Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 18:16

General

  • Target

    d7fe0c1d9fccb6f76e98d30e5bd60cb1160ab002de561b6208c8ea5f678034b6.exe

  • Size

    1.3MB

  • MD5

    59033e2a88aa99d28974153af52814fa

  • SHA1

    098e86fcb4da296d2b8c27fa7e78aabcb261bd9c

  • SHA256

    d7fe0c1d9fccb6f76e98d30e5bd60cb1160ab002de561b6208c8ea5f678034b6

  • SHA512

    4516a6bed2104d967d1da3168a67e7578dc8c2b00aa32ea429ec2863b67b12ed80ddd000ad501bea38e85e95e61e1b1094018fe7872edd47ac0df592b16493a4

  • SSDEEP

    24576:A6teboKwzipCcbNHjjpbYsxbL7BvwswqLDA:A6teBOFeJjt8gb5rU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1224
      • C:\Users\Admin\AppData\Local\Temp\d7fe0c1d9fccb6f76e98d30e5bd60cb1160ab002de561b6208c8ea5f678034b6.exe
        "C:\Users\Admin\AppData\Local\Temp\d7fe0c1d9fccb6f76e98d30e5bd60cb1160ab002de561b6208c8ea5f678034b6.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a2952.bat
          3⤵
          • Deletes itself
          PID:1344
          • C:\Users\Admin\AppData\Local\Temp\d7fe0c1d9fccb6f76e98d30e5bd60cb1160ab002de561b6208c8ea5f678034b6.exe
            "C:\Users\Admin\AppData\Local\Temp\d7fe0c1d9fccb6f76e98d30e5bd60cb1160ab002de561b6208c8ea5f678034b6.exe"
            4⤵
            • Executes dropped EXE
            PID:2568
          • C:\Users\Admin\AppData\Local\Temp\d7fe0c1d9fccb6f76e98d30e5bd60cb1160ab002de561b6208c8ea5f678034b6.exe
            "C:\Users\Admin\AppData\Local\Temp\d7fe0c1d9fccb6f76e98d30e5bd60cb1160ab002de561b6208c8ea5f678034b6.exe"
            4⤵
            • Executes dropped EXE
            PID:2560
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2340
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2528
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2428

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              254KB

              MD5

              182a1efac234be152c673103584b3add

              SHA1

              1606a8d53426ba27ede4b18d13acbbef1697efeb

              SHA256

              451c03fad8659d2d4599148b14036f011eee1b09148a92c788d838aa372a8ced

              SHA512

              da708d9792c5a1cb66113400529c8c2dc548299fe90022bde3c7c03c3e0a7c5926b8079ea3a6065801ab01e2418cbffffac667ba72bdb650f21aba9b05a0b2b8

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              474KB

              MD5

              8916a72b93d5fd4c6e63c8b36279b230

              SHA1

              83e3b1bfd579fbf998b2db5428819a10b25d0ad5

              SHA256

              537975086833d580dd97beff9e712f64cc41d0bf20cac16c1a04be24ed3af27b

              SHA512

              2c61138cc8800649890179c080c228da22ab9fe27f3fc1a83c52f57b349a5d3c61fc9d4a64ab53e362376f63edf99d30f0994b6070f97d09ec4868efaf8293b4

            • C:\Users\Admin\AppData\Local\Temp\$$a2952.bat

              Filesize

              722B

              MD5

              ec6259465b5c821c07e26fa0e02579ee

              SHA1

              04c95caf1d6b6dd4bf434c8240b4da669a644478

              SHA256

              f9277a919a9bab128307e9ad08427079551e9abd7780a51eea6d8e12a8d7f204

              SHA512

              ea3fa80af9d54b502d918182859531de514d6a8659d70a4e5f8ebbcfa29bd778c25649df72a342ce9c3570d1a72c1a99f50d733f2c2cc1ea8f1e7fe31877dd01

            • C:\Users\Admin\AppData\Local\Temp\d7fe0c1d9fccb6f76e98d30e5bd60cb1160ab002de561b6208c8ea5f678034b6.exe.exe

              Filesize

              1.2MB

              MD5

              1a9063c7e9f3d1225b07a64e3bf9c7ac

              SHA1

              4ebf9f7b41c73b16a220006a4ddd508d1e796095

              SHA256

              afb668011c09b9460981ab3c82c998b50efafbf1197cb0ca7c9e46d67c00b817

              SHA512

              d5e19362bf493f8783fc8b35158629405c246d8ab004be2b2141654dcd1f0048e86c2a22bfb3fbda9268b67de80c9520bbf5d14291ae9394272d5ad8730ba09c

            • C:\Windows\Logo1_.exe

              Filesize

              29KB

              MD5

              ec97bb30cb318c88de256c47be810caf

              SHA1

              573eaca1e8579a591e68f29ecf10f2721eb48df8

              SHA256

              befdbd9bbc7c5452387811839a4e884cb49b62a35b94c00b7f56ce12811ee48a

              SHA512

              d8123682e897720a6974a2a6fb78ec67116965859165880128433944f697791925320b818b98f95c07dcfbeeedb3b0797111c92cbfccdb2d6d29f521c577f7c0

            • F:\$RECYCLE.BIN\S-1-5-21-1298544033-3225604241-2703760938-1000\_desktop.ini

              Filesize

              8B

              MD5

              5979a5ab5d6ce7068aff133101a79c52

              SHA1

              8ec7729d3782fc978cc50f9b3217fc8309ae7733

              SHA256

              6b009cde89047fc55503dc0b3649d341e98320a0438d044bc8fb068d0c919ef1

              SHA512

              213c10a6b5b394b2736619ed0418ba715e643dfa08b5827757dd64b1718ddec6a44822ff4b192bd594997cc13bc2027d03c029537ed2f12591b370ec1f242f2d

            • memory/1224-66-0x0000000002990000-0x0000000002991000-memory.dmp

              Filesize

              4KB

            • memory/1344-60-0x0000000000660000-0x0000000000661000-memory.dmp

              Filesize

              4KB

            • memory/1460-17-0x0000000000230000-0x0000000000266000-memory.dmp

              Filesize

              216KB

            • memory/1460-16-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1460-15-0x0000000000230000-0x0000000000266000-memory.dmp

              Filesize

              216KB

            • memory/1460-0-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2340-71-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2340-85-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2340-130-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2340-136-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2340-721-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2340-1889-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2340-78-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2340-3349-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2340-19-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB