Analysis

  • max time kernel
    149s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2024 05:20

General

  • Target

    02463321e53570dfce5840c2dd66efe7fbcaa99dcd8c373dd669a39a649dbcfa.exe

  • Size

    195KB

  • MD5

    3d877fea86d6eb8d49e77e4083f4e0da

  • SHA1

    39b6103d1bb8f5f97c3b748de06b45224a672b5d

  • SHA256

    02463321e53570dfce5840c2dd66efe7fbcaa99dcd8c373dd669a39a649dbcfa

  • SHA512

    866272c6dde51a46502fae2054f4d296c1246989edb76c238f32dd128c3fdad59b10fe53a2b88afc1b867aa67c597dc3e09fffa34db416e8322d0466edea8256

  • SSDEEP

    6144:iFpGhiTM8mP4PnQYg3kMKYMKxbxSELp8Hmr:EpRMuQ93vmq18q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3528
      • C:\Users\Admin\AppData\Local\Temp\02463321e53570dfce5840c2dd66efe7fbcaa99dcd8c373dd669a39a649dbcfa.exe
        "C:\Users\Admin\AppData\Local\Temp\02463321e53570dfce5840c2dd66efe7fbcaa99dcd8c373dd669a39a649dbcfa.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2476
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7203.bat
          3⤵
            PID:632
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1756
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3660
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:4268

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          252KB

          MD5

          857901248af73a1d46fb35128c9a14b9

          SHA1

          a28008bc04d56374013386bcf3d5c46b494f1212

          SHA256

          f78337f1a34a4acbc1558a09a2cb8219bf659f12713d81897fd35e978390d250

          SHA512

          0069f75aa493a0874c83cf5c7ad94899801119229e417b7b8df618c8498eb874a4967c17faaacfc88935a121e95699184992ea61323ab25cb7a80c9c52bbab87

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          571KB

          MD5

          9af279df354d8461f4b03aa965c64b4e

          SHA1

          5f35acc426eb7b0655be25e31554efe5ade9e55f

          SHA256

          1a56ea38cebdc368d6f5ae8cbe111804f3dc4f3b74313319844a6b3a84742438

          SHA512

          943cbecb2643708cafce6633b2c61dcc9c5a43350fa23bd110b99ec98242bc2762b3722540c5e2e231611b729c2e4062874a3b5fe475099503c2e5762da1cafc

        • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

          Filesize

          637KB

          MD5

          9cba1e86016b20490fff38fb45ff4963

          SHA1

          378720d36869d50d06e9ffeef87488fbc2a8c8f7

          SHA256

          a22e6d0f5c7d44fefc2204e0f7c7b048e1684f6cf249ba98c006bbf791c22d19

          SHA512

          2f3737d29ea3925d10ea5c717786425f6434be732974586328f03691a35cd1539828e3301685749e5c4135b8094f15b87fb9659915de63678a25749e2f8f5765

        • C:\Users\Admin\AppData\Local\Temp\$$a7203.bat

          Filesize

          722B

          MD5

          6aca4ee057d71ee381eb41c5543c1de7

          SHA1

          feade5ac48c89a3ec6b14183028e2c9b1a8be64f

          SHA256

          7e392ded4062e39b5fffd7dd2b7cbf6c5afcaff30bc9c3d4e4282496dcdd2a3b

          SHA512

          fe688c51927df83b9db7bd32218d9ec6d9d8ab49f220e38828eb31f082b3382d2277c53c4d3616df2131db7b26c9afd1d7f60e03f769aedbe88e8074c6b349a4

        • C:\Users\Admin\AppData\Local\Temp\02463321e53570dfce5840c2dd66efe7fbcaa99dcd8c373dd669a39a649dbcfa.exe.exe

          Filesize

          168KB

          MD5

          9865024404b5209cdf2522ceaccb87ef

          SHA1

          c2f2566380930cd5638b9692e9eb579c7e3e66fd

          SHA256

          72e7dcdd653c3171fbf3683aee7fbc91c61f71d62c9f43fe8b2f2e34e9861ee0

          SHA512

          12ed1095164b7dbdd271166a8229bddcabb1c6350678fff4d07c0c338fffd2261a7ae63083a69202b0bb3494139563a1a86e8a3a38efa20c34af50671241b283

        • C:\Windows\Logo1_.exe

          Filesize

          27KB

          MD5

          55f44991f5344846e54369e4225e4c48

          SHA1

          95d8063218e7a19fa9777ec056fceeb7dbac553b

          SHA256

          cf83b86498be0258d86e0c1a130a28d7b106c43abcceebafac570fc51ae94f74

          SHA512

          a4e60c8378f333ec2e2b27a80ed436d921b3c7dff4ea1727afc79e680ddd9bbcca3de6de5fc1c4c83c5bc6b03c2db03fabcfd431fe9b6ca352d244757c0b4b91

        • F:\$RECYCLE.BIN\S-1-5-21-2804150937-2146708401-419095071-1000\_desktop.ini

          Filesize

          9B

          MD5

          de299d58575b595bc358a5c5edd0767d

          SHA1

          0d30c906a5b5647289c7788d31dd3afd642350a4

          SHA256

          32ef1af1131d89e96d59ac0d3f8e232e839355587a679a2df2479b5277a704e3

          SHA512

          c8e20bb98c427a3a0eea8769df090d59353f0b484321e82b381cfca18b111bd1d782713f2f5bf815e5832a0e12ec909a0324fe9ba013c626327cabf27a464bbc

        • memory/1756-18-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1756-25-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1756-31-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1756-35-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1756-1229-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1756-4795-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1756-5234-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2476-0-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2476-10-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB