Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2024 11:17

General

  • Target

    2ed36909cdc60f43fd5a01748aac0c827e953197fa62690f7fba823dd6a38ea5.exe

  • Size

    88KB

  • MD5

    593f9af6df2dce288713ffa58afabd47

  • SHA1

    b55e28b3f960922ffa02bc05a92d7d4d7ee951d1

  • SHA256

    2ed36909cdc60f43fd5a01748aac0c827e953197fa62690f7fba823dd6a38ea5

  • SHA512

    4fd1fa47e71e8c2ffc7a2e05af22491b575e57d4477321b17c8c103967c63c719b31e34d4acef893d35bece3f2323ac4b121e023fc72e28ffb5e1a8ec7dccd24

  • SSDEEP

    1536:pV3SHuJV9Ntyapmebn4ddJZeY86iLflLJYEIs67rxo:pVkuJVL8LK4ddJMY86ipmns6S

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1352
      • C:\Users\Admin\AppData\Local\Temp\2ed36909cdc60f43fd5a01748aac0c827e953197fa62690f7fba823dd6a38ea5.exe
        "C:\Users\Admin\AppData\Local\Temp\2ed36909cdc60f43fd5a01748aac0c827e953197fa62690f7fba823dd6a38ea5.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1136
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a9425.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2308
          • C:\Users\Admin\AppData\Local\Temp\2ed36909cdc60f43fd5a01748aac0c827e953197fa62690f7fba823dd6a38ea5.exe
            "C:\Users\Admin\AppData\Local\Temp\2ed36909cdc60f43fd5a01748aac0c827e953197fa62690f7fba823dd6a38ea5.exe"
            4⤵
            • Executes dropped EXE
            PID:2568
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2300
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2608
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2460

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        474KB

        MD5

        8916a72b93d5fd4c6e63c8b36279b230

        SHA1

        83e3b1bfd579fbf998b2db5428819a10b25d0ad5

        SHA256

        537975086833d580dd97beff9e712f64cc41d0bf20cac16c1a04be24ed3af27b

        SHA512

        2c61138cc8800649890179c080c228da22ab9fe27f3fc1a83c52f57b349a5d3c61fc9d4a64ab53e362376f63edf99d30f0994b6070f97d09ec4868efaf8293b4

      • C:\Users\Admin\AppData\Local\Temp\$$a9425.bat

        Filesize

        722B

        MD5

        6187c55ca6d27a5041da830d59cb712f

        SHA1

        436df133d5ad59aa4e6c5b5f07c8f17bbc41647d

        SHA256

        cf161fcbb68eab24e38ca9cbaa50ae5433f1b32ae74df4d2ceafb7b198f0f5e7

        SHA512

        a2f9fb0c3b9641bd094011c56cbffa3e647b4923f197e2df61eb0426e896f27973e96a9f3791659c33e34e4a303af4c454eee399a024799aabd8b4e193e8ddcf

      • C:\Users\Admin\AppData\Local\Temp\2ed36909cdc60f43fd5a01748aac0c827e953197fa62690f7fba823dd6a38ea5.exe.exe

        Filesize

        59KB

        MD5

        dfc18f7068913dde25742b856788d7ca

        SHA1

        cbaa23f782c2ddcd7c9ff024fd0b096952a2b387

        SHA256

        ff4ac75c02247000da084de006c214d3dd3583867bd3533ba788e22734c7a2bf

        SHA512

        d0c7ec1dae41a803325b51c12490c355ed779d297daa35247889950491e52427810132f0829fc7ffa3022f1a106f4e4ba78ed612223395313a6f267e9ab24945

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        311ca249c48658b3e01f82176b59a8cc

        SHA1

        b9567a029fde5763ec13b19c18f68f81e66d96ba

        SHA256

        1f8cc114bc9da14c15878f56128449a1a1c187d60f06fd539cc9dc94a263d5a9

        SHA512

        1dbd410bdbe3fc1f845bf41292e09cda11d04ef04b06794e625e13dac8b45d22b136d22a8dc4eea41bb28e7c222c525986ebda093c8e6a003714d98618d729d2

      • F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\_desktop.ini

        Filesize

        8B

        MD5

        1b16d2dbd4281ce4e4e5729c608dcb0b

        SHA1

        851e624080ba5598edb808d4b30fe2d74999ce18

        SHA256

        c9e46fb51d0588ca1e48ca66731e11992770b9b74a982f9bdbb6ce5b5b75d549

        SHA512

        cd1c4cf7c7871cb48ce735226b25f689b340037e6c992441e566161de7fca7410762d1a0c2670ee4b6546f7ee854d3219e0e2315c3e0387d9bbe3f08076b5a59

      • memory/1136-34-0x0000000000220000-0x0000000000256000-memory.dmp

        Filesize

        216KB

      • memory/1136-19-0x0000000000220000-0x0000000000256000-memory.dmp

        Filesize

        216KB

      • memory/1136-17-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1136-16-0x0000000000220000-0x0000000000256000-memory.dmp

        Filesize

        216KB

      • memory/1136-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1352-31-0x0000000002A20000-0x0000000002A21000-memory.dmp

        Filesize

        4KB

      • memory/2300-41-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2300-33-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2300-47-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2300-93-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2300-99-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2300-227-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2300-1853-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2300-3313-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2300-20-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB