Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 04:32

General

  • Target

    9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe

  • Size

    4.0MB

  • MD5

    07dd49c9cad37d09c88284f194528aa1

  • SHA1

    026a367da035231d2bd0029d8fcbf0a6b41b2d90

  • SHA256

    9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5

  • SHA512

    7a0d32410ef8e9904dce456f59930278d60d9d3d0e325caf7e6dd7ba9c273d42941f7a0c306eb8f3027e57196dc88832c02e6346c59c201ef3058f9fa44c401d

  • SSDEEP

    49152:/7g7jPNDf0q65cSzdVtxbFu5XrkP3NGAFapj7QHExCTM4nf1vNX:UjFDzsVtru5Xro3fEj7QHeWBFN

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe
        "C:\Users\Admin\AppData\Local\Temp\9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a93B7.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2884
          • C:\Users\Admin\AppData\Local\Temp\9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe
            "C:\Users\Admin\AppData\Local\Temp\9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe"
            4⤵
            • Executes dropped EXE
            PID:2464
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2504
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2752
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2608

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              b965dbd07c20e327ffbb6f34ecfb5d61

              SHA1

              8c58cd8d73e543a37ffcc345df98c7a51fdf2bed

              SHA256

              5b22a907554740d6a749a466778f4e6d45d3b3dd201ff8314be097dd9dfff7bb

              SHA512

              fd8fe65d70c1adcb284f267d6aaa0bd52ffe6b3d54aaec207ee7901b3422f5375aeb4629667dab23d7fdb4966fca7c0327f7442816f800c77675de299f219fef

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              4cfdb20b04aa239d6f9e83084d5d0a77

              SHA1

              f22863e04cc1fd4435f785993ede165bd8245ac6

              SHA256

              30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

              SHA512

              35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

            • C:\Users\Admin\AppData\Local\Temp\$$a93B7.bat

              Filesize

              722B

              MD5

              4016d47c327b6119f332fd69fb2b827a

              SHA1

              29a2a40abd505d5eb97d60a54e2e820c6665d0de

              SHA256

              6da18ac64de0c9c566ce9046b92cd09409185294ba396454a7911a72166aadd7

              SHA512

              d2570ddf09337116601c86f238a13ad023bf1a8b786a099fa69240dc062e6eedb2c880a2fc16ec1e984567dcdcf544b88f3d9f46936fe59b7afa88d345680534

            • C:\Users\Admin\AppData\Local\Temp\9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe.exe

              Filesize

              3.9MB

              MD5

              7fe38aececb3c48490557c6ceee88e4d

              SHA1

              08bda6f5ed732cfb43a11b5f5decb7fe4c87e40f

              SHA256

              2ade2855df2d387816c71fa04116eab9a0a992b9cdc3bc7805210c66b0dc9033

              SHA512

              04e7a47c4aa326664e3a97745af3d642adcfceb7e01b91d6e07fda13a33f341537a048faae8d89c85de1821d450dcb014fabef2f6aa5ee49afcb780bc4c9254f

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              d58f0bf696ddc361fd79469edc067abb

              SHA1

              18f184b2f9101b4a79066f34f882ca2f62f5a679

              SHA256

              935ac18df29846c9ea3e7be82298de61c749498d784536af4f809e22a1f629df

              SHA512

              8d82a3febc173f1d61a5778d1ae9cf982db069906df7dc0a818fc0524ee203979a4b9939ef638120e2fdb98295229528b3115d8297d4b6549341eaf4313877b2

            • F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\_desktop.ini

              Filesize

              9B

              MD5

              3b22ce0fee2d1aaf2c66dcd142740e29

              SHA1

              94d542b4bb9854a9419753c38e6ffe747653d91c

              SHA256

              8284772f28954a109c16f1583e6e34e29f06673b34e04f268bda961b57ba9f79

              SHA512

              efd4900a49624170e51ea401f0845634f49484a49335845258dc3d41a12e2022bf413a6751fcbcfd1ec68cde506f3363beae57f20e8eaca8b214d28baa138c5b

            • memory/1204-32-0x00000000029C0000-0x00000000029C1000-memory.dmp

              Filesize

              4KB

            • memory/2464-35-0x0000000000400000-0x00000000007FA000-memory.dmp

              Filesize

              4.0MB

            • memory/2464-44-0x00000000001C0000-0x00000000001C1000-memory.dmp

              Filesize

              4KB

            • memory/2464-30-0x00000000001C0000-0x00000000001C1000-memory.dmp

              Filesize

              4KB

            • memory/2504-109-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2504-1863-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2504-3325-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2504-42-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2504-20-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2504-51-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2504-99-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2504-107-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2504-34-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2504-536-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2612-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2612-17-0x0000000000220000-0x0000000000254000-memory.dmp

              Filesize

              208KB

            • memory/2612-15-0x0000000000220000-0x0000000000254000-memory.dmp

              Filesize

              208KB

            • memory/2612-18-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB