Analysis

  • max time kernel
    150s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-04-2024 23:14

General

  • Target

    a5954e7b06481dc25f525a7bb4c62015368acfbc2d99634940e62d8a34e15ab9.exe

  • Size

    29KB

  • MD5

    f600d3b05604eed2eb0e978ecaec3752

  • SHA1

    c7e79069cd2c171d732cf22ad3c471200b8261a8

  • SHA256

    a5954e7b06481dc25f525a7bb4c62015368acfbc2d99634940e62d8a34e15ab9

  • SHA512

    81fbc800450084e269e715130f3097c432ced7dcffaafffcc3c9b7f42fabc8ac24bc4b2d12f36cc84a1427335abc728fb53f648bb0e874ba582f87e73d56ff51

  • SSDEEP

    384:NbbbKDvJ3IZrJY1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzL:pGJYZ+16GVRu1yK9fMnJG2V9dHS8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3464
      • C:\Users\Admin\AppData\Local\Temp\a5954e7b06481dc25f525a7bb4c62015368acfbc2d99634940e62d8a34e15ab9.exe
        "C:\Users\Admin\AppData\Local\Temp\a5954e7b06481dc25f525a7bb4c62015368acfbc2d99634940e62d8a34e15ab9.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2232
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:372
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2268

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

        Filesize

        247KB

        MD5

        490b33a98d5ebc7a17a6566fba0c7ef1

        SHA1

        9ac668ab118d7db0d51b711935be6386c461ab7e

        SHA256

        6b3411f97fb00fc59098fc6b6c9d0c2642df5d5e3a12b7b113923ef33f1ce78d

        SHA512

        9bfcc8564261cb40f1d4db53fad1f1587d5959409ae4c9628b8951415a54e382e1b5bb8b3617e53135b41ffaafcb842efcb7525feea99f88df83e48ff6f1072f

      • C:\Program Files\dotnet\dotnet.exe

        Filesize

        173KB

        MD5

        1f7051b575be5737e95f73f9aac86a62

        SHA1

        bec6c037a27297b89f8e71b2f5672153bb512008

        SHA256

        9fc85bc356767616b29cccd5fdb1258f3aa1b2981896dcd7769fd7f40df512d5

        SHA512

        d13dfb19d90bada4461f83c46c1593426b9f30e8cee47917d902b530eea0e97c5c98f4f056a3b16fbc63e8740500da2d5c80a0e3be07ed02dd359a9f22e85fd1

      • F:\$RECYCLE.BIN\S-1-5-21-877519540-908060166-1852957295-1000\_desktop.ini

        Filesize

        9B

        MD5

        3441ca64b7a268fd1abb0c149aa9e827

        SHA1

        977a6be7624a5ff4ea1de4f422b44b4974c17827

        SHA256

        fafa54a384b4b9bfe970b0e803afe0c0284021acca503892961170d49985dd99

        SHA512

        84d8adce555267049d33544c4402eaa9bb3ff2022fd76cd619e4cb1fd544c5825cd7769065dd525b58e3befd579d3dd11ec2e0032907ff7dd36f83975b5b5848

      • memory/2232-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2232-5-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2232-12-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2232-18-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2232-22-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2232-1222-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2232-4786-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2232-5249-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB