Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 06:58

General

  • Target

    c383580391fac6b52221a73d95a5b4c289d40454ac86fa0e84a5e3d5292aa37f.exe

  • Size

    29KB

  • MD5

    b5ca8bacca3ef773bdb62800d0598264

  • SHA1

    8288970776150108ce27ee6b8041d8597b636901

  • SHA256

    c383580391fac6b52221a73d95a5b4c289d40454ac86fa0e84a5e3d5292aa37f

  • SHA512

    18e69a447cd15739cbbdf0afb14fc6c06729717890828be7a39a947d804f06d7df9aad11688594d474d80a6cf6b757691f22206022732fa78c7f776584f3fa20

  • SSDEEP

    384:NbbA+KIft1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:p6g16GVRu1yK9fMnJG2V9dHS8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3532
      • C:\Users\Admin\AppData\Local\Temp\c383580391fac6b52221a73d95a5b4c289d40454ac86fa0e84a5e3d5292aa37f.exe
        "C:\Users\Admin\AppData\Local\Temp\c383580391fac6b52221a73d95a5b4c289d40454ac86fa0e84a5e3d5292aa37f.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1308
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2376
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1912
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4500,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=4216 /prefetch:8
        1⤵
          PID:4312

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          254KB

          MD5

          4358b42e9a78a50138303db5e5195b70

          SHA1

          f0e679f67f5d345a60f041afced3b7d66f99ccc5

          SHA256

          f65048220efb299ef26c562a13a956605d59848f3cceb00c7ced0ea9e447226c

          SHA512

          008b89656992b04ba27b365c42f3daa6b0b21b9804d53a6e4b41907a653f4093086c2c4a2088081e04ef4f9a29d64a4e5138aee23ae75a3e6458eba8819fdbf3

        • C:\Program Files\dotnet\dotnet.exe

          Filesize

          173KB

          MD5

          ef26dd6c4f6b62774e524d1704cac0d7

          SHA1

          f352342cd6ee85243bfd1deaeb3f5a4b82b79820

          SHA256

          44fc47eda68a2ce7b426dcc1345add6a5a5fb4a7616a9c663c05724d22994d1b

          SHA512

          af715d9150a286068308f91261e85960e5a61f4d43e5cae5631a412b84eaedd16fcb318de9aa7fdec62c36a92192ff71641533fa71d390cf8ef29b2fed16076a

        • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

          Filesize

          639KB

          MD5

          1010b22672d60223d3449e34e742de82

          SHA1

          d2b0717b5d13bce7540ef284eaaaaec0d43e54ff

          SHA256

          63d148b4110e4050b82cacdb7be0a004eba84c33c971f56873998ec59ac354fc

          SHA512

          1fb0fffed9f5de2551f8fb7821588f7c7773bb89f34bf8708833888cdbcd3da7c8b0301599aad129774ab272b7fd8cfb39ea361c23491aaa8bdbf6ccb1333e1e

        • F:\$RECYCLE.BIN\S-1-5-21-1181767204-2009306918-3718769404-1000\_desktop.ini

          Filesize

          9B

          MD5

          e850d9ceb7ebcc619d731dc2f1377b2b

          SHA1

          a45553c9057075c02e28f90d5e8ea57a0dddbacc

          SHA256

          b682a6e85069777ca22f84b99607acd09640eaa80029d74363c0a5aabddead4c

          SHA512

          be92bd8393d0fe69559ec55e1068fcd77ccc699361a9cb98d467bd51a029c371852b7a1196ad53fa8865e956582e6a4d35f6ac6fea3832058b7a427133b0048c

        • memory/1308-0-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/1308-5-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/1308-12-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/1308-18-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/1308-22-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/1308-1222-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/1308-4860-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/1308-5305-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB