Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 09:17

General

  • Target

    c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe

  • Size

    515KB

  • MD5

    20e02be51c1ff69bb57d36541f46ca37

  • SHA1

    06e01e0fb8b5a9e0c2b29e771b8eff52f3b5046a

  • SHA256

    c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82

  • SHA512

    4ecac9ff8c608bb77c9dd2fe864b26c5dfb2d4ba6868dd1250e0c37ea77d9d3ed4c1102bed599c7dbb1a75ebcac70bada5b99f314bdc67515265fab003dc200e

  • SSDEEP

    6144:5uJeVK6qoJmiqV3Iv0dQwxOWMYty+Nm6lxpvc5ihULkfIExFaHxXCD1wBJQcYbVC:JVKGW00SgOWMY5NmIvc5KfxHaFJB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3524
      • C:\Users\Admin\AppData\Local\Temp\c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe
        "C:\Users\Admin\AppData\Local\Temp\c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3240
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE6D6.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4456
          • C:\Users\Admin\AppData\Local\Temp\c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe
            "C:\Users\Admin\AppData\Local\Temp\c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe"
            4⤵
            • Executes dropped EXE
            PID:4708
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4484
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4980
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2552
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4356,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=4424 /prefetch:8
        1⤵
          PID:3084

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          254KB

          MD5

          15fc4128f757c2330dffa91f5545b44e

          SHA1

          1be43151179b1727f754a129c6222b0936bef468

          SHA256

          2d909fc004a3492877512429c5d08df6161f63353bbb557a64b50d0e21bb2a49

          SHA512

          b0a666b25a5e938561d792aa969b4f007aafef8063d731c36fa02f57d2df0065f10e8d0827488c8dc6e3243c6b749bc64ed73b8a64ccad471362f3cfd16dddc2

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          573KB

          MD5

          76f559d129c4a8a436eb4a818b604c95

          SHA1

          15336c874b83bfff0293888cd50582e31de77ada

          SHA256

          d3d57c3c00392b40e291978f67e1929ba19567c3fe846a7bd2f1849fb8b4c43e

          SHA512

          37d931ef112428bf3f5e7d035129f826e0d9685c41616dfcb4be6527a47aeb4d9c543efbdfe5a7f9b9ac0df708d6755b554203c5ae98ef7857891289c7d05fc5

        • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

          Filesize

          639KB

          MD5

          f727e821e2918b7d1a807a953accbce7

          SHA1

          05ca4e9031a99a76be39f38d9330b2b907d9769b

          SHA256

          a6b2c3ece60b03faa52851b97f62d9aac709fb175aa4ff4dbc097f4c6c0ac3ef

          SHA512

          3b27c3a93b1e14cfec4e968bff43fd2590b7e6ce69a3228ce02fe7dc936988547f2ae771406983e9b348224a5227ce274fbfd3e1a3024c8f4c68a4dacc450e39

        • C:\Users\Admin\AppData\Local\Temp\$$aE6D6.bat

          Filesize

          722B

          MD5

          9222504d0515c2626da2283d8c0e9040

          SHA1

          46a51b4448cccb6c9330d369a0e07060b2f3aed1

          SHA256

          83feaaab2624930b5e27b2c02e973cc2f4824880bc0cccf4b141fd4bee3a3a5b

          SHA512

          8f436f2c59acfe4084e49d277a16e5da57571f1fc3fa1987df494475a8b7f1db38734688d08013bb91e037369bde0d96d2d7e2e24623b161ae3b6320ebe6b5cd

        • C:\Users\Admin\AppData\Local\Temp\c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe.exe

          Filesize

          486KB

          MD5

          0319d23a5b85b2fd83da101229a0784b

          SHA1

          876ef2ab9d62f80ed7c691715123f9ebe4e07e6e

          SHA256

          4ee9a5f339076ea65fb17a15a2bcd6a1c21bbd7db7b8fbd7a8ee178c8a3551ae

          SHA512

          c58f23c7cb888e2a6d535b6f11200dd6b0f668b24aa22dea8fe80bf0c0d26ea054c41b7422fc80bd2c7c76783f55c2ca9f874eaa4560f08a805bfddcd639d72a

        • C:\Windows\Logo1_.exe

          Filesize

          29KB

          MD5

          cbb85133030f0d4412d80c949bbaf411

          SHA1

          57898b4c8d29336bb66a7e0db0d612e97777d5e8

          SHA256

          2e1e7e6847838b8a544662092e1293c560f5339dd60b2c863465a5e2f2e026d7

          SHA512

          d58bcc296ee8b679bdb0506d91dd64e676d24a09a9bf7f23cff1b618af1569ae4efbd8a920e1fd07eb289df8edc09488fb24cff15312c721d110f2ccd31515e6

        • F:\$RECYCLE.BIN\S-1-5-21-1181767204-2009306918-3718769404-1000\_desktop.ini

          Filesize

          9B

          MD5

          fa1e1ef0fdda97877a13339b28fa95e5

          SHA1

          7e2cffca41118e7b2d62963bd940630b15b85653

          SHA256

          968b715c081472526487d60da8968e9b3bde2dac103f69beb3f6abe6ef7bc191

          SHA512

          3d55913a97aa89a7201342705640c1d031d19ad8aca4939219067f84e3fe118f47b4e388f490f69f605683d3854425c3de188f731886405474ae8e3d42c86f4f

        • memory/3240-10-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/3240-0-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4484-30-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4484-40-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4484-36-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4484-1240-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4484-23-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4484-4878-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4484-13-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/4484-5323-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB