Analysis

  • max time kernel
    153s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 18:30

General

  • Target

    a7e9ac6ea4c507a86350c65f7a47cb5754365acc472321ad4982d9e63cf71c10.exe

  • Size

    957KB

  • MD5

    b6eb519f9d99a37e6435c3c0e5621a8f

  • SHA1

    ae283a2450c3362365ffcc9f8d0e7934eb1d0bd4

  • SHA256

    a7e9ac6ea4c507a86350c65f7a47cb5754365acc472321ad4982d9e63cf71c10

  • SHA512

    0a567a0ab98082be0ae28b39e0e561e0b5452244fe13b08a57bb1804e99ba363b6202531ee3bfbb58aa6f5b790b81d86dc96403efb8f31bbcebf6914a62d7081

  • SSDEEP

    12288:8p7RKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:8pEBpDRmi78gkPXlyo0G/jr

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\a7e9ac6ea4c507a86350c65f7a47cb5754365acc472321ad4982d9e63cf71c10.exe
        "C:\Users\Admin\AppData\Local\Temp\a7e9ac6ea4c507a86350c65f7a47cb5754365acc472321ad4982d9e63cf71c10.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4504
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a2759.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:416
          • C:\Users\Admin\AppData\Local\Temp\a7e9ac6ea4c507a86350c65f7a47cb5754365acc472321ad4982d9e63cf71c10.exe
            "C:\Users\Admin\AppData\Local\Temp\a7e9ac6ea4c507a86350c65f7a47cb5754365acc472321ad4982d9e63cf71c10.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2128
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3920
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4744
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1976
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:740

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          252KB

          MD5

          0b2679dc1eb882abf56d11ca591aeb76

          SHA1

          7a5c7ff9a42f9c84873d269d1e776a89045a1f45

          SHA256

          3d1b129d45f7fe6c861e380906a0c97576a804240426a0d2408f131cbaedc354

          SHA512

          8661ecb16631ac033db4d7ee8aa291647ca3311888988693633acd1a69fd9d6eb890c94c97656602c47964219a082f875bce41710fe036cf546c29ae49e2e114

        • C:\Program Files\UpdateResolve.exe

          Filesize

          216KB

          MD5

          6a6e8352439ea7bb60eee4e643999a14

          SHA1

          9ec88c6e5042cce3b26e3b7f8e1c0d1e015a815b

          SHA256

          2d7fbd880a8223dd6bcb5d9d97059200960c2b153ebce0c13de653674c9a7c1c

          SHA512

          23d5318c80c15f0d4f48bc87f53432b10fc563b17a6b7769ca7c6f50ec87ee980c6f7e1962303e1faca31738131c357506481c2841bd3e6d3bf4677a215bcac7

        • C:\Users\Admin\AppData\Local\Temp\$$a2759.bat

          Filesize

          722B

          MD5

          0d9761394797ac29226d12ff4c06bf25

          SHA1

          3a6217bacd9f47ff8571165f2b8e0546f3483c74

          SHA256

          313d4abe26b4524042ab4ec39f355718bb5acacb390f09484520a81e50e4fbe8

          SHA512

          c0dca0ce6b14e92310355c4b557f152b6098c03416abdda05416b8ab33045149f3fbea62f97bbb9ce4c5aad15da8d29d697313fc53739d4bc6364ec57a818d74

        • C:\Users\Admin\AppData\Local\Temp\a7e9ac6ea4c507a86350c65f7a47cb5754365acc472321ad4982d9e63cf71c10.exe.exe

          Filesize

          930KB

          MD5

          30ac0b832d75598fb3ec37b6f2a8c86a

          SHA1

          6f47dbfd6ff36df7ba581a4cef024da527dc3046

          SHA256

          1ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74

          SHA512

          505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057

        • C:\Windows\Logo1_.exe

          Filesize

          27KB

          MD5

          d0d42004d5e14fecf764dc99963c82fa

          SHA1

          2b05a3b17e23a16df2a838d31d8c4113993dd833

          SHA256

          fe58d080c6a43f69deaec1b3fa9ffa2963dd9a3384b6f3aa9895c4dd2c485a8f

          SHA512

          72f9b71e46512dfcec9bd294930cc9a01acdb8c5b33a3c9a48c9475889f300e35d13191e5868c9798fd335af5a32793f19180b9d015ec18d2b112d0ac1749bee

        • F:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\_desktop.ini

          Filesize

          9B

          MD5

          3b22ce0fee2d1aaf2c66dcd142740e29

          SHA1

          94d542b4bb9854a9419753c38e6ffe747653d91c

          SHA256

          8284772f28954a109c16f1583e6e34e29f06673b34e04f268bda961b57ba9f79

          SHA512

          efd4900a49624170e51ea401f0845634f49484a49335845258dc3d41a12e2022bf413a6751fcbcfd1ec68cde506f3363beae57f20e8eaca8b214d28baa138c5b

        • memory/3920-27-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3920-19-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3920-33-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3920-37-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3920-39-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3920-42-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3920-72-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3920-1183-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3920-2038-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3920-4304-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3920-9-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/4504-0-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/4504-12-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB