Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    03-05-2024 14:22

General

  • Target

    9f8a85884e7dc3c2299fa60281206818bc4b7c25908dd1d77da9b7b4ae17fa80.exe

  • Size

    2.8MB

  • MD5

    17b9b8ea2a0b78308ec3efd866f96af5

  • SHA1

    da3ba0305ad3f6b422734005c1302251d8a09d54

  • SHA256

    9f8a85884e7dc3c2299fa60281206818bc4b7c25908dd1d77da9b7b4ae17fa80

  • SHA512

    f0ca4fb079f19a27c73962ee241f8e1e12e2d6acf7c52b3b273b72a3ff5367bf367f7c25de93b1af39ce57808598940b9b9bcdb4c117ccb7d03a43bf2adb6cc0

  • SSDEEP

    49152:y7z6gLKJuMarhVnMFwTH8/giBiBcbk4ZxZ2DqFeVMhuxcPh:3d1XdhBiiMa7

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1224
      • C:\Users\Admin\AppData\Local\Temp\9f8a85884e7dc3c2299fa60281206818bc4b7c25908dd1d77da9b7b4ae17fa80.exe
        "C:\Users\Admin\AppData\Local\Temp\9f8a85884e7dc3c2299fa60281206818bc4b7c25908dd1d77da9b7b4ae17fa80.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a26F1.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          PID:2148
          • C:\Users\Admin\AppData\Local\Temp\9f8a85884e7dc3c2299fa60281206818bc4b7c25908dd1d77da9b7b4ae17fa80.exe
            "C:\Users\Admin\AppData\Local\Temp\9f8a85884e7dc3c2299fa60281206818bc4b7c25908dd1d77da9b7b4ae17fa80.exe"
            4⤵
            • Executes dropped EXE
            PID:2712
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2768
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2540
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2588

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        24283b222a74d715d8e092d15038a868

        SHA1

        628b219145fda6f32ceab3c1cc5071384ea8e3c5

        SHA256

        25a38261dbe7abebd43760da429d01264e764d198ce6a07ab91aecf1d031cdad

        SHA512

        9390746b7eb3242771671f53c5b26cf1548325fb53257402f1e0653962e4e35da8cde615efb4d6f997c9a78580bdb1222857c01da2d7d02e4483e258aa9b960b

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a26F1.bat

        Filesize

        722B

        MD5

        cad6856afc2426d3f7c765593def46a6

        SHA1

        228137cc18a68d5d95e47159bb4f5f4fcea6b105

        SHA256

        79ca5db5a8f8593975e96d97f73b39191345ff82d269e295da83bdfeb32bd1c4

        SHA512

        72db48044701f47c43346463e3be3a907a6435475d8cf9fdbacd1f7b4a76d604005bf2afdd035bedd08e1df09c2621a6bc2872d7b2b8cb80448c12bd01f7cfa4

      • C:\Users\Admin\AppData\Local\Temp\9f8a85884e7dc3c2299fa60281206818bc4b7c25908dd1d77da9b7b4ae17fa80.exe.exe

        Filesize

        2.8MB

        MD5

        095092f4e746810c5829038d48afd55a

        SHA1

        246eb3d41194dddc826049bbafeb6fc522ec044a

        SHA256

        2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

        SHA512

        7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        6f0c2f9883c615873a528106e6c3297d

        SHA1

        5a6e57408fa9050f489327dd8bed1bdda1e28f4e

        SHA256

        44962a9be3407c4890486cf7f87be01fb11b1f5f5b4390b7c748e4d0273040e2

        SHA512

        9a74a8e3af24b6bfb248152638079c615598dd51e18cc04769fa63e35ace376c087f597c9a8b39685f6b55a9474e83bea10204d523a976dc1daa2f691341897f

      • F:\$RECYCLE.BIN\S-1-5-21-2721934792-624042501-2768869379-1000\_desktop.ini

        Filesize

        8B

        MD5

        0282826728a8bfe9c3f290391e4f323c

        SHA1

        ab69946ecc2824015e04a669b8434e8eb2a658aa

        SHA256

        0c3ddb95f5308286721e2d55c16a3170674b54fc8d17c1f02bee1b6850ce2ee9

        SHA512

        fde2cb3a9b14fa79fdb7615c094a85aee3baf100511872c0b3986349edefe5a2dc4513929587852c1672e9632c8a6c95284fab82397133dec597bb8fe618fb0e

      • memory/1224-29-0x0000000002DF0000-0x0000000002DF1000-memory.dmp

        Filesize

        4KB

      • memory/2764-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2764-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2768-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2768-44-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2768-90-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2768-96-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2768-1208-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2768-1849-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2768-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2768-3308-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2768-31-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB