Analysis

  • max time kernel
    149s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 21:39

General

  • Target

    fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe

  • Size

    484KB

  • MD5

    88977142bdfb752a1cb0a518e7ecffdf

  • SHA1

    5bab0edb5850e0dfd4980fbd0cc732535e69cc1b

  • SHA256

    fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277

  • SHA512

    6e651f6f647972b06a9960a9fedc6ef4d5d819170aca85a89791d11366ad7d7982c1e3426b38fc9cd7c6da4675ab1890c6035072b666c1c9bf483e4eaa1112fd

  • SSDEEP

    6144:lVfjmNIz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fay7:D7+G1gL5pRTcAkS/3hzN8qE43fm78V

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3424
      • C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe
        "C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3492
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE3B9.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:872
          • C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe
            "C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe"
            4⤵
            • Executes dropped EXE
            PID:552
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4448
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:944
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2356
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1304,i,18168883380598738769,14202261231630113808,262144 --variations-seed-version --mojo-platform-channel-handle=4240 /prefetch:8
        1⤵
          PID:468

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          251KB

          MD5

          2cbf0e13c88dcc4a4f21740219dfc1e5

          SHA1

          c00dbe095e29b77221963148de962312fa51f178

          SHA256

          34af897488657539915345a48106d1dec508abbb3d7867e97d1f59440fe98184

          SHA512

          8929533a3787dc7e2958b6d2a08a2de069e5732cef2187b87c1d7437798091dccf47f7f9d7bdf7ab68c92d97f578d2c24dc5276136a20446d22d1b32085e83a6

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          570KB

          MD5

          9ea11d57cb1e0cbb174a3b8c4eccf28e

          SHA1

          da7e2faa165c7f060da6d5e6e9f75f448c17e119

          SHA256

          cf0b52099500cd740da5ac40f69242f5fa6ca7d8ebe8729d0987541d068763d5

          SHA512

          3ecefc4d632ac556536d1bc1fddff1a48b1bae6f6b81fe0d35ff399a23d753ba3994b316a0a8a33e4ff5febcf9002a1014a5b0cd2c548c9882a8d3cbf872fe65

        • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

          Filesize

          636KB

          MD5

          7c0581e2c34a99e0e6b7b63deb7540d8

          SHA1

          2ad688b178321284f2eab56ad02ef1d32e7ea46f

          SHA256

          200d8896a4cf3d442567696ff425b2aeca8b87428173337c4f5b9022ae0d6ab0

          SHA512

          4e65033131dd98ef1eb39d5da1c3a92b8d4c3ca083edb3db7bf9f555e57285f9f5c63bdc4d24cc5aa63312edd216ebc74c0a7f74ed38783e27998a2c013a496e

        • C:\Users\Admin\AppData\Local\Temp\$$aE3B9.bat

          Filesize

          722B

          MD5

          f7e0413d818d7960a2484d1f08640df4

          SHA1

          482785a21525ea81510eee5a4709f4cf927b4b07

          SHA256

          391690e588810f5b410ff2cff06e06530886ec861b89e19a9dd716a5dd62d998

          SHA512

          b7b3d8f451da7d4c5dc072695d6118fdca28865d2c4d5f020e217f00e7c9ff86fc77f5e9fc767d429d4b8fc6c28456097dc15078371caef6ee1c0e2a913579a2

        • C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe.exe

          Filesize

          458KB

          MD5

          619f7135621b50fd1900ff24aade1524

          SHA1

          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

          SHA256

          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

          SHA512

          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

        • C:\Windows\Logo1_.exe

          Filesize

          26KB

          MD5

          6bb917e54f07b1f77de86ee02cc2fdca

          SHA1

          33c02d2bdacdad19592f68bc30375f798facb53b

          SHA256

          a5076f4ef41e1596ea6b5c37d19ad811af1ac9c659a3a6dc1599bb1b4dbaff80

          SHA512

          1358692ff3b0b2f419bd0fe528294bdba5eee70985ac1aa73a6635b7a30bc471500945d0d82ba1854c087e3097a16e9cebc8ddb7fa4fda3d5fd5a4dfe95ff6b0

        • F:\$RECYCLE.BIN\S-1-5-21-1181767204-2009306918-3718769404-1000\_desktop.ini

          Filesize

          9B

          MD5

          304501c003da3bc5756aa53a757c30cc

          SHA1

          94dfcea0ef17f89b3a60a85a07edb4c00170cc1c

          SHA256

          9f4b03cbd52378f329bfc7088f8242bbc1a0a2754bc2f8a40e3b74e0dedecd6e

          SHA512

          78cd3c2cb4cb66e41d8947e1231256c2043d71c77f97e92915e938a6c1d9a8c003512027d98bc71bf582875d269e5fbe6e134f57b25f5f79fe16f9a412387dc8

        • memory/3492-12-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3492-0-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4448-27-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4448-37-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4448-33-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4448-1237-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4448-20-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4448-4875-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4448-13-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4448-5320-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB