Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 06:22

General

  • Target

    e0af0090225dfacaae6d0dc0f8e589066ee6d9cf460feb236d061b808d58376c.exe

  • Size

    4.1MB

  • MD5

    19e39e02d05aaf110ea196df080d0013

  • SHA1

    01e1c9f44b55182b066c009197131cb379c03300

  • SHA256

    e0af0090225dfacaae6d0dc0f8e589066ee6d9cf460feb236d061b808d58376c

  • SHA512

    eaa966b4108f06014deca5f7e67ddc233fa0a900b229992ebdc359f1c6dbf38a84ba146b62a530068ae27b1a885149a4b21eeaf95ce0cb7d7b8361fe9efc9128

  • SSDEEP

    49152:Z7uTEk9yZGTrRJlfOI3vO1hVWV8O2f5wK4mjPuXVQb9ZQjFur5+YJsFQqSqACStU:0lONWWO2f9uiJ3/aHC31

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1088
      • C:\Users\Admin\AppData\Local\Temp\e0af0090225dfacaae6d0dc0f8e589066ee6d9cf460feb236d061b808d58376c.exe
        "C:\Users\Admin\AppData\Local\Temp\e0af0090225dfacaae6d0dc0f8e589066ee6d9cf460feb236d061b808d58376c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1738.bat
          3⤵
          • Deletes itself
          PID:3040
          • C:\Users\Admin\AppData\Local\Temp\e0af0090225dfacaae6d0dc0f8e589066ee6d9cf460feb236d061b808d58376c.exe
            "C:\Users\Admin\AppData\Local\Temp\e0af0090225dfacaae6d0dc0f8e589066ee6d9cf460feb236d061b808d58376c.exe"
            4⤵
            • Executes dropped EXE
            PID:1964
          • C:\Users\Admin\AppData\Local\Temp\e0af0090225dfacaae6d0dc0f8e589066ee6d9cf460feb236d061b808d58376c.exe
            "C:\Users\Admin\AppData\Local\Temp\e0af0090225dfacaae6d0dc0f8e589066ee6d9cf460feb236d061b808d58376c.exe"
            4⤵
            • Executes dropped EXE
            PID:2532
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2000
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2836
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2572

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        a4be970114fde7b4347a171ef559737b

        SHA1

        9ff5a5c55eca69d00aa5cf88a86831f2954ee214

        SHA256

        54f93dd3fd4b973502236e7372591290aef4913ed31ab38fa17c4b0e52b86e21

        SHA512

        e4fb957ac171ac1bbca431fbfbb8c9142b5493e3b875db7f61182c91adce87d29b410c766d5043b8bee276f9024b7b14ee636106a037db8f35d545b20ec635ce

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        99ea9b604a7a734d3087fa6159684c42

        SHA1

        709fa1068ad4d560fe03e05b68056f1b0bedbfc8

        SHA256

        3f733f9e6fec7c4165ca8ba41eb23f604a248babe794c4ad2c6c3ce8032aab1c

        SHA512

        7af8008c7e187f925c62efc97e1891a7a38d089302dba39fbde137fb895e0592847ed0982c824c2075be8e6b95b6ce165ecb848ab85adf53779ebef613410fbb

      • C:\Users\Admin\AppData\Local\Temp\$$a1738.bat

        Filesize

        722B

        MD5

        0ea9e4455bef7f4b4f2b31220cdd49ea

        SHA1

        65e049d05f5d15a6c6e45cb5ee4db428ffef5778

        SHA256

        93a44ef38d138a034e6b8adbb275816ece5ec5800b153ff97f770918ed8cbd52

        SHA512

        a3882ce8243b8de891b6d399d73ecf2c4234767e40fa4457c1bf230fd135e59c005be8902498c03768c0de8b391aae0fb77ce1f2db2a02f36c326de44a084227

      • C:\Users\Admin\AppData\Local\Temp\e0af0090225dfacaae6d0dc0f8e589066ee6d9cf460feb236d061b808d58376c.exe.exe

        Filesize

        4.0MB

        MD5

        781a600a895e771ada56cf0afefd9050

        SHA1

        6bd0605333fe5cbb59441ef2d3f8bbebf453eba4

        SHA256

        627ceedadc031997a5a04d7186782415bb5e5c0c44c9ffb64e65bade7c008fd1

        SHA512

        15978229235d920fe511bfe859609b1ec6dcd38199dfba33393d00be7274f822a3002fb6ef53c5df5be0d9ec869e2b359ac3b829a1ba61a7bc1b358b5a65770d

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        86f9430d4925c4f45151eea124081d83

        SHA1

        52df34b47184ed2700bbd92b68874c73592b6d1d

        SHA256

        41b9e2bf3ce43d681d6dde91ffff8a23adcc4da2076516de2bf2631708b74350

        SHA512

        910bce524874bbe43de4e9309b1e7aa6a547a6592e3cdcff1f992c156142dc4bf493d23218f635bb6f6366bc1616d96d6ca885d651c0b4be87ab845901f4e3e8

      • F:\$RECYCLE.BIN\S-1-5-21-2297530677-1229052932-2803917579-1000\_desktop.ini

        Filesize

        9B

        MD5

        31874817e0fb055be8d2c971c0e3bbde

        SHA1

        ee8a35d6a86cb6d13f354d67d912e194bb09c74b

        SHA256

        94de8b492bc2db9a9592f7c9433547eb7f80826ed67f48d2bb7e22db9d49f544

        SHA512

        55747c69ae50fa212576d095f60cf33b42e26789cf8c34fc5120a45b1988aae95f91d9e37cb17298c5ac5243b2e4c40e1d0e084ce7fe14bceb4ebb318c65c944

      • memory/1088-65-0x00000000024B0000-0x00000000024B1000-memory.dmp

        Filesize

        4KB

      • memory/2000-131-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2000-72-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2000-79-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2000-85-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2000-138-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2000-1889-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2000-3349-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2000-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2192-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2192-17-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3040-59-0x0000000002320000-0x0000000002321000-memory.dmp

        Filesize

        4KB