Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 18:19

General

  • Target

    5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe

  • Size

    711KB

  • MD5

    6ec7f34f745cea0d1c5581ad3b082ce3

  • SHA1

    b811b8cee7b67789347f8992f1adecc13aceabaa

  • SHA256

    5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee

  • SHA512

    73baa2cb53600e926b3e2cc5925a8ecd8dc541b4be6548d00c5d653d7e7219f1ca30e4af8a4d38245354ddca4d23d959827644705e98d2ec857e40aa79d5f268

  • SSDEEP

    12288:3pKfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:3pGLOS2opPIXV

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe
      "C:\Users\Admin\AppData\Local\Temp\5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1216
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\$$a2E22.bat
        3⤵
        • Deletes itself
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Users\Admin\AppData\Local\Temp\5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe
          "C:\Users\Admin\AppData\Local\Temp\5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe"
          4⤵
          • Executes dropped EXE
          PID:2768
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1676
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1164
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            5⤵
              PID:2760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      252KB

      MD5

      4e048bca0fcd41a271607320727c8c41

      SHA1

      80e2ede1d6e30f031ecbec1d36510b58ef0e2895

      SHA256

      28ba4edf8042fe1848f73b4a2df0fb60bb486bd2c5a37edffb45e4313deb9f30

      SHA512

      c4f055a4b099b9666fd153499ce9b622c4b2ab0f7a6cdecff660cb108715e48d4fce4d321254d9ccac01acb56f528e6cea0fab8dbb280484556b6ab0d24d6824

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      472KB

      MD5

      88eb1bca8c399bc3f46e99cdde2f047e

      SHA1

      55fafbceb011e1af2edced978686a90971bd95f2

      SHA256

      42fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428

      SHA512

      149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728

    • C:\Users\Admin\AppData\Local\Temp\$$a2E22.bat

      Filesize

      722B

      MD5

      21ae0241fad4d7335565aceea961b66a

      SHA1

      c806f20f1e2780fae58d528046bae21429256d53

      SHA256

      6961532a779962c6093a96f1c53d599e345347550589776e793445c0387ccee6

      SHA512

      ec14c07774ab8b985b0c8ba7b215a8b09ba03297ef7fc1e47d91be11d45eebf9caa0eb3a719e1bd2264a1df6ec69b8f42ec74e6e01d2ebef955c9ad1cf7780f2

    • C:\Users\Admin\AppData\Local\Temp\5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe.exe

      Filesize

      684KB

      MD5

      50f289df0c19484e970849aac4e6f977

      SHA1

      3dc77c8830836ab844975eb002149b66da2e10be

      SHA256

      b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305

      SHA512

      877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38

    • C:\Windows\Logo1_.exe

      Filesize

      27KB

      MD5

      8c37f7c2553a1bea86b33630faf6bf88

      SHA1

      38c0360645191f06c7f5ef65d0f12e0c92f4d977

      SHA256

      84e3f53308957006d9a3b2975af76693883b04fff9dd2970618ac336b82d1dfc

      SHA512

      590e6531921ecc3b70c8895f19c469ccedf5d0f34686063389b136df86521df6db4c430b062c4f67a399aa9d93f9c31dab9e1c7a69ee00fa84e6120d3c01175c

    • F:\$RECYCLE.BIN\S-1-5-21-268080393-3149932598-1824759070-1000\_desktop.ini

      Filesize

      8B

      MD5

      d970a2bfcaa076939c06270d1a48dec8

      SHA1

      7a558f4d64c3e98bcfd2af83f28e6fbd207a39e1

      SHA256

      bdc6872f9a0a011a670907f0fedad9b88e283c5af545cf9f6bd73c3709967d44

      SHA512

      ea4c16930628455852ce343f8ae248b6df869b8da10b10928ebb802129f73d9761971811de317c7d3121b815340027782ec15d385d1d2d7df8fd0a46b62974c2

    • memory/1204-34-0x0000000002510000-0x0000000002511000-memory.dmp

      Filesize

      4KB

    • memory/1216-16-0x00000000001B0000-0x00000000001E5000-memory.dmp

      Filesize

      212KB

    • memory/1216-0-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1216-18-0x00000000001B0000-0x00000000001E5000-memory.dmp

      Filesize

      212KB

    • memory/1216-17-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1676-43-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1676-49-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1676-95-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1676-101-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1676-669-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1676-1879-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1676-20-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1676-2471-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1676-3339-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1676-36-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB