Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 18:30

General

  • Target

    6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe

  • Size

    351KB

  • MD5

    dac4763c898fd5282fecc9998ecddd37

  • SHA1

    1cdb2709f555f1817803accc44a301bf270b0488

  • SHA256

    6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff

  • SHA512

    ab33bae8da117c8692a26f4b4d4bc06b219cbd88aa8a5953f5123fbed460965312da201e99da6ce30510f7152ef94e7a2f15574479aaaeaf96f0df53626e07d9

  • SSDEEP

    6144:RVfjmNHLaYr322l59AQg43SmgopSdN19lnwnl1eDbF4r3UVzhpSM+Ab:H7+rp7Dlxg43pZpSdN1DnhMmP

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe
      "C:\Users\Admin\AppData\Local\Temp\6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\$$a8E6A.bat
        3⤵
        • Deletes itself
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Users\Admin\AppData\Local\Temp\6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe
          "C:\Users\Admin\AppData\Local\Temp\6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: GetForegroundWindowSpam
          PID:2556
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2456
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            5⤵
              PID:2640

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      251KB

      MD5

      f758412d4d512e83f6eab9298c7d3ac2

      SHA1

      e5ea679437c050335e20a340c40708a4e0f626c3

      SHA256

      4b72a3e0507c863a389953f9302224366dd02b613f6a55ba9227e788cd62657b

      SHA512

      b402189dc8b890319ed964b80e803a8aa36ae7a71ff1f4ef71361a1aeef7ca104dcaf1a1d2c6eb514326258efdb1016815c29c213e683e5b3006ee709b9bc957

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      471KB

      MD5

      4cfdb20b04aa239d6f9e83084d5d0a77

      SHA1

      f22863e04cc1fd4435f785993ede165bd8245ac6

      SHA256

      30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

      SHA512

      35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

    • C:\Users\Admin\AppData\Local\Temp\$$a8E6A.bat

      Filesize

      722B

      MD5

      7cd4aebfe9e1335ae920652f4922113f

      SHA1

      4a6ff1b8f0f8f787e64ae55ae32d58d5ff548fae

      SHA256

      8cb63ace8b57337e65a38b3b309fa42a1b2dc8c42ac83422629ec5d382630eff

      SHA512

      c8eee2bf196578190c79e9df3ca90d366de1dd8a3bc9e6b9fe38c968e23a7d1b0a1b9a087bbad22eeef7a6fcd3dec7bddca4f284e6226fc41b27d4d84e0bc8f8

    • C:\Users\Admin\AppData\Local\Temp\6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe.exe

      Filesize

      325KB

      MD5

      21bd4a81bc196a75988f6b8b50da9272

      SHA1

      084c8609498c812013c58473d6a96193710f17c0

      SHA256

      06734649b094dcc478cdf0c338f5c24dc848ab691213e0b6c97c4eb9d3a63d68

      SHA512

      03f2a6de07bac12271df5d4e3a399d778b217ba0a329b96b8b006dcdf49a709eb2af38308c6d6e372cdf96e4335a3a9a0a1e84882475ec69ab6ae1aa5c0d007c

    • C:\Windows\Logo1_.exe

      Filesize

      26KB

      MD5

      f9f56fe5c4eb559d6fd0af4394cc6ae7

      SHA1

      591caed457d59d3c6a331bc895261ee2beabfe61

      SHA256

      a11c5a8073eeef47bdda8ea9ba729e0145ee9be573a4a7c3cbb7e98b58b345ab

      SHA512

      23ec7e4bcb874442aed60e734c8ea749564ddd2e7cb61799f3a658194545be874d082ca21e71d4370c17de9fd7ce9f74b4d0477982c158230e418d7a6ee3298a

    • F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\_desktop.ini

      Filesize

      9B

      MD5

      917c6bf65db2dfa12e70e5aa6a061a01

      SHA1

      bd0d9f217fd74efd784ad4a1b41f330b36e64edf

      SHA256

      8ad43ce062fe590809844ebdf64f2eb0f7d32357c89baac5640ff132dfcfdd19

      SHA512

      21a71205a9abfafcf7fef2a1697ae78a6fe14591bef85f86137d5355b5d40e1b8ca810e351256e0dc2973677e9b4452014126d3e5e81b0c3f1fcbd1a087481cb

    • memory/1224-32-0x0000000002910000-0x0000000002911000-memory.dmp

      Filesize

      4KB

    • memory/1784-93-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1784-34-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1784-41-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1784-47-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1784-99-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1784-189-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1784-1852-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1784-3312-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1928-15-0x0000000000220000-0x0000000000254000-memory.dmp

      Filesize

      208KB

    • memory/1928-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1928-17-0x0000000000220000-0x0000000000254000-memory.dmp

      Filesize

      208KB

    • memory/1928-18-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB