Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2024 01:35

General

  • Target

    eec3f6d7d66da25a403c600293d487970708157dd208f6e77508e4eda74db94b.exe

  • Size

    68KB

  • MD5

    6a5ba4066e40dd9bf9772295c5f2c6ba

  • SHA1

    d71fa514a359f5ac2bf7a6f245cfd81d92d472d6

  • SHA256

    eec3f6d7d66da25a403c600293d487970708157dd208f6e77508e4eda74db94b

  • SHA512

    9e5626387138cc68ffef1e206486bb234001d6c73395c0303e294a06792c682244787996a29e44f861d08ff9250852b60a549893bccfdfd009c19e78adca89ee

  • SSDEEP

    1536:JLz3SHmLKarIpYeEToa9D4ZQKbgZi1dst7x9PxQ:VkF3pdlZQKbgZi1St7xQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3524
      • C:\Users\Admin\AppData\Local\Temp\eec3f6d7d66da25a403c600293d487970708157dd208f6e77508e4eda74db94b.exe
        "C:\Users\Admin\AppData\Local\Temp\eec3f6d7d66da25a403c600293d487970708157dd208f6e77508e4eda74db94b.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4932
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4537.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2388
          • C:\Users\Admin\AppData\Local\Temp\eec3f6d7d66da25a403c600293d487970708157dd208f6e77508e4eda74db94b.exe
            "C:\Users\Admin\AppData\Local\Temp\eec3f6d7d66da25a403c600293d487970708157dd208f6e77508e4eda74db94b.exe"
            4⤵
            • Executes dropped EXE
            PID:3184
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4616
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4808
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2216

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        252KB

        MD5

        e51b1ea24d8739a33beec03e98ea799d

        SHA1

        359852502dbf1c0e6a5b42f9bd279e3a164c5059

        SHA256

        bfee2fff789c9b51161e79e8d91a226773e5dfb5deb5f8bd2eb94d6cae2d9a61

        SHA512

        04659e8f2d599e4bc36589034ca1b8639e831f2a440ff2dc3c109b73a4d5372b34a43e1a09985623e4f7fac6fd3a4fd1255b591e88cadf234cc20c18c198c10a

      • C:\Program Files\WatchSelect.exe

        Filesize

        338KB

        MD5

        ef134b537e2e118960e622541d9aa6da

        SHA1

        7e485b7d8819814ad8753f1d7b3edf70f62c8540

        SHA256

        64548dd0f04f14a652984a91af95de96e5b8e22ff9e7276f24fb328497981733

        SHA512

        01f35850425e8e87a01e511c86b025e64fcb54376c229faa4c98e83088c5aadf3e2ba2e39e17ab6d95f16ed2daa07230076173656e823451079f46b9d26ed3f7

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        637KB

        MD5

        9cba1e86016b20490fff38fb45ff4963

        SHA1

        378720d36869d50d06e9ffeef87488fbc2a8c8f7

        SHA256

        a22e6d0f5c7d44fefc2204e0f7c7b048e1684f6cf249ba98c006bbf791c22d19

        SHA512

        2f3737d29ea3925d10ea5c717786425f6434be732974586328f03691a35cd1539828e3301685749e5c4135b8094f15b87fb9659915de63678a25749e2f8f5765

      • C:\Users\Admin\AppData\Local\Temp\$$a4537.bat

        Filesize

        722B

        MD5

        884bbcec3095bb67db4ba4e9b1d8651b

        SHA1

        12f86d0ef7ad903a78411535b4e54a1853c7d9f7

        SHA256

        bba99e77c465597f75c8e507d83007033e77039bdcd7aca2cb8082f3ac231e95

        SHA512

        40567c26c34ce059733512da74b09436f95a2b5d397acff6b67804643f8eeabb086e25bee5374dedab90db25acd9ca970382c895ba7b24e631e6a319216db9d5

      • C:\Users\Admin\AppData\Local\Temp\eec3f6d7d66da25a403c600293d487970708157dd208f6e77508e4eda74db94b.exe.exe

        Filesize

        41KB

        MD5

        977e405c109268909fd24a94cc23d4f0

        SHA1

        af5d032c2b6caa2164cf298e95b09060665c4188

        SHA256

        cd24c61fe7dc3896c6c928c92a2adc58fab0a3ff61ef7ddcac1ba794182ab12f

        SHA512

        12b4b59c1a8e65e72aa07ee4b6b6cd9fdedead01d5ce8e30f16ca26b5d733655e23a71c1d273a950a5b1a6cce810b696612de4a1148ac5f468ddf05d4549eed5

      • C:\Windows\Logo1_.exe

        Filesize

        27KB

        MD5

        e64ef364d16ee5080d92a0ce29745a57

        SHA1

        7cad20f8448225d876c51f447fce237435653013

        SHA256

        5bf21661082873e033505e0da51c119acaba12a6d18df121d44e6665a5a065bc

        SHA512

        f483b17532fb65a90952fc4a14492ee29109c1a69b34cfdbde19059438d14d3e42ce7e893f0c4fd794979a5055cc48613cf64486f8e27103b469100f8d1b1ff3

      • F:\$RECYCLE.BIN\S-1-5-21-1162180587-977231257-2194346871-1000\_desktop.ini

        Filesize

        8B

        MD5

        02e4d47cbb9cf2affe1a6d96af753a42

        SHA1

        fe76259bc3376a8aa287867933c6bfd7fdae1944

        SHA256

        8079d35a07b892f00cdffeed754377382353a6e5870c06c02dc8dbaf809d291a

        SHA512

        cc47f23bb8b014458285ee912566350c0d09c49d9e40666790694b4d4d7961abbf7adcf9d54e78571a3b97d27a05c58f3db3fdaaa3f4221130a248ed780a1746

      • memory/4616-27-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/4616-33-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/4616-37-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/4616-20-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/4616-195-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/4616-1233-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/4616-4798-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/4616-11-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/4616-5237-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/4932-0-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/4932-10-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB