Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 06:15

General

  • Target

    7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe

  • Size

    2.8MB

  • MD5

    97f05b2737c77a466b5436e813cbd1fa

  • SHA1

    2a45499eddb3b183db718f80938473b7c186ece2

  • SHA256

    7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2

  • SHA512

    b827eb67a24f20ca33da9516521181dc6a00dc1329b2ae6a6ada83ef3ae8addc73f6876d46e87fdae7184642db1f740f5abb89f409c1e985a911afa7be2a7edb

  • SSDEEP

    49152:+6gLKJuMarhVnMFwTH8/giBiBcbk4ZxZ2DqFeVMhuxcPh:zd1XdhBiiMa7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3472
      • C:\Users\Admin\AppData\Local\Temp\7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe
        "C:\Users\Admin\AppData\Local\Temp\7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1052
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4006.bat
          3⤵
            PID:3088
            • C:\Users\Admin\AppData\Local\Temp\7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe
              "C:\Users\Admin\AppData\Local\Temp\7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe"
              4⤵
              • Executes dropped EXE
              PID:3348
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3632
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3448
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:3016

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          254KB

          MD5

          b3166b305391ff0707753b23e6ea4225

          SHA1

          90f45b353714c2fa75bf6fc7d34c7b760a12fe0f

          SHA256

          528b16af9e651ffcc368ff7d0787d4096c8aaf60bef6cb8e9e921028aefea686

          SHA512

          51d20e8b39c654f0a16b5d3c7aed498c3faced12f2908e884febb6f780ffde5b4b5c9cb164019de87111c01c51839ac2d87605c4b35b887de90961b398a2173c

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          573KB

          MD5

          47fd19a57b03128c736fc2ff6d20ff63

          SHA1

          71223ce5c72427e4b81f6fc443a0d6c0f8c76ae5

          SHA256

          ce2835620f122f183d9138679b8bb14d73174fb07ba3762be7ee34c04d27b81e

          SHA512

          d9807b74448b4d0491c9b8a838f610bc39812affa1884d5eac3eb7503a45c2a76a13e2ae942b532e784cedf8c45d22f17f4aa004b65c10f9e83e04687dd82ee6

        • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

          Filesize

          639KB

          MD5

          c8d281da4c32df16eef470c27c8cb459

          SHA1

          00efc9f6844bfaa37c264b6452c6a7356638ab10

          SHA256

          058c81e5a07f2c6c33cf28dff71d07ad8f179046108d945159957e891bfd9c62

          SHA512

          e3c79e19f620068f668d4ebaa5097f1a95a30dabb8dce75f3787171dddbea9f684fc7ce8d1011a398f38084d7af96dd1ff9a02d25906aab9b13861b8363d24bb

        • C:\Users\Admin\AppData\Local\Temp\$$a4006.bat

          Filesize

          722B

          MD5

          8f93718003100b7e1e2545440b13f234

          SHA1

          bd224734b317ba66c6c6be3c6d7fad08ab2d0c66

          SHA256

          dfdbaebae2c7c50aba97faec7078b5bb953ce706e44931069843195e209e25b2

          SHA512

          b482448a171df6d5fa204ca69a6910052e218d2433b61194a02562150cd39376b91b357aa159f0cc81429489538135bb9a92e4d1356bc2ecbf9f9ccde38a964f

        • C:\Users\Admin\AppData\Local\Temp\7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe.exe

          Filesize

          2.8MB

          MD5

          095092f4e746810c5829038d48afd55a

          SHA1

          246eb3d41194dddc826049bbafeb6fc522ec044a

          SHA256

          2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

          SHA512

          7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

        • C:\Windows\Logo1_.exe

          Filesize

          29KB

          MD5

          c1154eebf193b34d928ac7a0d4d1425b

          SHA1

          e412ae088af8d3d6e268ae517e62dc7a7150bf2f

          SHA256

          fd38739477bdd63484e50d2b995923ab7da929db7fa69532e3293d8406f64b54

          SHA512

          017537aa4204c2c327024b4dc9bfa61a36a3f2b64a8898e890e83a33a83e237d2b9749e86b7517da5b265c331171e4054ea6d7cb594743b457821fac3d4f50ac

        • F:\$RECYCLE.BIN\S-1-5-21-1337824034-2731376981-3755436523-1000\_desktop.ini

          Filesize

          9B

          MD5

          3ba8d99ae07bfe971a8f27f082803beb

          SHA1

          dbcc6b45ae3dc7be2faab524a0fc7415146f128d

          SHA256

          df296de0196b4b56afab78a4a7d68c1cffc9f7f91ebb05dde41f6c382dbd9af3

          SHA512

          ace344b467ecbdf133c69fd4ead288213167a0cd991088b987083df9a9a5b49d9c1588343a81fea32a5e7e3e3d621beaca6924bbcf92471578133c9c111785b5

        • memory/1052-10-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/1052-0-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3632-27-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3632-37-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3632-33-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3632-1231-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3632-20-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3632-4797-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3632-13-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3632-5236-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB