Analysis

  • max time kernel
    37s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2024, 02:29

General

  • Target

    e9eff95faedfc5a7e20d9e104e5b8e85f8757dff9836db61689e41757d4e9818.exe

  • Size

    369KB

  • MD5

    d24ddae6eb4bb284c302d5c36cdbbbef

  • SHA1

    e1f77738b39c6e54161445b972d88d6b011e5c71

  • SHA256

    e9eff95faedfc5a7e20d9e104e5b8e85f8757dff9836db61689e41757d4e9818

  • SHA512

    dee4e5c1cfef4964bb6c73d6286f24370e18313709963055416b849572a49f5c39103b0e15b097635be65aa700d1bfcaaabbbe0a0327efbf8a7c771380c9c168

  • SSDEEP

    6144:OqG5KOzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:OqPmU66b5zhVymA/XSRh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3516
      • C:\Users\Admin\AppData\Local\Temp\e9eff95faedfc5a7e20d9e104e5b8e85f8757dff9836db61689e41757d4e9818.exe
        "C:\Users\Admin\AppData\Local\Temp\e9eff95faedfc5a7e20d9e104e5b8e85f8757dff9836db61689e41757d4e9818.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3588
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4684
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2352
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a30D4.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3848
            • C:\Users\Admin\AppData\Local\Temp\e9eff95faedfc5a7e20d9e104e5b8e85f8757dff9836db61689e41757d4e9818.exe
              "C:\Users\Admin\AppData\Local\Temp\e9eff95faedfc5a7e20d9e104e5b8e85f8757dff9836db61689e41757d4e9818.exe"
              4⤵
              • Executes dropped EXE
              PID:4484
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4384
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:912
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:4092
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3440
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:680

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            354241349b608202b5c359d6a8d31eb5

            SHA1

            4466156f6d679e8a842d211052a725fd1f30a20d

            SHA256

            7f9b735658a32a095e3381e9002bfb638b6c441cb5236c23d542c41c9800dcf2

            SHA512

            c201adc0081cbee4cbc531b09b65468769bd26f2bceb21594ba2dabe2a3aef42af726dfffe1cd37fdf7c475c24ddb46c6faac1dfe1132cb41cd99adc18640020

          • C:\Program Files\7-Zip\7z.exe

            Filesize

            128KB

            MD5

            81fe71b8e8c8278859b225c3d0d0d1a7

            SHA1

            d3487ac14ccf04238ceb40338e8d3c9afad69f01

            SHA256

            0c8d4a79698399e7b809a1f85929db1614ab5b5da7b30b96f39ee6fe12340ca6

            SHA512

            9f161a9dbf574a241ce8169693188845ec5648c66d65c135c7d6d1c120a14f70cc43f3b53b9235e37cec84943d5298e4a5be65436521f089911a801b1ffd8e16

          • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

            Filesize

            448KB

            MD5

            6d612701c130cf1af004e8b80a4ffc1b

            SHA1

            aa9c0081100dbfe573402c0ad582b3591ffcc8c0

            SHA256

            790e9b535d28a784ee6c50d34cc176c370d3ba1f66f6f6da9145869362a33578

            SHA512

            bca30dfa6cd71544301cf59abbb5f166933c59a6719d64b8f2efc44955a149415d8bed4d5366e7561ee7470990fe7ddf3b9abb22dba7b88e065a44a321a60750

          • C:\Users\Admin\AppData\Local\Temp\$$a30D4.bat

            Filesize

            722B

            MD5

            4e170524e7f9da6aa3447b9b3e24bac0

            SHA1

            ea429f73d2a841be8e324c0490a62744f7e6b0ff

            SHA256

            7ba53037e1fcc1227d29e0f4dff0aa0e2c0013675724be8c7a37f9b1aa7adbb8

            SHA512

            18ed67a0f4798ace429655ca73ef960fb6f812a9d70fc5da2db889f9624fe5ec56a958835939a9bd3aacd5a3211f88a59d0d8a8fc1456dc9239e1aa24b30b65d

          • C:\Users\Admin\AppData\Local\Temp\e9eff95faedfc5a7e20d9e104e5b8e85f8757dff9836db61689e41757d4e9818.exe

            Filesize

            335KB

            MD5

            40ac62c087648ccc2c58dae066d34c98

            SHA1

            0e87efb6ddfe59e534ea9e829cad35be8563e5f7

            SHA256

            482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916

            SHA512

            0c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            faf698c6bc8a6f58f9bae312ee973faf

            SHA1

            aecfda4eee59acb5be6fa476e8ea43cd746fcb88

            SHA256

            4716a1af75b8d3043d7cadc7cf8d5d5c96d74552ae00c6af3dbfe05e1dc6945e

            SHA512

            62d48ba8c4aaec7761f598b8b26fbaa529c7cbdd9e8defa58d4aebd31bf8f84f1e281937d1dc8f4495378a7d3911b11ab244b1ddfacb359421704cd4ca706a33

          • F:\$RECYCLE.BIN\S-1-5-21-4018855536-2201274732-320770143-1000\_desktop.ini

            Filesize

            8B

            MD5

            8de83b88f7ab26b8a33a1eeb970a7bc8

            SHA1

            ad3208ec0bdfacd12ad7291d0259ef41b6bfc425

            SHA256

            499baf65b91c9fff00cab334a4d8ab59d253993f173da5c33ff01ea4afc217fe

            SHA512

            9272af088cc70ebeb388cefda678d35e649433d3a6c5715f3537e2832b3fead9568d58a026c36ab711fdef87597419e8be80a5d809530a933f72328c413a5d7e

          • memory/3588-0-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3588-10-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4384-17-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4384-4239-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4384-8699-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB