Analysis

  • max time kernel
    150s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-06-2024 11:36

General

  • Target

    e263b8c0eab9cbdf8a0fa5360727bdf6ed892097a0990e688de929195f63508f.exe

  • Size

    251KB

  • MD5

    1739f92ac794136b7b005e3a65d03e22

  • SHA1

    3aff88b7c7601941cba191ce2817c3bea01b834a

  • SHA256

    e263b8c0eab9cbdf8a0fa5360727bdf6ed892097a0990e688de929195f63508f

  • SHA512

    35d8a8b579241000bd7cca8c3ec80e3a02d4ae569c08b7fcd2b9d9c028e60954678825c2b26c0efe7fe17f2f46cc00fc839b0d542100296f71201b261a69bb85

  • SSDEEP

    6144:xVfjmNHgiC4bXqsTk90qC1AOb7eswf1Px++fD8PJ:n7+AitXqsTkiR7twRx+gD8PJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3424
      • C:\Users\Admin\AppData\Local\Temp\e263b8c0eab9cbdf8a0fa5360727bdf6ed892097a0990e688de929195f63508f.exe
        "C:\Users\Admin\AppData\Local\Temp\e263b8c0eab9cbdf8a0fa5360727bdf6ed892097a0990e688de929195f63508f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3112
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5014.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1712
          • C:\Users\Admin\AppData\Local\Temp\e263b8c0eab9cbdf8a0fa5360727bdf6ed892097a0990e688de929195f63508f.exe
            "C:\Users\Admin\AppData\Local\Temp\e263b8c0eab9cbdf8a0fa5360727bdf6ed892097a0990e688de929195f63508f.exe"
            4⤵
            • Executes dropped EXE
            PID:1844
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3728
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5072
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3524

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        7922cad8c0422a74df2e2efd0685bd5e

        SHA1

        c2f21be0dbf6e90d1c0ec930172fe2f21d102941

        SHA256

        d8310a01004d293ff22bf3fe012d5d0d3d273055f18df5f8d78c8a243bedc541

        SHA512

        8c2d690e12f7f2d0623f794eb7f838b6d07e91ad0728d34b75d94d3ab8b396bf5ed8d2faaf02d6c76bbd2af4e020c0e57927603006f9dda7e70a4c53f0ceebaa

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        636KB

        MD5

        2500f702e2b9632127c14e4eaae5d424

        SHA1

        8726fef12958265214eeb58001c995629834b13a

        SHA256

        82e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c

        SHA512

        f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c

      • C:\Users\Admin\AppData\Local\Temp\$$a5014.bat

        Filesize

        722B

        MD5

        4372def3c725229af9fa98b10b9d617c

        SHA1

        79d4a721a783efb355a703a2d78ca9cd0ac9851a

        SHA256

        a6b51ed1061ccf323d3a240c743766670a1bdad9fa30c9ad7afce42116f76b8b

        SHA512

        0d124f39777c81989285a47e3c66984d77b4a2db0c59ac5e1ca5c4958bac03caac1a23732288828bc25b781c394de68f0c8b5f281392617f907714171323bf8c

      • C:\Users\Admin\AppData\Local\Temp\e263b8c0eab9cbdf8a0fa5360727bdf6ed892097a0990e688de929195f63508f.exe.exe

        Filesize

        224KB

        MD5

        d4b257c01bbaa68d15d8368475a4e227

        SHA1

        fafae083a882e163cfa8c77258baaab891c17df2

        SHA256

        dd6dd981c7f1a6673dc8cc3a0fe1fc8a54e059a9fdb0545b0dc9258299c0c546

        SHA512

        167494ecb32196e8e199d7d14a1c0498eee45ab8e8862e5441539fa569313bb602b9e979935c7cc5ba39300e54e8bdbdf2f502e4ea24b5e8339fd2c3685ca502

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b18a9ef3a96ff7c62b145fb221a04335

        SHA1

        33e49bd179958d2dd26ff6d9876430fd498935ff

        SHA256

        f19ecc580c12379376d89d827bd47856ced64ce03f780ccb69c4741434db927b

        SHA512

        519a1a00992a2c0b6dcbd36b40c0d780685d7e7158143b9579f492aa140b0480b73d6447019678faf8bf77b60ec93f3ffdb3926a48c2e84a4418fccc4ca1818c

      • F:\$RECYCLE.BIN\S-1-5-21-1337824034-2731376981-3755436523-1000\_desktop.ini

        Filesize

        8B

        MD5

        9bf5ad0e8bbf0ba1630c244358e5c6dd

        SHA1

        25918532222a7063195beeb76980b6ec9e59e19a

        SHA256

        551cc5b618f0fa78108dd2388d9136893adb10499e4836e9728f4e96530bf02f

        SHA512

        7fdce76bb191d4988d92e3d97ce8db4cae1b5c1f93198bffc4e863d324d814246353200d32ea730f83345fcb7ad82213c2bcd31351e905e473d9596bc7b43ad3

      • memory/3112-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3112-10-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-27-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-1231-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-4797-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-11-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3728-5236-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB