Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 12:54

General

  • Target

    2a5b6d0a372e5c0b89c6c0f5ee400fd05bd130f5ffecafb7f7ecdd4e1e1e7f34.exe

  • Size

    2.7MB

  • MD5

    e9e2646b9d402452b852b96c29b27a1a

  • SHA1

    d4284a8fcfbb849a32a0d6aae983a96da70522ba

  • SHA256

    2a5b6d0a372e5c0b89c6c0f5ee400fd05bd130f5ffecafb7f7ecdd4e1e1e7f34

  • SHA512

    37a399ba4439a152e004ce22c51d286b86a86bca86ac5851b85ad015fdfc606ac683e4c2bce2b281c0d78b088df9b0f74ee0cc0472307d63cb11ef13476c2fea

  • SSDEEP

    49152:Z7QnGW4GQphM8gHoz0+vaQjz7i0r2QGXOcNA+0XBZgcqcocP:xFTJIdK2QF/

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1408
      • C:\Users\Admin\AppData\Local\Temp\2a5b6d0a372e5c0b89c6c0f5ee400fd05bd130f5ffecafb7f7ecdd4e1e1e7f34.exe
        "C:\Users\Admin\AppData\Local\Temp\2a5b6d0a372e5c0b89c6c0f5ee400fd05bd130f5ffecafb7f7ecdd4e1e1e7f34.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1692
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a8BEB.bat
          3⤵
          • Deletes itself
          PID:2688
          • C:\Users\Admin\AppData\Local\Temp\2a5b6d0a372e5c0b89c6c0f5ee400fd05bd130f5ffecafb7f7ecdd4e1e1e7f34.exe
            "C:\Users\Admin\AppData\Local\Temp\2a5b6d0a372e5c0b89c6c0f5ee400fd05bd130f5ffecafb7f7ecdd4e1e1e7f34.exe"
            4⤵
            • Executes dropped EXE
            PID:2600
          • C:\Users\Admin\AppData\Local\Temp\2a5b6d0a372e5c0b89c6c0f5ee400fd05bd130f5ffecafb7f7ecdd4e1e1e7f34.exe
            "C:\Users\Admin\AppData\Local\Temp\2a5b6d0a372e5c0b89c6c0f5ee400fd05bd130f5ffecafb7f7ecdd4e1e1e7f34.exe"
            4⤵
            • Executes dropped EXE
            PID:2380
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2620
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2536
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2456

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              a4be970114fde7b4347a171ef559737b

              SHA1

              9ff5a5c55eca69d00aa5cf88a86831f2954ee214

              SHA256

              54f93dd3fd4b973502236e7372591290aef4913ed31ab38fa17c4b0e52b86e21

              SHA512

              e4fb957ac171ac1bbca431fbfbb8c9142b5493e3b875db7f61182c91adce87d29b410c766d5043b8bee276f9024b7b14ee636106a037db8f35d545b20ec635ce

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              99ea9b604a7a734d3087fa6159684c42

              SHA1

              709fa1068ad4d560fe03e05b68056f1b0bedbfc8

              SHA256

              3f733f9e6fec7c4165ca8ba41eb23f604a248babe794c4ad2c6c3ce8032aab1c

              SHA512

              7af8008c7e187f925c62efc97e1891a7a38d089302dba39fbde137fb895e0592847ed0982c824c2075be8e6b95b6ce165ecb848ab85adf53779ebef613410fbb

            • C:\Users\Admin\AppData\Local\Temp\$$a8BEB.bat

              Filesize

              722B

              MD5

              4c9da1ffd0bb2e7ef029e2218a4b377a

              SHA1

              f9a7b482cf726245b5420fb2ed88dee5c8dbde90

              SHA256

              a15cbb717a0b6a8a416a57a678eb8852d17d2e3205c3e01e4924425309d0f616

              SHA512

              a72d32beaffc597c5f1ca0c5c40095440a3327151fd7cb12894fa8f7749769d530e0fa2d53b5112e946ba37c2ae61806f663dae65fef27faa47542050ae88349

            • C:\Users\Admin\AppData\Local\Temp\2a5b6d0a372e5c0b89c6c0f5ee400fd05bd130f5ffecafb7f7ecdd4e1e1e7f34.exe.exe

              Filesize

              2.6MB

              MD5

              ea473dc8d0af2407234bcf39c8960f52

              SHA1

              000b72c6d34a7e71f300dcbd3d183030f1d082ee

              SHA256

              1a07065356771c16dd691fe0606f649f7857c39387e3b528a9bb6f1b20f228c4

              SHA512

              7ea2a2bfd6d3408f3131b58bf938d85508d25a1196d65ce6bf9e4372c14054ad19198f875f348b1b7a86ef47b3b9371f124bfb7a47682566a13098c7b2dce2ab

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              86f9430d4925c4f45151eea124081d83

              SHA1

              52df34b47184ed2700bbd92b68874c73592b6d1d

              SHA256

              41b9e2bf3ce43d681d6dde91ffff8a23adcc4da2076516de2bf2631708b74350

              SHA512

              910bce524874bbe43de4e9309b1e7aa6a547a6592e3cdcff1f992c156142dc4bf493d23218f635bb6f6366bc1616d96d6ca885d651c0b4be87ab845901f4e3e8

            • F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\_desktop.ini

              Filesize

              9B

              MD5

              a470ca2426c102d035971b2e504d921b

              SHA1

              1720ef61e5c8e2ad6da9992a78940228fc81d615

              SHA256

              13721d3153b316d1b54c64b67de19ae5147cb78e332448e6b800f6d510c269f5

              SHA512

              c12907d26eac47d219aaa47b11d243738b0e698f898f9f2bd199652bc094197227ce12bc5fc96f5da25f1fd7b5904fe71ee3792105b05ac13a135d89aa1c1831

            • memory/1408-64-0x0000000002570000-0x0000000002571000-memory.dmp

              Filesize

              4KB

            • memory/1692-15-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1692-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2620-69-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2620-76-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2620-82-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2620-128-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2620-134-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2620-575-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2620-1887-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2620-3347-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2620-17-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2688-58-0x00000000022C0000-0x00000000022C1000-memory.dmp

              Filesize

              4KB