Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:24

General

  • Target

    e1008ff4bc191d9e4ef446ebd3c066a7e01623580829e07716c13799c0688f72.exe

  • Size

    4.6MB

  • MD5

    9af5d90da7497bd4b24dce6e9d8c1d0f

  • SHA1

    90e2af60443ca536a1bd8e71d2abde5be8ed3fb4

  • SHA256

    e1008ff4bc191d9e4ef446ebd3c066a7e01623580829e07716c13799c0688f72

  • SHA512

    a59daa791d610a8650045227262c51ec24300d2dba9a75f4fc47c318a18b220e862c1defb502ae457f6c191b68b51572b4069e867f8c0f8d3622240e4bda7c34

  • SSDEEP

    98304:byENIIut+hl5pU9HLOaFAIH3TcLWGO7d09GZkrCRfR:mEN2tm5pOuU3TcLWGO7djZkrC5R

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\e1008ff4bc191d9e4ef446ebd3c066a7e01623580829e07716c13799c0688f72.exe
        "C:\Users\Admin\AppData\Local\Temp\e1008ff4bc191d9e4ef446ebd3c066a7e01623580829e07716c13799c0688f72.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2920
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a2EBE.bat
          3⤵
          • Deletes itself
          PID:2928
          • C:\Users\Admin\AppData\Local\Temp\e1008ff4bc191d9e4ef446ebd3c066a7e01623580829e07716c13799c0688f72.exe
            "C:\Users\Admin\AppData\Local\Temp\e1008ff4bc191d9e4ef446ebd3c066a7e01623580829e07716c13799c0688f72.exe"
            4⤵
            • Executes dropped EXE
            PID:2680
          • C:\Users\Admin\AppData\Local\Temp\e1008ff4bc191d9e4ef446ebd3c066a7e01623580829e07716c13799c0688f72.exe
            "C:\Users\Admin\AppData\Local\Temp\e1008ff4bc191d9e4ef446ebd3c066a7e01623580829e07716c13799c0688f72.exe"
            4⤵
            • Executes dropped EXE
            PID:2500
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3064
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2732
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2240

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        99ea9b604a7a734d3087fa6159684c42

        SHA1

        709fa1068ad4d560fe03e05b68056f1b0bedbfc8

        SHA256

        3f733f9e6fec7c4165ca8ba41eb23f604a248babe794c4ad2c6c3ce8032aab1c

        SHA512

        7af8008c7e187f925c62efc97e1891a7a38d089302dba39fbde137fb895e0592847ed0982c824c2075be8e6b95b6ce165ecb848ab85adf53779ebef613410fbb

      • C:\Users\Admin\AppData\Local\Temp\$$a2EBE.bat

        Filesize

        722B

        MD5

        2a6e1f81bc03abca777d0bd6abd2cf14

        SHA1

        2752f209c0950e8ed9e04868431b216f93ee4e88

        SHA256

        efbfbd9ca41c503dc1ff01736cdba0470f3aa2e298aa10b57c259996d4026aa6

        SHA512

        07a3b11cd7922245aec0a2551ec144934049e874fd6f68fdbd325ea0166f76371df82860c7e1946025a87f0d02ed646431267c6a906161e004cc29c8051aaa3e

      • C:\Users\Admin\AppData\Local\Temp\e1008ff4bc191d9e4ef446ebd3c066a7e01623580829e07716c13799c0688f72.exe.exe

        Filesize

        4.6MB

        MD5

        95222faeeab2cebe9502f2e123d5dd2a

        SHA1

        dac0e46c7b0bc998bee826538a3128fbe396e638

        SHA256

        b8af4588875e697e49db4e1ff5833ef8f89ffde327ab9dc9fad101551d6aec28

        SHA512

        aaec6212bb69d7dbf4b7d09dfa6ccfca803835c19a5974f534f7db2d6235e741bb404969b2695ff9487ee2c7ac2ab1f740a436332b740b45fbaf579c6e13bf4f

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        64a926d15aa028690bc14ef51132d6d6

        SHA1

        66638b0a02ecc310024bd3b3ccec85efbf467a10

        SHA256

        52a165a2cef64c6d5b99666985d18d0caf21dff39a40871ce30bd1a377b050b0

        SHA512

        1afecb82683ee0a55b445d7fcea8ebc13d1dbb3d6ae826e3ae1b2b7137f1f28f022c08b6ea64ff9648c5bda8b81fe57f4168aee0098aef1bc1f38d1a12ab7c86

      • F:\$RECYCLE.BIN\S-1-5-21-268080393-3149932598-1824759070-1000\_desktop.ini

        Filesize

        9B

        MD5

        31874817e0fb055be8d2c971c0e3bbde

        SHA1

        ee8a35d6a86cb6d13f354d67d912e194bb09c74b

        SHA256

        94de8b492bc2db9a9592f7c9433547eb7f80826ed67f48d2bb7e22db9d49f544

        SHA512

        55747c69ae50fa212576d095f60cf33b42e26789cf8c34fc5120a45b1988aae95f91d9e37cb17298c5ac5243b2e4c40e1d0e084ce7fe14bceb4ebb318c65c944

      • memory/1204-66-0x0000000002550000-0x0000000002551000-memory.dmp

        Filesize

        4KB

      • memory/2920-15-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2920-17-0x0000000000320000-0x0000000000354000-memory.dmp

        Filesize

        208KB

      • memory/2920-16-0x0000000000320000-0x0000000000354000-memory.dmp

        Filesize

        208KB

      • memory/2920-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2928-60-0x0000000000780000-0x0000000000781000-memory.dmp

        Filesize

        4KB

      • memory/3064-71-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3064-78-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3064-84-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3064-130-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3064-136-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3064-1436-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3064-1913-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3064-3373-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3064-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB