Analysis

  • max time kernel
    150s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/06/2024, 10:39

General

  • Target

    ce2387d971a8af8e53009dc953a94c244dcf79c3f2eeb58619ad745a06cc1025.exe

  • Size

    484KB

  • MD5

    a461de7fa5082d5968f543265ef57db2

  • SHA1

    3ed7b5a073cd445a6cf4e0fe591764866a3e4d52

  • SHA256

    ce2387d971a8af8e53009dc953a94c244dcf79c3f2eeb58619ad745a06cc1025

  • SHA512

    04a45befd1504b7a49007c74515ea25be381a6f60512a7c087e8fa4c4cba44f65b13729bfc0e58a879faca3937feecedcd14cacd7a2bc3ae42a2c872c4075f27

  • SSDEEP

    6144:ndVfjmNZz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fa2:77+B1gL5pRTcAkS/3hzN8qE43fm78V

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3472
      • C:\Users\Admin\AppData\Local\Temp\ce2387d971a8af8e53009dc953a94c244dcf79c3f2eeb58619ad745a06cc1025.exe
        "C:\Users\Admin\AppData\Local\Temp\ce2387d971a8af8e53009dc953a94c244dcf79c3f2eeb58619ad745a06cc1025.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3345.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:652
          • C:\Users\Admin\AppData\Local\Temp\ce2387d971a8af8e53009dc953a94c244dcf79c3f2eeb58619ad745a06cc1025.exe
            "C:\Users\Admin\AppData\Local\Temp\ce2387d971a8af8e53009dc953a94c244dcf79c3f2eeb58619ad745a06cc1025.exe"
            4⤵
            • Executes dropped EXE
            PID:736
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1896
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1932
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3908

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        13729088ca6394be7a70125cc9a20819

        SHA1

        9d7da179842c39c76c5935e505207a3c6368a646

        SHA256

        8e2dccdf0d409413317499f4af62726aafc1c4a89c6c452c46961a99cb62ea84

        SHA512

        c6bbcad085c22a54e45e0db21f23bd205040e59f87948028f335d02020c9f022cd278329583baf7bd15577c7f6593a01bc2b5fc57bb10f0606fa527b778042a7

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        ecf81f6bf82c87a81223783118ccd836

        SHA1

        70c041afc525cd43fd3e25e67055765a6edb306b

        SHA256

        646fd70b4ed29535a6dd83c59eaeb6cdc6e87fff1578e1df2a7cec76b65800dd

        SHA512

        012ef0428d43bb88e7905b02614b28bdb0fe2b84e2c5a6321e60eb37aeca70ecc5f5cdfc62b15ebb8bbd665ae3ce4f1f119a258e4da94f5c0d04ce8878df547d

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        636KB

        MD5

        82168b5f40194e6e86457c2b534cfc21

        SHA1

        3e2702a384a03243e98ee6866e09f6d5df9b5de5

        SHA256

        c2f452c90356d0070c71ce17da69c4245dc24f46e1215eca22748567e48279d9

        SHA512

        6d041166b41e4608aa46b1724322a22d49e5d709f4b1bf89d2c6819282a813c88cd74ba6167f337d4d36a741ae53830b04e58e92fbfc597f85cd7f763284c774

      • C:\Users\Admin\AppData\Local\Temp\$$a3345.bat

        Filesize

        722B

        MD5

        03cd882bb262b58f8902a26178a2be83

        SHA1

        3f63bf33b4f4b1e640fca110b3d4e857455570fe

        SHA256

        9f00c4021704daf3a4052b9bbf51d89d88a1279434c2718969af758b2d8a2dec

        SHA512

        c2258115a2c5a79645b6722cd6db1f909471e51f6a09d025aacf3c4ef12a4b3474466b2075ca042d3cb7e610b8e6a13718d656c11c1fa87eb9c23ed3fb8abee0

      • C:\Users\Admin\AppData\Local\Temp\ce2387d971a8af8e53009dc953a94c244dcf79c3f2eeb58619ad745a06cc1025.exe

        Filesize

        458KB

        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        9824fcb8d73fc0c9caeb55befd07ccc3

        SHA1

        92cee0a1ef788ac5285e52b89f8e873695764348

        SHA256

        34afbe9e88896b303341fc0120e574f585e9f10c78ab0a5db008a4576033346e

        SHA512

        9b2c3b78450a3bb8b2bc9862714fa912d23c1e6b78a807cbf59ca3e0ef458d9924743d5d51ce8dc61ecf7d00d33a90c6f3b31247dba0998b6b27e521b1db996e

      • F:\$RECYCLE.BIN\S-1-5-21-1162180587-977231257-2194346871-1000\_desktop.ini

        Filesize

        9B

        MD5

        60b1ffe4d5892b7ae054738eec1fd425

        SHA1

        80d4e944617f4132b1c6917345b158f3693f35c8

        SHA256

        5e9944cc48c7ec641cf7b1b0125f47f26102c371a973612f0583f604bc3900d4

        SHA512

        7f5c200924dbb5531df997e6a35cb94f36b54f5651284b0d6404f0576301125ef72b410a170fca889d46c033063663cfc7791f9e4c3c30695af069053eee66cc

      • memory/1796-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1796-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1896-27-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1896-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1896-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1896-1231-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1896-1248-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1896-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1896-4797-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1896-11-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1896-5236-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB