Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 17:18

General

  • Target

    a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe

  • Size

    9.8MB

  • MD5

    ac14f6389b30d5f8f6e3acd47092eacb

  • SHA1

    e7b7ec612e57d02147a42f53ff2700c231612d3a

  • SHA256

    a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1

  • SHA512

    af46bc2ce1a82f2279aff3fc719f5918579bc0b315650d42f20492d5e978650179b716aa3b09e5e155dc5db13f5dfeb6734f8237894adf620efab22f2dfcaf9f

  • SSDEEP

    98304:edQ1FMcEk1UmK4ynHw8QF5gKQFUUK3Zm4boQyfqgDBk3p96zbrYLHj0yn0KN/zy4:KuN1UmlYHw8s5YWUYboQ+B0/0KN/zy

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe
        "C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1548
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a7F1F.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe
            "C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe"
            4⤵
            • Executes dropped EXE
            PID:2276
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2568
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2544
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2104

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        f47bd89838b4a02cde7d647675c85ce7

        SHA1

        dbb732a83dc463475d840a3644e1307624285137

        SHA256

        c97ecc622176cfe7438bd921d847509cb1863433f81df8a5c2119ca5f43dc1d8

        SHA512

        f95c53762a3788d93a55c2edef1380b7a85d832d0077eb6b2b7432d08a0990050c58d3f9f425030cbfce4b1b97cc86dc3bfef78dbfc876bb1f4fa19419e63300

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        474KB

        MD5

        8916a72b93d5fd4c6e63c8b36279b230

        SHA1

        83e3b1bfd579fbf998b2db5428819a10b25d0ad5

        SHA256

        537975086833d580dd97beff9e712f64cc41d0bf20cac16c1a04be24ed3af27b

        SHA512

        2c61138cc8800649890179c080c228da22ab9fe27f3fc1a83c52f57b349a5d3c61fc9d4a64ab53e362376f63edf99d30f0994b6070f97d09ec4868efaf8293b4

      • C:\Users\Admin\AppData\Local\Temp\$$a7F1F.bat

        Filesize

        722B

        MD5

        349f4f6b8c7ec76de60f9ee3c9844b88

        SHA1

        5cefcbe194173824ca8ee8eea800065dbac60903

        SHA256

        8f55958b67c97bdcc564631d4a7001ecaa91904d31b2ca4a46bc9b658bc6f759

        SHA512

        3053d1fcf6987a456666f10acc2c90b06a80c1a7c40c8a0b58c5af40bd2a85701b22473d3a634fec492246766c0fdcc9a6e70415922827e9672d3c46114ff9ee

      • C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe

        Filesize

        9.8MB

        MD5

        cae528636bf78cd4c35a455a120a540d

        SHA1

        cf3238393814b1764a866d14e76b0d63152aae67

        SHA256

        8c5c9105cf270597a16f8b0b78bd6158d68910598617f01118f80768a36bd79e

        SHA512

        8e3faeccf3b4942ac877f77c14ef1686e9fc90cf01972a86e2607c044bda5c0bd660fe4848bebe42b52edc259a03400dc611f4ea59a0fd01ada618d2857da745

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        3f5e7c4706e29143aea9c7ce1c0402e9

        SHA1

        6fa71c0ae1ea0701d9d7e0caabc266a0c33df54d

        SHA256

        2026a2e28503076f0c685503fff901cbe7120170ade846ad76be13362afe770c

        SHA512

        0199af2ac24604e012003e72cf5bad24a1949a92d2028f39a2400cb109c367f70e1a9779d48b982c70a5f90a542b598fae694360c9caf1b0eec21dd0ed625deb

      • F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\_desktop.ini

        Filesize

        9B

        MD5

        7e956ef5a6a8d81e557bd13665d22b60

        SHA1

        7f7b593a466647d21bf3d554bf1cd4cdead3dee5

        SHA256

        67b987784bfbcfae36a56382dc0e3e7b6254efdccb5cebe31739a398a39c3590

        SHA512

        bf7a5439f4ccca6aa98e658aceb05ea68fc7ce646461f356b57b9edd318c1b0ddea2e8513dd062d750bd67ed810233782d478baa9217e40ad53ab82d43350d63

      • memory/1200-29-0x0000000002A80000-0x0000000002A81000-memory.dmp

        Filesize

        4KB

      • memory/1548-16-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1548-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1548-12-0x0000000000220000-0x0000000000256000-memory.dmp

        Filesize

        216KB

      • memory/2568-31-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2568-38-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2568-45-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2568-90-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2568-96-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2568-228-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2568-1849-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2568-3309-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB