Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-05-2024 22:24

General

  • Target

    d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe

  • Size

    2.8MB

  • MD5

    50e7b8546b68608b3799cccca6dcd27f

  • SHA1

    61180f195f6007cd883848bf9753857ed01d706e

  • SHA256

    d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b

  • SHA512

    89c4a1832470822c05dddda167ea130a98df25526cd8c1850b82b0222a9c6f90634a1cc42cb27141fde58435cfe85344f9828c18f1861586e8c37f85f62fdf17

  • SSDEEP

    49152:E6gLKJuMarhVnMFwTH8/giBiBcbk4ZxZ2DqFeVMhuxcPh:hd1XdhBiiMa7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3356
      • C:\Users\Admin\AppData\Local\Temp\d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe
        "C:\Users\Admin\AppData\Local\Temp\d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1380
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBAC4.bat
          3⤵
            PID:32
            • C:\Users\Admin\AppData\Local\Temp\d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe
              "C:\Users\Admin\AppData\Local\Temp\d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe"
              4⤵
              • Executes dropped EXE
              PID:4408
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3720
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1220
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:1016
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1400 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:4864

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\StartPing.exe

            Filesize

            320KB

            MD5

            1b1f4852cd8da453c24ef624dfdfcfda

            SHA1

            21e8e37021c720641f736b7af42e89e8d6101a8a

            SHA256

            fcf5e6d14efb92a52b7e2cf0e1a9917ee4c4fd2fefac41f6a02f9f0c4b7a95a0

            SHA512

            e10137905930ffa2e20c7d16a6e8eba795dcbc86a3ef1eec124a9eef59bd9dd05e92836ec8c2eaaf68f933f9290f017af67a499efc06edc53e7e54c56a3ef1f3

          • C:\Users\Admin\AppData\Local\Temp\$$aBAC4.bat

            Filesize

            722B

            MD5

            31ea4c4fa07ca2c67c82725a73fb647c

            SHA1

            bbdba17a58622d1b053ac3033958f75812fde3bb

            SHA256

            d5494a0eea4cc1a3ebbadeded7021e97510f7a68bea0ee360a6eb5ff07a53f29

            SHA512

            1d1a0775ff738cf4ba6eb437347f9aa99bac832636f7d90dade4f5145e04dcea35da9607945e188224aa6b21853cd8287c1a609384ee6048cc4d85bd293e13a1

          • C:\Users\Admin\AppData\Local\Temp\d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe.exe

            Filesize

            2.8MB

            MD5

            095092f4e746810c5829038d48afd55a

            SHA1

            246eb3d41194dddc826049bbafeb6fc522ec044a

            SHA256

            2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

            SHA512

            7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

          • C:\Windows\Logo1_.exe

            Filesize

            29KB

            MD5

            0c2a885df5fa2ebcae91564ec5088618

            SHA1

            fb00dcefb9f0655bc23c1a1673df3b19fe71935b

            SHA256

            565163946b3944c4717d9ab9900dd3f683ebd0d7f8573b96d2f667c34e514fba

            SHA512

            cc9d7f60b562033e619eb1ed410c8cd176a7524d89bacf0eced9d7b434624538626f75d887d0ee5f0f64617524dc894c0b9adcd9ca52beec0e09473295fa6768

          • F:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\_desktop.ini

            Filesize

            8B

            MD5

            0282826728a8bfe9c3f290391e4f323c

            SHA1

            ab69946ecc2824015e04a669b8434e8eb2a658aa

            SHA256

            0c3ddb95f5308286721e2d55c16a3170674b54fc8d17c1f02bee1b6850ce2ee9

            SHA512

            fde2cb3a9b14fa79fdb7615c094a85aee3baf100511872c0b3986349edefe5a2dc4513929587852c1672e9632c8a6c95284fab82397133dec597bb8fe618fb0e

          • memory/1380-11-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1380-0-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3720-27-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3720-20-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3720-34-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3720-37-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3720-39-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3720-43-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3720-8-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3720-1183-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3720-1578-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3720-2902-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB