Analysis

  • max time kernel
    150s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 23:46

General

  • Target

    85e7c99b89d684d08c01805f10a79ea36d8eb8f1a1b590c2732ba80a63a1861e.exe

  • Size

    484KB

  • MD5

    f428a8d1c28c83de4ed8273268587b73

  • SHA1

    88737e5fb5f6674d9d79ab43ad27ddc6f84268bf

  • SHA256

    85e7c99b89d684d08c01805f10a79ea36d8eb8f1a1b590c2732ba80a63a1861e

  • SHA512

    9515999564eff9254a98db65384f49318b5ef70682a54a1a9f1619b1821e9a11dfd2ccc53a6f3c557ec5cc6fdc57c89c54daf8ffaf04fdeeed994cc51fda2072

  • SSDEEP

    6144:TVfhguGz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fay7:pJgug1gL5pRTcAkS/3hzN8qE43fm78V

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3480
      • C:\Users\Admin\AppData\Local\Temp\85e7c99b89d684d08c01805f10a79ea36d8eb8f1a1b590c2732ba80a63a1861e.exe
        "C:\Users\Admin\AppData\Local\Temp\85e7c99b89d684d08c01805f10a79ea36d8eb8f1a1b590c2732ba80a63a1861e.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:456
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5479.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3976
          • C:\Users\Admin\AppData\Local\Temp\85e7c99b89d684d08c01805f10a79ea36d8eb8f1a1b590c2732ba80a63a1861e.exe
            "C:\Users\Admin\AppData\Local\Temp\85e7c99b89d684d08c01805f10a79ea36d8eb8f1a1b590c2732ba80a63a1861e.exe"
            4⤵
            • Executes dropped EXE
            PID:2912
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1888
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:220
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:628

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        3018279f3ebf32220fd9785f98c790cc

        SHA1

        a93419e872216ea720dc80c887a2ab7b9a5bd587

        SHA256

        75cca4c348badb25e15d4c8591494b2f9bf8acc1936b0ae0ed403de445880877

        SHA512

        f8bb312405a4b7be524eb565341f38e459f5ee74b102bab2839ef93a3bb293f1173a48cd4faed2bad4223ea742f19f5c5ad492ce3d4c1e29089c8bc7bb2f37d1

      • C:\Program Files\MountComplete.exe

        Filesize

        1.1MB

        MD5

        006656d9d3dee6adc8655e3e78386328

        SHA1

        e7d76c8982e0aa8ae6d412c776cafa8bc65146d7

        SHA256

        7d4bae0ddd7d5eee979777c4f7a4b3ca908d757c2855464e7c3d783dbe204fe7

        SHA512

        c56189d6ccbd4cb64e29cc7af1681aadbe380143f9490b2c4dd632b62132d166db6851416df9e80a9a3ec38ca8cb25e1d6c62aa91e34e8f11169f1aeaa5b6d7c

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        636KB

        MD5

        d82ffc872aed7c85cf936dcdcc2e6372

        SHA1

        50ca56cb4a429ce1532afaa2732f61833fc2b54f

        SHA256

        a487733710d946abff1a93a23ae6bbafd6c0800bc78e4d5e3cac36e2a14ddace

        SHA512

        0b0031418275c6be01f7757111058cd5bd3e5f4862e0631e2e28c5e7ffbb271446abdc2a88a7953ae55112799bc4a051becc2b14491e0d1760e336498665cc8b

      • C:\Users\Admin\AppData\Local\Temp\$$a5479.bat

        Filesize

        722B

        MD5

        61fbecd1c0c5c25e312f0d3ff8f63dc7

        SHA1

        dd53c3ea747a7fa02a4dd599caea0e71cd3986ce

        SHA256

        4381710378fbd7a56a5864e2d0342b286d9a07bc6a4fb2f872fc3396f88ae978

        SHA512

        890045d0541568140a89ef0f4a95ad9819d46ce1f999a9e2b43f99ce85a4500728469bc9c45250b345238ca4b199e6808dff3eaedea611a0ca3e53dbb0facb7d

      • C:\Users\Admin\AppData\Local\Temp\85e7c99b89d684d08c01805f10a79ea36d8eb8f1a1b590c2732ba80a63a1861e.exe.exe

        Filesize

        458KB

        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        34ca2411a3298b0ed36b21e6263174c2

        SHA1

        d514c1f0ad4e6d7e2c582037edec6255bf4b1a45

        SHA256

        038e424939434cf6fbf24e88b925fcdc9bf87170746781eea28a399412cef215

        SHA512

        bc0b3fcde0dc92ebcf7008f5a1685e39b7f6b42fc9497688827855b2398eb259ef7f3016b148dc9372ccbbdce48e9812f14fdb98aba47bbfa9e595a6ce27e139

      • F:\$RECYCLE.BIN\S-1-5-21-1337824034-2731376981-3755436523-1000\_desktop.ini

        Filesize

        9B

        MD5

        31874817e0fb055be8d2c971c0e3bbde

        SHA1

        ee8a35d6a86cb6d13f354d67d912e194bb09c74b

        SHA256

        94de8b492bc2db9a9592f7c9433547eb7f80826ed67f48d2bb7e22db9d49f544

        SHA512

        55747c69ae50fa212576d095f60cf33b42e26789cf8c34fc5120a45b1988aae95f91d9e37cb17298c5ac5243b2e4c40e1d0e084ce7fe14bceb4ebb318c65c944

      • memory/456-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/456-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1888-26-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1888-36-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1888-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1888-1231-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1888-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1888-4797-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1888-10-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1888-5236-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB