Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 00:14

General

  • Target

    45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe

  • Size

    44KB

  • MD5

    f0a57d00da9b4c12642b7df030dd6fea

  • SHA1

    2f3559c850da804a80864559b00bb50aa4e1f481

  • SHA256

    45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2

  • SHA512

    f9ab48b48bb5fb09492e57e05d3a20da9093da3335c25c49974f9427627f08e3000aee7e38248d66d9654e6bd4885ca3a9003dee27db8d6d5ab4036ba5b25c6d

  • SSDEEP

    768:+1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLpLofjHFzzaed9z:YfgLdQAQfcfymNdLofLFzzL/z

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe
        "C:\Users\Admin\AppData\Local\Temp\45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a5AC.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1812
          • C:\Users\Admin\AppData\Local\Temp\45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe
            "C:\Users\Admin\AppData\Local\Temp\45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2536
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 520
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:1964
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2120
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2688
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2696

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        ba55d6ba6a68791d94429483c57e588d

        SHA1

        30ef1d29307c594cb879b6effc80daab6c6e2b46

        SHA256

        03ea9761b0ddbf5d7389aaabfc63907cfca83f346effb0b92c67372a1f5ae81d

        SHA512

        373b8bbcd9a69c86571896989488fda9f2d24967e3cd988b43c6a0c69e363a4ffcb0fae81d58a938cc3fc594a9c4f4429d629ea4c6c13963788bc5d6b10d5fc1

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a5AC.bat

        Filesize

        721B

        MD5

        ced50089b2b4ee555f26796b34818e70

        SHA1

        2ebe0f783ca219e737dc44f98d39c7831e93d81e

        SHA256

        d10cc2c80bf3d176876c414fa847a87d4e2545fd92eed48c5b6e5c7669d8b181

        SHA512

        f1cb137478656faae23d12c6e2fc3944fe8c44b2671cd7892ab6998d53c589dc78ad8c9c687b58009aaf5a36c451ebf7802797d1b5d4609caf1d2c1e1226fd78

      • C:\Users\Admin\AppData\Local\Temp\45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe.exe

        Filesize

        17KB

        MD5

        69bc571d24389e4c5078ae113adbeae4

        SHA1

        c8f90d5e6f22dfb443de9c57da39773c8b91627b

        SHA256

        c5724e38c861de7ba35b6cd2c87e35e5c407b6d3680eda3bbd32bdcba5307901

        SHA512

        ddad40c645829b2c78e3e29bb2a0f2edb4c9aba2996fe98558662b09305ed6aad50d2e7bdda17d1ffa4f75685fdc592c538ccf7867980c28683d40f113e953ba

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        53f6a9b44b3d144149d4cf94458629c1

        SHA1

        b5b3a4ee1466cb9dffb334fd7c209981e05d2a92

        SHA256

        fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663

        SHA512

        436ca1fb0d44a0de231bdcb6b9f508f424e1cec454c4bbe2949c6d255cd0cf264fbaa620322839bb3253a9130ddb78769ec54880282bc2479b196cb9625d1b81

      • F:\$RECYCLE.BIN\S-1-5-21-481678230-3773327859-3495911762-1000\_desktop.ini

        Filesize

        9B

        MD5

        3441ca64b7a268fd1abb0c149aa9e827

        SHA1

        977a6be7624a5ff4ea1de4f422b44b4974c17827

        SHA256

        fafa54a384b4b9bfe970b0e803afe0c0284021acca503892961170d49985dd99

        SHA512

        84d8adce555267049d33544c4402eaa9bb3ff2022fd76cd619e4cb1fd544c5825cd7769065dd525b58e3befd579d3dd11ec2e0032907ff7dd36f83975b5b5848

      • memory/1200-36-0x0000000002F90000-0x0000000002F91000-memory.dmp

        Filesize

        4KB

      • memory/2120-2351-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2120-1881-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2120-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2120-3341-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2120-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2120-98-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2120-960-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2120-104-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2120-53-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2220-12-0x00000000001B0000-0x00000000001E4000-memory.dmp

        Filesize

        208KB

      • memory/2220-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2220-17-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2536-29-0x00000000011A0000-0x00000000011A8000-memory.dmp

        Filesize

        32KB

      • memory/2536-46-0x0000000073F90000-0x000000007467E000-memory.dmp

        Filesize

        6.9MB

      • memory/2536-28-0x0000000073F90000-0x000000007467E000-memory.dmp

        Filesize

        6.9MB