Analysis

  • max time kernel
    150s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 17:18

General

  • Target

    a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe

  • Size

    9.8MB

  • MD5

    ac14f6389b30d5f8f6e3acd47092eacb

  • SHA1

    e7b7ec612e57d02147a42f53ff2700c231612d3a

  • SHA256

    a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1

  • SHA512

    af46bc2ce1a82f2279aff3fc719f5918579bc0b315650d42f20492d5e978650179b716aa3b09e5e155dc5db13f5dfeb6734f8237894adf620efab22f2dfcaf9f

  • SSDEEP

    98304:edQ1FMcEk1UmK4ynHw8QF5gKQFUUK3Zm4boQyfqgDBk3p96zbrYLHj0yn0KN/zy4:KuN1UmlYHw8s5YWUYboQ+B0/0KN/zy

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3492
      • C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe
        "C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3B44.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5904
          • C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe
            "C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe"
            4⤵
            • Executes dropped EXE
            PID:3780
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4328
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1640
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:448

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        f47bd89838b4a02cde7d647675c85ce7

        SHA1

        dbb732a83dc463475d840a3644e1307624285137

        SHA256

        c97ecc622176cfe7438bd921d847509cb1863433f81df8a5c2119ca5f43dc1d8

        SHA512

        f95c53762a3788d93a55c2edef1380b7a85d832d0077eb6b2b7432d08a0990050c58d3f9f425030cbfce4b1b97cc86dc3bfef78dbfc876bb1f4fa19419e63300

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        573KB

        MD5

        6af5660cba761f22c69a9e41ecff5942

        SHA1

        ee5528d7e12a55d0c84456a47cf087018cfdba9a

        SHA256

        43270265064f39c9d8fe0bcb93369d852587ee7d874ce8fac5a71a775f4b3689

        SHA512

        d52431ee2c0c114ddc934d747bc2c4a59ab0b1ce061973ccc6414c892576669b5acc0179936fb95386751dde6164c478aa08f79728660e137f05b3c9c495d7e4

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        639KB

        MD5

        ff7ce6c4ffc92d1beca4883dfcfde0af

        SHA1

        4a52e320cd88765f13e2799a4980a12f788c98a4

        SHA256

        5a4e150d03f1cfadccd40a407a3ae8ec5ffbb5d28ea95dca136d67cac24fd8b5

        SHA512

        99056bcbb382e545304a33002a6cfbb7a57df663feca5a3842bf077d1126931ba78d5e04a93cbd72a7c6d9eb09005750e5cff1030d8586e26838e7634d7ad583

      • C:\Users\Admin\AppData\Local\Temp\$$a3B44.bat

        Filesize

        722B

        MD5

        e5b0c22ae610bb801d62d0c4f06327c3

        SHA1

        c0e042750b5b5702cc6249b8490a68ff126d45f4

        SHA256

        16ec0b5b064159e501ade0cbd29dd07276e38ba9f26665a0590de10fb74f34c3

        SHA512

        db7ffcdd680c06c904daf67dee903ded3ff29525345b23c6b9e8293966be82d6b9c91df8dc065d954907ef8dd3dec701878548711fc5149d9661aa25242d0844

      • C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe.exe

        Filesize

        9.8MB

        MD5

        cae528636bf78cd4c35a455a120a540d

        SHA1

        cf3238393814b1764a866d14e76b0d63152aae67

        SHA256

        8c5c9105cf270597a16f8b0b78bd6158d68910598617f01118f80768a36bd79e

        SHA512

        8e3faeccf3b4942ac877f77c14ef1686e9fc90cf01972a86e2607c044bda5c0bd660fe4848bebe42b52edc259a03400dc611f4ea59a0fd01ada618d2857da745

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        3f5e7c4706e29143aea9c7ce1c0402e9

        SHA1

        6fa71c0ae1ea0701d9d7e0caabc266a0c33df54d

        SHA256

        2026a2e28503076f0c685503fff901cbe7120170ade846ad76be13362afe770c

        SHA512

        0199af2ac24604e012003e72cf5bad24a1949a92d2028f39a2400cb109c367f70e1a9779d48b982c70a5f90a542b598fae694360c9caf1b0eec21dd0ed625deb

      • F:\$RECYCLE.BIN\S-1-5-21-540404634-651139247-2967210625-1000\_desktop.ini

        Filesize

        9B

        MD5

        7e956ef5a6a8d81e557bd13665d22b60

        SHA1

        7f7b593a466647d21bf3d554bf1cd4cdead3dee5

        SHA256

        67b987784bfbcfae36a56382dc0e3e7b6254efdccb5cebe31739a398a39c3590

        SHA512

        bf7a5439f4ccca6aa98e658aceb05ea68fc7ce646461f356b57b9edd318c1b0ddea2e8513dd062d750bd67ed810233782d478baa9217e40ad53ab82d43350d63

      • memory/2720-11-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2720-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4328-27-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4328-37-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4328-33-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4328-1231-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4328-20-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4328-4797-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4328-10-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4328-5236-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB