Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 22:09

General

  • Target

    8bcac5a8b31473795f578b46df66426871025191b58ddef07003469ab6b87ad9.exe

  • Size

    1.1MB

  • MD5

    010e615e14c63dcf3ab7822cf7d56cbc

  • SHA1

    f93b162f56c3f342ed69d955089fca9ed5ca4b7b

  • SHA256

    8bcac5a8b31473795f578b46df66426871025191b58ddef07003469ab6b87ad9

  • SHA512

    29a1ff130ce8db3ed16914704ab8a0c33c37ea9ce56a93e2ff3360538e3ad277dd7d7f3b4fc8dd285da63051e0139ac5b2a8f500e1065ab4f7a91a6e4d4afb28

  • SSDEEP

    12288:z7+30+TLA2jhAiMOYvCRByLdwIII37aOlmT6HziyIjG:z7s/HfRByLdwI3AUiysG

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\8bcac5a8b31473795f578b46df66426871025191b58ddef07003469ab6b87ad9.exe
        "C:\Users\Admin\AppData\Local\Temp\8bcac5a8b31473795f578b46df66426871025191b58ddef07003469ab6b87ad9.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2236
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aA8FC.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2304
          • C:\Users\Admin\AppData\Local\Temp\8bcac5a8b31473795f578b46df66426871025191b58ddef07003469ab6b87ad9.exe
            "C:\Users\Admin\AppData\Local\Temp\8bcac5a8b31473795f578b46df66426871025191b58ddef07003469ab6b87ad9.exe"
            4⤵
            • Executes dropped EXE
            • Modifies system certificate store
            PID:2952
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2240
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2468
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3044

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        1a0bd34c8a65342cb7e4ab8e0c9441bd

        SHA1

        1f0b7762b58c4a5308719d0576edec6f09cec1e4

        SHA256

        26e0b0000dae48e449f5f3258417cf44324ab3cf5545421a122ccca8cf58bb7b

        SHA512

        e5a64097c1662e08dbd2e6eba319aff08cb61ae9c9ccb2bc91921cc76cc682edba741c2e50cb74ff5802faeb8e95c775c13237c0e435af43d095fede74d0c81b

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        b95e878ac149e7e91f604d0591bee061

        SHA1

        53f87eec2eb3f200f8f6313de6ed95bf08e4f827

        SHA256

        c3748709ed5b100e826c5e28bf331d3f3e569b63111399f54e4f9075eddde58b

        SHA512

        ed0105f3ec1abf0af61d9df93c5177cd22084894c56d2fe6b111452113a7b003c2cb54737fba01d4b54ca4e1bdf73dc9e3feb6542230306a8f80bfd1b19adac5

      • C:\Users\Admin\AppData\Local\Temp\$$aA8FC.bat

        Filesize

        722B

        MD5

        c4ddcd252d359453013f5eeffb941c59

        SHA1

        e92add14afb1b484e135dc091bd25e941486f612

        SHA256

        a19a2c3fc39538d8afa44c5d14f1da65823f9127af6f0ab1e393dcb458b0ac9a

        SHA512

        c32d4dcfe04a85296268161d0f363251ca02cea9762467d08adb84f647c464eef9fa1a065c97a7d9994562a848692c389fbaca648723d4bd1b111dd24fc32a49

      • C:\Users\Admin\AppData\Local\Temp\8bcac5a8b31473795f578b46df66426871025191b58ddef07003469ab6b87ad9.exe.exe

        Filesize

        1.0MB

        MD5

        3892ad0cc7dc6564d98ea5894a709857

        SHA1

        a05e406aa436f790822384fcdf80aadd6ed28d4c

        SHA256

        fd585cfde0ce11631077cc7f6ac9d7f605022bf65b52effcf7f00f87d9281fdf

        SHA512

        6ca3eb5c463433bde186bfb34c6330a6794c69021d0c6946461197a58fcbf1099239381c79968478c2c24e02ff730c74178e77404d9dc1993135a6194c09f487

      • C:\Users\Admin\AppData\Local\Temp\TarB1BA.tmp

        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        8eb50bda241063e043efa5cb1bced8c1

        SHA1

        f663a7c0b16009fe6dd993862b7624c42783a23c

        SHA256

        0066b1cb7a90d4fe907c91f624a3f33c45ea16bc021c3f4cb03663ce1850364d

        SHA512

        b4244883b647fcf41a27306afa405ff10542e0fab4045a9f7946b7d355cb90b7b1b07b807e65824473b1d07178fc2bd1c1a92d045b58aaa57db81d5a899b3ffb

      • F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\_desktop.ini

        Filesize

        9B

        MD5

        a470ca2426c102d035971b2e504d921b

        SHA1

        1720ef61e5c8e2ad6da9992a78940228fc81d615

        SHA256

        13721d3153b316d1b54c64b67de19ae5147cb78e332448e6b800f6d510c269f5

        SHA512

        c12907d26eac47d219aaa47b11d243738b0e698f898f9f2bd199652bc094197227ce12bc5fc96f5da25f1fd7b5904fe71ee3792105b05ac13a135d89aa1c1831

      • memory/1200-69-0x0000000002680000-0x0000000002681000-memory.dmp

        Filesize

        4KB

      • memory/2236-18-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2236-11-0x0000000000440000-0x0000000000474000-memory.dmp

        Filesize

        208KB

      • memory/2236-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2240-207-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2240-148-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2240-155-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2240-161-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2240-213-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2240-652-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2240-1966-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2240-3426-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2952-147-0x0000000073A50000-0x0000000073FFB000-memory.dmp

        Filesize

        5.7MB

      • memory/2952-30-0x0000000073A50000-0x0000000073FFB000-memory.dmp

        Filesize

        5.7MB

      • memory/2952-29-0x0000000073A50000-0x0000000073FFB000-memory.dmp

        Filesize

        5.7MB

      • memory/2952-28-0x0000000073A51000-0x0000000073A52000-memory.dmp

        Filesize

        4KB