Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 02:20

General

  • Target

    83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe

  • Size

    1.7MB

  • MD5

    0f5ca4b031a05d416da01c470a9304d7

  • SHA1

    f0fe6350a86914dfcf708513dc09f7b3210d66d3

  • SHA256

    83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631

  • SHA512

    af941f15ac7abe7cd73d6a37f9f8b8930026b4ffc2e378a1d4e9fc478eace777f7d39cb634371b4428140cf381c6fd1e7a3ce7177bcbceb664d8d044502e393b

  • SSDEEP

    24576:nOObVw4TaN1wd+ukCba4oXtgLhU3wEdmh58g:nOOh3aN4+uLbegmtGH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3332
      • C:\Users\Admin\AppData\Local\Temp\83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe
        "C:\Users\Admin\AppData\Local\Temp\83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3484
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aEA1.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1436
          • C:\Users\Admin\AppData\Local\Temp\83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe
            "C:\Users\Admin\AppData\Local\Temp\83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe"
            4⤵
            • Executes dropped EXE
            PID:1088
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4660
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2872
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1580
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4232 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:4392

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          254KB

          MD5

          da3a4d0479cb34cd1dbd864b9fe7afa8

          SHA1

          c819c28d044275ad62ee2bbf9cad9cdcf13ae537

          SHA256

          402ca106b4801356a8a0c2ba9abcf8a323b3193c68c82066cbdf50ce6c71be4d

          SHA512

          a0dae98bf119c57fb548475f3a7d52e68f952876f0420bb2fabda483565c7fe8e24368eb7a458932b207f66fdafc3e0f65599ae9dcb9a7b4756cc7558682b18c

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          573KB

          MD5

          c234fbedd69bda7f01772e5e0c88312f

          SHA1

          d016ab4a3a07bd9d50bbf2ecec1440230549acfb

          SHA256

          f2b7ee7688871677bbc519f133538d67cb5dcb9f3e9442b2ea52130a1e6b3d9e

          SHA512

          b0d9aaf029d6aa1b443961a72423c24af9457e0cc0cd20bf2e853c05bebf345731950c70a68c5151d6563f6aa78c72dbdf1dd3dc8d953f7101bc1a06d67e6bca

        • C:\Users\Admin\AppData\Local\Temp\$$aEA1.bat

          Filesize

          721B

          MD5

          9d170cbc25b8dca4a0f28cec471f7eb5

          SHA1

          cf8395272be8330a4af6ac100b8597433c0d24c8

          SHA256

          0e7ab58e9a64ff69d567f21abd548796f4699cc95b20551cce1cc9ab3eed22f8

          SHA512

          6be9360504fb8b7395ef1b89b6e288010acd736e66bc4c59aa3251f0e9a329e7d774e8492a1fdc00583b30f19aafbc274ea8b73efc1088cbe8a688ccc4dec9e0

        • C:\Users\Admin\AppData\Local\Temp\83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe.exe

          Filesize

          1.7MB

          MD5

          d36d79b8f55d32021c2ca5669ff5a552

          SHA1

          6cb6cbe0fe75f3b52c716ca2cef77fff8da2274e

          SHA256

          904b7660f3cb9fb85ebf8787fb2e1f81c2b5591b0a21eb5cb6dca18a54dc657e

          SHA512

          965a4e621b18dc22c7fd31e27e65b2c36a7f90832db8e3f4e0752da89b1489616c095bf72f72aa17dbb198c79b66b1e9c252dcc8f389aecd3da293e4e471a353

        • C:\Windows\Logo1_.exe

          Filesize

          29KB

          MD5

          9bcc3e645527978b32c6d1984175f69d

          SHA1

          d9dce23336396ddbfb4e54c207d755e9b8104b92

          SHA256

          3b15b041a301264dac387cd799e223d8d55f3652573aa7048a7bf4c01b5308e1

          SHA512

          a88275729c3768ca2ee9a9373bc5c97f1e70c5488de73ce1c46d5589978180608d44d87fa9e142b5f977d543cdd4130fb4fad1a4088bd65c39d448af1dbb5c6b

        • F:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\_desktop.ini

          Filesize

          9B

          MD5

          c1decdd7d6df1d9437bb5f2bc5fe1486

          SHA1

          d71402dc8d37a148651cb5017219322267c7b922

          SHA256

          bd6d31806e5ebc86100e3c7ed2cf5348757149082d775fa986d41e8554ce8089

          SHA512

          ebbaed70f5d858508011ec3f251e16aa09c861b3d6dcc62ed28f293b37dfda2434b0e36f898bc62fca3107ee6356c77e5662a76085f191a63913013837cc0f07

        • memory/3484-8-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3484-0-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4660-19-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4660-33-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4660-37-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4660-42-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4660-26-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4660-104-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4660-1181-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4660-1942-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4660-3567-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4660-10-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB