Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/06/2024, 02:42

General

  • Target

    5db8f82fe70f253ee38a5e3eadaae54b84c870d742b4fd485f24ee9abfe393e2.exe

  • Size

    710KB

  • MD5

    26429c6d21c656747e6bfb417c359661

  • SHA1

    05fd0dabf6b9fc863031d13dacc51bd444694194

  • SHA256

    5db8f82fe70f253ee38a5e3eadaae54b84c870d742b4fd485f24ee9abfe393e2

  • SHA512

    3873fb3e72003cd520e39754785e650be4c3b94a00dc1652e95ed9c0acefce61e36696cb16bf2b32c6895e81c7dbe791c3f906801c58f19c30b2c6560b73f2cc

  • SSDEEP

    12288:77+IF7M9RCOr5HS2q9SelLrRsPx64XYH519ZJJn2rYTdY/mx:77ReRt4blvOBqrZuYJR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1392
      • C:\Users\Admin\AppData\Local\Temp\5db8f82fe70f253ee38a5e3eadaae54b84c870d742b4fd485f24ee9abfe393e2.exe
        "C:\Users\Admin\AppData\Local\Temp\5db8f82fe70f253ee38a5e3eadaae54b84c870d742b4fd485f24ee9abfe393e2.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:612
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a7501.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1904
          • C:\Users\Admin\AppData\Local\Temp\5db8f82fe70f253ee38a5e3eadaae54b84c870d742b4fd485f24ee9abfe393e2.exe
            "C:\Users\Admin\AppData\Local\Temp\5db8f82fe70f253ee38a5e3eadaae54b84c870d742b4fd485f24ee9abfe393e2.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            PID:2200
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1740
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2468
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2708

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              a3482d38fb05ed4551015ce2eaaa84ea

              SHA1

              50529e4b2da222e5f52e8f93bf9a7a4d240664b2

              SHA256

              7a87ec80697f5f137b7a163573a85294a0730702b57956053a0bdc19350397bc

              SHA512

              a776433be08b39ac207a911f3beb73d9a0f9ca40556aa0593f2b59d43fd60f928f4430c91037b2a64097ff4abc7aa562117096eaea827eb43851c88edeee37b6

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              99ea9b604a7a734d3087fa6159684c42

              SHA1

              709fa1068ad4d560fe03e05b68056f1b0bedbfc8

              SHA256

              3f733f9e6fec7c4165ca8ba41eb23f604a248babe794c4ad2c6c3ce8032aab1c

              SHA512

              7af8008c7e187f925c62efc97e1891a7a38d089302dba39fbde137fb895e0592847ed0982c824c2075be8e6b95b6ce165ecb848ab85adf53779ebef613410fbb

            • C:\Users\Admin\AppData\Local\Temp\$$a7501.bat

              Filesize

              722B

              MD5

              13a13d22b9308f642ef3daf10bd84f52

              SHA1

              68e1870cedb306f1fd9afc84684182b4ee573dba

              SHA256

              580722a7121abd53948921e29b9030ccdc3a1895b5028f3188bc188c75e7e0b0

              SHA512

              bb6daffa1884257f4e3a32d87478f57da0e5592cb483eba057523b9750dc0d38e29c0e6ac68b3c2e2d2916b15fb7755ffc1683b2ffb9f37d7ac38fae796f5779

            • C:\Users\Admin\AppData\Local\Temp\5db8f82fe70f253ee38a5e3eadaae54b84c870d742b4fd485f24ee9abfe393e2.exe.exe

              Filesize

              684KB

              MD5

              ed0293bc477e35dda89125b49bb84910

              SHA1

              7201fff9aaf0a437c948b8320488cdacdd9da1ee

              SHA256

              89d561f1f606b3dc7e8bbe1341fdd4eb359443885b1ab0d55f9528a9464d1a96

              SHA512

              fcd103ce684e015609bce13b4f718f5de52f2ab202da3ee69d14303205b05d790140df6e4e62087460700809bd42842b30218c94b71ce656916174d2a5eedb97

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              7efbd2fe00598632f908c56af9fa85ba

              SHA1

              af7c0515e544a6b2532b527325064fbabe937eae

              SHA256

              a605256d75cfcd8a6ac740f8f08303ba8519be9b924a3d74ad32af93f1b570d8

              SHA512

              1288dc3056685167e795de758565f7f8f41d2c2b301a35c8d84f63fbba8d46cd4ef28d8fb9b00cd9177260df50111c66829dec6cb7759f15cd87280624487679

            • F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\_desktop.ini

              Filesize

              9B

              MD5

              60b1ffe4d5892b7ae054738eec1fd425

              SHA1

              80d4e944617f4132b1c6917345b158f3693f35c8

              SHA256

              5e9944cc48c7ec641cf7b1b0125f47f26102c371a973612f0583f604bc3900d4

              SHA512

              7f5c200924dbb5531df997e6a35cb94f36b54f5651284b0d6404f0576301125ef72b410a170fca889d46c033063663cfc7791f9e4c3c30695af069053eee66cc

            • memory/612-15-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/612-16-0x0000000000440000-0x0000000000474000-memory.dmp

              Filesize

              208KB

            • memory/612-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1392-31-0x0000000002730000-0x0000000002731000-memory.dmp

              Filesize

              4KB

            • memory/1740-100-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1740-43-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1740-54-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1740-35-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1740-110-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1740-192-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1740-1864-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1740-3326-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1740-18-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2200-36-0x0000000000400000-0x00000000004B1000-memory.dmp

              Filesize

              708KB

            • memory/2200-45-0x0000000000320000-0x0000000000321000-memory.dmp

              Filesize

              4KB

            • memory/2200-27-0x0000000000320000-0x0000000000321000-memory.dmp

              Filesize

              4KB