Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 19:46

General

  • Target

    99d4c7c7f3a799405071e38558df27d3f7f48da579ea0de0f45fab32c5bf7709.exe

  • Size

    713KB

  • MD5

    c4f45ca67af2e0e0948a158240be3302

  • SHA1

    b77bfff9b8d969267552500b555fb5948df49c47

  • SHA256

    99d4c7c7f3a799405071e38558df27d3f7f48da579ea0de0f45fab32c5bf7709

  • SHA512

    dc83d507aa676d16119f55555886c975bd137931d478ae162fea08c71b71755f269ed14cb540c1d7a8f098347860aeedf5621547b6956f2a8e13af0bb7e8dc8d

  • SSDEEP

    12288:YtgfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:AMLOS2opPIXV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3496
      • C:\Users\Admin\AppData\Local\Temp\99d4c7c7f3a799405071e38558df27d3f7f48da579ea0de0f45fab32c5bf7709.exe
        "C:\Users\Admin\AppData\Local\Temp\99d4c7c7f3a799405071e38558df27d3f7f48da579ea0de0f45fab32c5bf7709.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4476
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3529.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4444
          • C:\Users\Admin\AppData\Local\Temp\99d4c7c7f3a799405071e38558df27d3f7f48da579ea0de0f45fab32c5bf7709.exe
            "C:\Users\Admin\AppData\Local\Temp\99d4c7c7f3a799405071e38558df27d3f7f48da579ea0de0f45fab32c5bf7709.exe"
            4⤵
            • Executes dropped EXE
            PID:4420
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2564
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:872
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:944

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        11ec27109dff3973235bae78403e564e

        SHA1

        74a733e0355009c9c6c4677bbd131f538a3bc630

        SHA256

        c8f5974ca2b34c1b053df21acf584a370efbde4a28dc18369273ee6782630161

        SHA512

        8fda95e7ef1377d3db367ebfa5dcc527b974226e62db3af7565d000dd0d3e201440574ebd096207e47554f902f09a8ee5bec6a9b7dca6614f2a540d247c5776d

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        573KB

        MD5

        488f503d34cfc8f11631fcd8703ec4f0

        SHA1

        479faf147fd9cd1bd7e381b40f327a1408d98b7c

        SHA256

        ecc75edfde40294d28921bf0d53dd2f7e62a8fd140b684886d48f4f2271821a4

        SHA512

        600f5a67cb1d39e401f53da2f5ed9b9165468c82fff4db77c9e9a678d49cc8e0aa3dd4c13536250ae2051326298a3f1195530fcb987c1cebf94c7684e38e9c44

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        639KB

        MD5

        10b7e02b3c11aad5839d900ca07755bd

        SHA1

        e31a4d8424f15b25cf2e5528ddb916bb9114ab05

        SHA256

        6731abc4ab42abbacdf4b0723146ff9725e131cfc601c5d4cb1d18cbd284345a

        SHA512

        f81438b5143b8328531307debda9b4ed3f856eac155f7a7890ee3b47b425e3f91d4536279782b9a70112afd3c54d0b4841e27cb5d20e828fec9b77f482c771e6

      • C:\Users\Admin\AppData\Local\Temp\$$a3529.bat

        Filesize

        722B

        MD5

        ad736c86d251ef706c7d9b1e88998c55

        SHA1

        655b3ab4ba2b5b18d6da65d70ab7216e06e4d846

        SHA256

        7c4688613ace3cf5c0c74d48b5c4ab8eca5dd46ec160b230c48a9dd18821ad06

        SHA512

        7742d6e078f3bc729522c594d77fdb14be2b2512e1236e524e590515b9a14b705d48b34e4163f8daf15aedf52a749c896f21e0c6dcb4598092999b1e1c6cacb6

      • C:\Users\Admin\AppData\Local\Temp\99d4c7c7f3a799405071e38558df27d3f7f48da579ea0de0f45fab32c5bf7709.exe.exe

        Filesize

        684KB

        MD5

        50f289df0c19484e970849aac4e6f977

        SHA1

        3dc77c8830836ab844975eb002149b66da2e10be

        SHA256

        b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305

        SHA512

        877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38

      • C:\Windows\Logo1_.exe

        Filesize

        29KB

        MD5

        35aadf4fd8a8b22ea5a43bf4394e477f

        SHA1

        45abaa1e7195e55333ff4f6dfab498f756ee8b6f

        SHA256

        80dfcfdbc38b8274c0b096274f5d9e2a4a4ca42a242b0ce27d03cadd0ba37d63

        SHA512

        f78a7322e77854720495da6da7ed446b27e360036f25fb93b80f7a73f7e75f6dc7dc2e599c69fe447f2a38ac98648864bd8dee2b273f5f3afb22a6c804aaf4eb

      • F:\$RECYCLE.BIN\S-1-5-21-4204450073-1267028356-951339405-1000\_desktop.ini

        Filesize

        9B

        MD5

        f0a92d08416cb87dc153ea387c708411

        SHA1

        37c1e98506bdb3d5ea2e7fcb62bb91c9bf5b4fb1

        SHA256

        478ccf01e44e5bd446e37007b199568a73c0452e34ce917945fd820710107464

        SHA512

        1dd7d96307c01abb2985ed1d39617787563174f5b90df9786106259ea12a08bdf39662c440bdc4b3ac4f6bb499a4aaf058ed18e06ef72be5f82f01b7150ec9a5

      • memory/2564-27-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2564-34-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2564-37-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2564-20-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2564-1238-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2564-9-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2564-4966-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2564-5405-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4476-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4476-11-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB