Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 02:21

General

  • Target

    ec9b5ecb4c0e1fa99e688c9351eb53b68d26a6aa83713ebcfd81440225450250.exe

  • Size

    72KB

  • MD5

    181b05f797bf19da72559765f89ccc8b

  • SHA1

    c05566d5a52e59501b666889460087547840c126

  • SHA256

    ec9b5ecb4c0e1fa99e688c9351eb53b68d26a6aa83713ebcfd81440225450250

  • SHA512

    5186db618444967af521b777f0f515cd7148c9bc2cf244e0f70e543bf2b782071e91563f4087aee2fb0561f4c8f599a8f354d6a4c004fec87260294db723ee22

  • SSDEEP

    1536:lhhufgLdQAQfcfymN92nOF6u/i8i+KicZRYeghh:cftffjmN92OFp68iIyR

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1116
      • C:\Users\Admin\AppData\Local\Temp\ec9b5ecb4c0e1fa99e688c9351eb53b68d26a6aa83713ebcfd81440225450250.exe
        "C:\Users\Admin\AppData\Local\Temp\ec9b5ecb4c0e1fa99e688c9351eb53b68d26a6aa83713ebcfd81440225450250.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1008
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a5CB.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3000
          • C:\Users\Admin\AppData\Local\Temp\ec9b5ecb4c0e1fa99e688c9351eb53b68d26a6aa83713ebcfd81440225450250.exe
            "C:\Users\Admin\AppData\Local\Temp\ec9b5ecb4c0e1fa99e688c9351eb53b68d26a6aa83713ebcfd81440225450250.exe"
            4⤵
            • Executes dropped EXE
            PID:2216
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2424
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2744
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2892

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe
        Filesize

        251KB

        MD5

        3e7e33f90519246ba56d5539af241f1d

        SHA1

        b670438955c17f3c05d321138bd051031dc96c69

        SHA256

        b5f8587bd50d73e4c0d2a626aeee40166cf953f0ef6b7936bcd2566daa4c03d7

        SHA512

        3f11e97f71a8a57abae3f2a74a5c62820995d29538c9202701540c889ede1573d59f43d30a3040afebeb8a4be7aec721b57a7e3259f52e82e6d74ad2dfa0be13

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe
        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a5CB.bat
        Filesize

        721B

        MD5

        875ce4a9267906899e428d6a6395221f

        SHA1

        eccab27b1a27a2a3f8f9a0912dc52bc72ccd3777

        SHA256

        fcb2650cfa9a0785ddff5f9e4fbf2af7c2a9396326f79ec9ef8a88073353f7b7

        SHA512

        07bd610061b4d9fc8fb65f2566805470278d7588cee57a703f5f068560ff2f1ca9012c9a12973cdb331347699c0fdbba335d54d703c3b554ca5f2c95b66fe54d

      • C:\Users\Admin\AppData\Local\Temp\ec9b5ecb4c0e1fa99e688c9351eb53b68d26a6aa83713ebcfd81440225450250.exe.exe
        Filesize

        46KB

        MD5

        07adddef653a702b9a11edbcee07e82b

        SHA1

        97729f6df1cd96b61e3e2bc1a841adf1720e2ec5

        SHA256

        69214c946aa2db33ae97ebe3ca23808853a5110a716ea58510787229599960ee

        SHA512

        98fbad7178470651ebab97c0c5ed78f7dde9e8f2d7e9060538a4f0e60d53471def7433d38e02cf3afe1c2b6be3c1a503950d4c2cfe1ee9c00465255332ef519d

      • C:\Windows\rundl132.exe
        Filesize

        26KB

        MD5

        d4e8715b88849f5a8e1dc07f031120a2

        SHA1

        c77ee0410fd1d584547b3d308229149451da50aa

        SHA256

        f1a37f5d13a0db4ff22a45fee6a87a66ab4d70f31336bcf047f7129e89578d8a

        SHA512

        a7d6a9dc3b2050a0a4f59f2cac5f0c3cd2097827257bc76101b8d4153158104cc2a686e882e73f679800941ca71a2a1a989c9aec7052e0f0af4b2f71263edd73

      • F:\$RECYCLE.BIN\S-1-5-21-481678230-3773327859-3495911762-1000\_desktop.ini
        Filesize

        9B

        MD5

        31874817e0fb055be8d2c971c0e3bbde

        SHA1

        ee8a35d6a86cb6d13f354d67d912e194bb09c74b

        SHA256

        94de8b492bc2db9a9592f7c9433547eb7f80826ed67f48d2bb7e22db9d49f544

        SHA512

        55747c69ae50fa212576d095f60cf33b42e26789cf8c34fc5120a45b1988aae95f91d9e37cb17298c5ac5243b2e4c40e1d0e084ce7fe14bceb4ebb318c65c944

      • memory/1008-0-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/1008-16-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/1116-33-0x0000000002DF0000-0x0000000002DF1000-memory.dmp
        Filesize

        4KB

      • memory/2216-31-0x0000000000400000-0x000000000050F000-memory.dmp
        Filesize

        1.1MB

      • memory/2424-48-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2424-42-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2424-94-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2424-100-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2424-643-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2424-1877-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2424-1937-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2424-35-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2424-3337-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2424-18-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/3000-30-0x0000000000420000-0x000000000052F000-memory.dmp
        Filesize

        1.1MB