcd561b93d367e12eb96078ffe

            • \??\c:\0ef4f3eb56f0d59590659ce2f2176d\vcredist.bmp

              Filesize

              5KB

              MD5

              06fba95313f26e300917c6cea4480890

              SHA1

              31beee44776f114078fc403e405eaa5936c4bc3b

              SHA256

              594884a8006e24ad5b1578cd7c75aca21171bb079ebdc4f6518905bcf2237ba1

              SHA512

              7dca0f1ab5d3fd1ac8755142a7ca4d085bb0c2f12a7272e56159dadfa22da79ec8261815be71b9f5e7c32f6e8121ecb2443060f7db76feaf01eb193200e67dfd

            • memory/4036-84-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4036-70-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4036-77-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4036-99-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4036-103-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4036-1205-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4036-1294-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4036-12-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4036-4859-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4068-78-0x00000000024F0000-0x00000000024F1000-memory.dmp

              Filesize

              4KB

            • memory/4068-66-0x00000000024F0000-0x00000000024F1000-memory.dmp

              Filesize

              4KB

            • memory/4720-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4720-8-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB