Analysis

  • max time kernel
    149s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2024, 04:29

General

  • Target

    d123d39c153b968fd4a0a7f4f5b488778e48b1bcf45e37a9956e84c710a2dead.exe

  • Size

    260KB

  • MD5

    e2cbfa7c2535dccb0498e65a13d663e0

  • SHA1

    d09b49a7cf5b57199a449379dfb14d6bd27254ee

  • SHA256

    d123d39c153b968fd4a0a7f4f5b488778e48b1bcf45e37a9956e84c710a2dead

  • SHA512

    73121287523b692ad2b72ab1d8298b2fa76cee13019061dfbd1d779275b271bbbcfe4fbf616c265cc082ea2de4105264a819fbfd58d6938afada76386304c928

  • SSDEEP

    1536:pM3SHuJV9N1ILFkbeumIkA39xSZW175V7UZQJ0UjsWpcdVO4Mqg+aJRaCAd1uhNS:pMkuJVL1LRkgUA1nQZwFGVO4Mqg+WDY

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1132
      • C:\Users\Admin\AppData\Local\Temp\d123d39c153b968fd4a0a7f4f5b488778e48b1bcf45e37a9956e84c710a2dead.exe
        "C:\Users\Admin\AppData\Local\Temp\d123d39c153b968fd4a0a7f4f5b488778e48b1bcf45e37a9956e84c710a2dead.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a281A.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2556
          • C:\Users\Admin\AppData\Local\Temp\d123d39c153b968fd4a0a7f4f5b488778e48b1bcf45e37a9956e84c710a2dead.exe
            "C:\Users\Admin\AppData\Local\Temp\d123d39c153b968fd4a0a7f4f5b488778e48b1bcf45e37a9956e84c710a2dead.exe"
            4⤵
            • Executes dropped EXE
            PID:2440
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2544
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2624

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              254KB

              MD5

              9f4db9169bc4c2cb9ae29c63e23c9211

              SHA1

              43b5413ad63389b7fc2616bce8f1512df14c9cac

              SHA256

              0cc00fdc207b21cd348a30390a3e24141effb188c0ffa1d2333f8a4fd5102c01

              SHA512

              20852e014d46e5f1c57249106d5a4771ef5dc177a278cc8827c3814e24a5f2219c766d3faf2b7724d6cff2cd9a1db24447e53b5e0cef1508ea4b81d26aa91e1e

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              474KB

              MD5

              c2896b1eaaa71425b83650a70d538088

              SHA1

              f79c6bc80ecf8b44392e8246ba5fbaff53bf600c

              SHA256

              6b3df95b82ba5605c64fec3348cf631dfdd3665db4487332dffecf2adba34b2c

              SHA512

              39090078ac16120c6d7e359da9b54736c1cde63002f5cabb00647238d407b74f368b49d0ab041325f16abdd87b7420343045a1047c3174139231ceb6440550d6

            • C:\Users\Admin\AppData\Local\Temp\$$a281A.bat

              Filesize

              722B

              MD5

              40043453c1ca55c282119ec69f993ddb

              SHA1

              bbf389ae6774af5bcde74791f94b82e2e1a765d2

              SHA256

              ff237766e15464a8283d0938a607b7957f1985ee9ff61ced8a1ac3ec7cdba2df

              SHA512

              6e92a1afee6e4712f6fc87f72e715b263b110301416d97997c098a4cf4edbb7ec2736506616e6f0e66f4ab0c21a2326c1499b78dffbe890e44a541d019f70bd5

            • C:\Users\Admin\AppData\Local\Temp\d123d39c153b968fd4a0a7f4f5b488778e48b1bcf45e37a9956e84c710a2dead.exe.exe

              Filesize

              231KB

              MD5

              6f581a41167d2d484fcba20e6fc3c39a

              SHA1

              d48de48d24101b9baaa24f674066577e38e6b75c

              SHA256

              3eb8d53778eab9fb13b4c97aeab56e4bad2a6ea3748d342f22eaf4d7aa3185a7

              SHA512

              e1177b6cea89445d58307b3327c78909adff225497f9abb8de571cdd114b547a8f515ec3ab038b583bf752a085b231f6329d6ca82fbe6be8a58cd97a1dbaf0f6

            • C:\Windows\Logo1_.exe

              Filesize

              29KB

              MD5

              ffd4c08e47961e2de68bbe4105d8d26a

              SHA1

              4cfa8ccbd7efb2e91d193765ff10a7db5672ee66

              SHA256

              8145b427321f639aea369886bf367b29002dd11e45087b4361f7da2c0eff2791

              SHA512

              d755ae9bea63b39f99d3ed5a3396af855984d1afff1df4d7107342ec6ace5cb1b91cbd96d27770ccafd5e4f78e7616f99f92def5c0a9c74862b229e12e8be60a

            • F:\$RECYCLE.BIN\S-1-5-21-2721934792-624042501-2768869379-1000\_desktop.ini

              Filesize

              9B

              MD5

              7d17b811a66f09661920bf5af1f95ae9

              SHA1

              f974fb71f0c9242357d308243f16d5509a0fb040

              SHA256

              1ffbf32a83283a76202c268eb3ea579c4b39aa6fb11fc42ad18318286fbf749c

              SHA512

              019689bb28dd360a9b3fe6696944854f806ebe877734f4f8533f7c2508d371049a96f6c7bd5dda908ab91686dbfba4a54335cbc6c4d649775e62912f0af730e3

            • memory/1132-29-0x0000000002520000-0x0000000002521000-memory.dmp

              Filesize

              4KB

            • memory/2748-96-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2748-31-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2748-38-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2748-44-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2748-90-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2748-1120-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2748-1849-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2748-3308-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2748-18-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2872-0-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2872-16-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB