Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/04/2024, 18:24

General

  • Target

    575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe

  • Size

    1.9MB

  • MD5

    f35a9284fa9d4f9c17b2f07f084d12e1

  • SHA1

    4575a15e2ac462188fd0363d497e9b1490b43695

  • SHA256

    575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc

  • SHA512

    93a8971f2fc2213f88e694fb8c52b192c3a3ffe4c47915bfbc7c664b98048f401f47095c0d9196b6944426789c6d772ec93d89ed903d07df2cf7070ff896f063

  • SSDEEP

    49152:S7S40cscbgsmEHafDgPvII13CMPzsP2q7F5kS:aPzsP2DS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1284
      • C:\Users\Admin\AppData\Local\Temp\575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe
        "C:\Users\Admin\AppData\Local\Temp\575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1520
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a2481.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1936
          • C:\Users\Admin\AppData\Local\Temp\575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe
            "C:\Users\Admin\AppData\Local\Temp\575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe"
            4⤵
            • Executes dropped EXE
            PID:2100
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2332
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3068
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2568

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        585299d6e0c75f1d3a3a6e2996e6acf4

        SHA1

        f1c15b113e03eb44a81da2cd56f4c3d9f5bbc215

        SHA256

        dace6ccccaad68170a6150c96034951787e5eeef6709db34d85b8dd0f2c528e5

        SHA512

        991142dae0257e069454c2d41616e6e6c1252be960ea63884c4c92770b67ee1434d7091a705076230c675d4dc42a815cece1662bdd00d1c06d4cdf677c3c20d5

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a2481.bat

        Filesize

        722B

        MD5

        bd411130af266c965cbfa258a1588df9

        SHA1

        d32fce9f9b2770dfd4c865002ea00fd6fd80cdac

        SHA256

        649b41f27775484d203c1d5a9df030c0eb973572c8e756f0a7a7c57ca01c426a

        SHA512

        ffc92d3ea0802b3e8d3ff152a41c6d9328b45d8f41a402db2085b4d5a3be0740ad773f24af99ad34d7beb9b83b712b006692dcaefe7d835b051dc155d3a30265

      • C:\Users\Admin\AppData\Local\Temp\575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe.exe

        Filesize

        1.9MB

        MD5

        52176ef102c39d6912a5256535cf629b

        SHA1

        2cf33b2512df78ac047f0d117c6952478c4b057c

        SHA256

        4750d81cae87f8e9a6e4daa76bfef5772d8c8b99de45396491ebafada78e5a34

        SHA512

        76a268a5a8ae0170bb0c655d31872cf7e9f67395da37b691732d1e6a8db1c96c18c5a3019ee7decea8848a818642afee81ba0d7ec5a7cb1305454f13953d7347

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        073d37b425ac83ddebb5816919f7d353

        SHA1

        f154a0f9e3c30903aca7056ebd6d837f3989db6d

        SHA256

        e16c12380ba4ff0a472b08df28efdba5fd3de72a2c04dc141ad9792e3d7b902d

        SHA512

        f57fe35ec2a67a68cb6601488def77b510f8a44cbadc42d6517bd7da4049aa0b7becb8c546953783a499fb91d3572a1fe28dca01e48184ffcd43206fc638bd47

      • F:\$RECYCLE.BIN\S-1-5-21-2297530677-1229052932-2803917579-1000\_desktop.ini

        Filesize

        9B

        MD5

        7d02194d5f21d1288ee3e3f595122aba

        SHA1

        68e51fcc75148bf51da5ad67c7137b85946fc393

        SHA256

        a4da2cd5e1bd5b7cc915b0572d2805cb074c16122fa7e5a41fbc1203aafc3416

        SHA512

        b5aba933dbbe76d9c49da7e4bd9aa8449f164d1a6563feb65e795fd497f42a5c8cc317186adf817990a180e46499987a7403b68b0b089a38ccda0fc9f2dd6c1c

      • memory/1284-31-0x0000000002E80000-0x0000000002E81000-memory.dmp

        Filesize

        4KB

      • memory/1520-16-0x0000000001C60000-0x0000000001C94000-memory.dmp

        Filesize

        208KB

      • memory/1520-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1520-17-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1520-18-0x0000000001C60000-0x0000000001C94000-memory.dmp

        Filesize

        208KB

      • memory/2100-29-0x00000000001E0000-0x00000000001E1000-memory.dmp

        Filesize

        4KB

      • memory/2332-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2332-40-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2332-47-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2332-92-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2332-98-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2332-1653-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2332-1852-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2332-3311-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB