Analysis

  • max time kernel
    149s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 18:52

General

  • Target

    3f908c712d5a8a47c15aa8efd1fb61226235e8c652421a0dd1f0ec0eac84c5d9.exe

  • Size

    70KB

  • MD5

    1dddf814870eabf7c23f1ca3df644c7f

  • SHA1

    b4423c6bec684e44c7ea4ef141f26e8891d0d15c

  • SHA256

    3f908c712d5a8a47c15aa8efd1fb61226235e8c652421a0dd1f0ec0eac84c5d9

  • SHA512

    6916d925ef1db6139cea0f16c0c5bfb7c518c99a5da5e7352024d0f74cb1b96f601bb2ad5fa2d18f77b1b2c3903439cb4f107267718ac1948cec78b080737454

  • SSDEEP

    1536:pG3SHuJV9NdEToa9D4ZQKbgZi1dst7x9PxQ:pGkuJVLtlZQKbgZi1St7xQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3360
      • C:\Users\Admin\AppData\Local\Temp\3f908c712d5a8a47c15aa8efd1fb61226235e8c652421a0dd1f0ec0eac84c5d9.exe
        "C:\Users\Admin\AppData\Local\Temp\3f908c712d5a8a47c15aa8efd1fb61226235e8c652421a0dd1f0ec0eac84c5d9.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:440
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3122.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3580
          • C:\Users\Admin\AppData\Local\Temp\3f908c712d5a8a47c15aa8efd1fb61226235e8c652421a0dd1f0ec0eac84c5d9.exe
            "C:\Users\Admin\AppData\Local\Temp\3f908c712d5a8a47c15aa8efd1fb61226235e8c652421a0dd1f0ec0eac84c5d9.exe"
            4⤵
            • Executes dropped EXE
            PID:3456
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4156
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2812
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2636

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        5e3cfdc64c063f5047fd110adbf43afb

        SHA1

        63fe132d348e1e5d481ed43ee570ab5aada89d2f

        SHA256

        3f5a0f5ab4d9c2869298d6bab3afa9de3863cc2725dc653e555f53890ebbdfcd

        SHA512

        64c958b02200d78a2117245fa8b8ca78fc164788cdf379f81debafa4d46a29c5c5f75ffa975732c4824346caccf8759c3dfa17974de358233c9465f07a0df8fa

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        573KB

        MD5

        6888ed3a15891303602fee7e7e081bcf

        SHA1

        94fa23dba875cd612b447fab4461deb7d1c0a75e

        SHA256

        5a13b063fb291c315503d03ee0d2276d73e6ca35131cf45512aff61be9cee8a9

        SHA512

        874a5566cf2a59b0ee5dae76789b75ed35a46492e16554d8b3dc1b13abe8eb0969e59be36f399d83a499926b26f47a5519013f99c376b2dbab5f6e0cffbac4da

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        639KB

        MD5

        fdc5a81c18567cb220564ba55e8d7be7

        SHA1

        dfd68e6c2ee80bca6834cc65acd20ac712763211

        SHA256

        2fa38747faeabdadfee00a92284940d5ba67bd18cc5f2eac1d24b2eb51ef4560

        SHA512

        65459f75900b5e80025e8fa3b02ff74ff87df408c85a811aeee1596aaa071548f63db773ac6418c4d26a98211f5b3997b5e5be6402be0e87d4ab6622eaaeb31e

      • C:\Users\Admin\AppData\Local\Temp\$$a3122.bat

        Filesize

        722B

        MD5

        25a842b3b3c28c13861f8c9658744949

        SHA1

        91c96192a84888ad8a59fa46a2d4e82dfb1b341f

        SHA256

        891dd99bd3cc4943fe4e1e9f1ae1f77aaaf9aaf54e2c0a27405b20eb8c90251e

        SHA512

        5905f1b3db7cc8ab43499196772035a2b31d8fe81486e8420c596694e8c54bcd98ced914e67ad2073c574de4df5ca7442a2308703cd2b9f3512a7b43a0ad5399

      • C:\Users\Admin\AppData\Local\Temp\3f908c712d5a8a47c15aa8efd1fb61226235e8c652421a0dd1f0ec0eac84c5d9.exe.exe

        Filesize

        41KB

        MD5

        977e405c109268909fd24a94cc23d4f0

        SHA1

        af5d032c2b6caa2164cf298e95b09060665c4188

        SHA256

        cd24c61fe7dc3896c6c928c92a2adc58fab0a3ff61ef7ddcac1ba794182ab12f

        SHA512

        12b4b59c1a8e65e72aa07ee4b6b6cd9fdedead01d5ce8e30f16ca26b5d733655e23a71c1d273a950a5b1a6cce810b696612de4a1148ac5f468ddf05d4549eed5

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        113754766d8172742ccc8742b6472f20

        SHA1

        e8b51729aac2693ca4cedc2cb3a6bf9b72112a71

        SHA256

        542e07113e2914f9c23e92a03354fda85325cc74de4ca6668992c44d5f59ede6

        SHA512

        4a762b0e49ebdb6d43ea5c883a3f3590f278b04e576605dbfe50777c1e72d2f22de2df9a42ebeae165a0cf8ac167872676925f2395b34f6ba4c63f6377773bb9

      • F:\$RECYCLE.BIN\S-1-5-21-540404634-651139247-2967210625-1000\_desktop.ini

        Filesize

        9B

        MD5

        fa1e1ef0fdda97877a13339b28fa95e5

        SHA1

        7e2cffca41118e7b2d62963bd940630b15b85653

        SHA256

        968b715c081472526487d60da8968e9b3bde2dac103f69beb3f6abe6ef7bc191

        SHA512

        3d55913a97aa89a7201342705640c1d031d19ad8aca4939219067f84e3fe118f47b4e388f490f69f605683d3854425c3de188f731886405474ae8e3d42c86f4f

      • memory/440-9-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/440-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4156-26-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4156-36-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4156-32-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4156-1230-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4156-19-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4156-4796-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4156-12-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4156-5235-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB