Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2024 22:48

General

  • Target

    f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c.exe

  • Size

    573KB

  • MD5

    aaee7926f1d4dedfae7ccaea011220ed

  • SHA1

    6962a9c655a8825f1758266a3ef73ac91dec0ed0

  • SHA256

    f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c

  • SHA512

    66628592bd6d2df624c0922d1c61b996a113d5e19d626b7c0b7270cdf72e3b419969dbb3c8409b8f11e7a71aad6d193c82a75a390af721948958adfb9d99974b

  • SSDEEP

    6144:4uJpE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQfu:s7a3iwbihym2g7XO3LWUQfh4Co

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c.exe
        "C:\Users\Admin\AppData\Local\Temp\f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a2CDA.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2412
          • C:\Users\Admin\AppData\Local\Temp\f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c.exe
            "C:\Users\Admin\AppData\Local\Temp\f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c.exe"
            4⤵
            • Executes dropped EXE
            PID:2748
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2464
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3052
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2644

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        eaafac1d54759eb89af2aeaddcaf0828

        SHA1

        78f325b16ce3e651e1c7eb7c871f72a4bfd620cb

        SHA256

        b781177dade8538ec18a7988488fc8932e049d95823910c9615e22550ef00882

        SHA512

        82d9128cd9bf34f636dd76ac5fb0d02d2d5b50be03914c2d42db107cf51d3318effe50013ead12be81190abae9336ce813b07bf800c3bd82b0967cfde6acde64

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        474KB

        MD5

        c14a5111b798cff20d7d66b0e035d409

        SHA1

        29f0894552b30815fed6ad231b5721e876869552

        SHA256

        fd6f57dc1b82f6301cbecbf9db5728a9a69b10e3edbf4f8a1dfef571c77a6cb6

        SHA512

        a4d8b74216c76fa3d48ab7300452725602bc6d5bcc0e6c23d458d65362cd24751f23755180ae69633090b172e95f18f225c0cb4a71dd1e050d8b3dff466e7f1b

      • C:\Users\Admin\AppData\Local\Temp\$$a2CDA.bat

        Filesize

        722B

        MD5

        22d211040a176ca55a9bb10d454493e7

        SHA1

        c7df1efb52f1cd14be7bd704df221422ff90d218

        SHA256

        3b9e5b605156bdc1d7a98a43fd57618f58acb77f7cc5a8b542e05f98784d144f

        SHA512

        059dbafec84abdc470045146a74701c143218254ece9ea6ec441da7f1a6749e2cb01622cf408041cd3f855669feefa9649273d286378c8dcbee010890f70f4b5

      • C:\Users\Admin\AppData\Local\Temp\f137fca8e6bc39ce6245dd4dbc0fa4d0c009112e97745e4b8ca566306151081c.exe.exe

        Filesize

        544KB

        MD5

        9a1dd1d96481d61934dcc2d568971d06

        SHA1

        f136ef9bf8bd2fc753292fb5b7cf173a22675fb3

        SHA256

        8cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525

        SHA512

        7ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        4b4afa60ab9612db0737ab7239b8f929

        SHA1

        5f0778a55394d8b9d597e5fc31ac44fa97476add

        SHA256

        4ca725a5704a86df766dcff486f19f1edff6e13b5f15f7dc3c96173a80fccbe5

        SHA512

        11830a5968678ec86f6d39e77dc192fb0dc334ce97959ac076adeb3c27e339c328aeda64f6e3f185433a489e5dd8ea64adafc636c13b7ed93c4a73a4c0c736e8

      • F:\$RECYCLE.BIN\S-1-5-21-268080393-3149932598-1824759070-1000\_desktop.ini

        Filesize

        9B

        MD5

        1f206a052c160fd77308863abd810887

        SHA1

        3b27ec1dc4b51fb7f1793a9ca9bb0d2e53e60eb1

        SHA256

        45129bd309ca763a88c6bf438896e82b939d6491036658c4512c57f8353938c1

        SHA512

        bd7857c146b01a49d34d4eb84053353eeb586bee6916426179305d5e2360559adea4040fe2184a3a803943ff4e6526cc38c665f9a808355619628868d53fbed5

      • memory/1248-29-0x0000000002640000-0x0000000002641000-memory.dmp

        Filesize

        4KB

      • memory/2188-16-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2188-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2464-18-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2464-44-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2464-90-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2464-96-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2464-745-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2464-1874-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2464-38-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2464-2545-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2464-3334-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2464-31-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB