Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 04:19

General

  • Target

    53f2cde6306abd6208931637fe7b2d11e9d228dbeb9aeb752801820edfc87f23.exe

  • Size

    573KB

  • MD5

    d9310b049e6abc50d37c5cbab6568c40

  • SHA1

    74fa82cbc888cc95aae14d59327319ad925d6cb2

  • SHA256

    53f2cde6306abd6208931637fe7b2d11e9d228dbeb9aeb752801820edfc87f23

  • SHA512

    7fd232e22beb11324901f09d0df0fea348fea170e9ef13fc845776d849e9c8ea6a6231734a65b98d213b5ce1bff211e8ad04c0cc1af7912befbeb260efe0ade0

  • SSDEEP

    6144:wPuJpE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQG:wZ7a3iwbihym2g7XO3LWUQfh4Co

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3424
      • C:\Users\Admin\AppData\Local\Temp\53f2cde6306abd6208931637fe7b2d11e9d228dbeb9aeb752801820edfc87f23.exe
        "C:\Users\Admin\AppData\Local\Temp\53f2cde6306abd6208931637fe7b2d11e9d228dbeb9aeb752801820edfc87f23.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1168
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6CD3.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1580
          • C:\Users\Admin\AppData\Local\Temp\53f2cde6306abd6208931637fe7b2d11e9d228dbeb9aeb752801820edfc87f23.exe
            "C:\Users\Admin\AppData\Local\Temp\53f2cde6306abd6208931637fe7b2d11e9d228dbeb9aeb752801820edfc87f23.exe"
            4⤵
            • Executes dropped EXE
            PID:5048
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4400
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3472
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4532

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        78b6be324c6fb118c467cb7bbada1c12

        SHA1

        86c599047ac6dab268769c21197969db18fd788d

        SHA256

        11e921aefa9e88ea6e0bf50e4a4f811778080cc06738221cba42252b78506d04

        SHA512

        b450aac9fb8c34ef2ad17e19007f313d0b3e69513621fb335b76d2a70070c2a118cffdaef296d4b2b876bd834639895883fb3c191bc66754fa74dc1cb563c4fa

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        573KB

        MD5

        d9310b049e6abc50d37c5cbab6568c40

        SHA1

        74fa82cbc888cc95aae14d59327319ad925d6cb2

        SHA256

        53f2cde6306abd6208931637fe7b2d11e9d228dbeb9aeb752801820edfc87f23

        SHA512

        7fd232e22beb11324901f09d0df0fea348fea170e9ef13fc845776d849e9c8ea6a6231734a65b98d213b5ce1bff211e8ad04c0cc1af7912befbeb260efe0ade0

      • C:\Users\Admin\AppData\Local\Temp\$$a6CD3.bat

        Filesize

        722B

        MD5

        ff27f213bcc64a1aa6087982d027ebb3

        SHA1

        ef749358b62e8a698760c7d7c8abf76b6e758ba8

        SHA256

        55535b462c8c830aaf03f38477d96fbb03daa188c4d4b64d9f547603e07a8d2c

        SHA512

        563f141c3e3f01e66291bd6cfa1f51716677ca313ac115f160deb0a790fe20b0d3383c97fafbe5c632ddb952d70c586b43f82c8d311594cce243688be04cb6bc

      • C:\Users\Admin\AppData\Local\Temp\53f2cde6306abd6208931637fe7b2d11e9d228dbeb9aeb752801820edfc87f23.exe.exe

        Filesize

        544KB

        MD5

        9a1dd1d96481d61934dcc2d568971d06

        SHA1

        f136ef9bf8bd2fc753292fb5b7cf173a22675fb3

        SHA256

        8cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525

        SHA512

        7ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        b3e41c1d311f698d8ffde877bdc3fe63

        SHA1

        7d8265115168f5e8c955a9cde5eeddc7f2b78f8c

        SHA256

        870af7f02411e1286ce4b2cd0a1b6d48c1f4a0c1017dd559334a6f23085cc0d3

        SHA512

        1fc32ac7c1e2b2a905d0f3261f844c424f6c340262930e101f9ca1c31773a303cbe951ca9e418115e1348a594be92d976424e5adb7877087698e5f36dc4d534d

      • F:\$RECYCLE.BIN\S-1-5-21-1132431369-515282257-1998160155-1000\_desktop.ini

        Filesize

        9B

        MD5

        c1decdd7d6df1d9437bb5f2bc5fe1486

        SHA1

        d71402dc8d37a148651cb5017219322267c7b922

        SHA256

        bd6d31806e5ebc86100e3c7ed2cf5348757149082d775fa986d41e8554ce8089

        SHA512

        ebbaed70f5d858508011ec3f251e16aa09c861b3d6dcc62ed28f293b37dfda2434b0e36f898bc62fca3107ee6356c77e5662a76085f191a63913013837cc0f07

      • memory/1168-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1168-8-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4400-26-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4400-32-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4400-36-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4400-19-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4400-1227-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4400-12-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4400-4792-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4400-5231-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB