Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/06/2024, 19:25

General

  • Target

    eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe

  • Size

    1.1MB

  • MD5

    f03584450015133516824820e3c6e7ad

  • SHA1

    40960caad75372d77ff373bf614e90fea82329c3

  • SHA256

    eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905

  • SHA512

    1596addfae513ce8e404d32e5845c7ff8ec2ab34ffd22383999405c30603010fe8df108c2959c2f0187888d74e0b0a5c44650023d5a23f40de629c500a4c86f8

  • SSDEEP

    12288:+7+2RdaQNYEYh4L5UaB1a1bxyOG6KA5bxjvzSdbaJfhBHAwjcwUDmxrPoaXQ:+7dDYh4L5HBOEOGLqrzSdutPcIlPHXQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3528
      • C:\Users\Admin\AppData\Local\Temp\eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe
        "C:\Users\Admin\AppData\Local\Temp\eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1844
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7242.bat
          3⤵
            PID:3352
            • C:\Users\Admin\AppData\Local\Temp\eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe
              "C:\Users\Admin\AppData\Local\Temp\eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe"
              4⤵
              • Executes dropped EXE
              PID:1388
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2536
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4532
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:4220

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                Filesize

                251KB

                MD5

                017b5ff3fe0c3468438be2ec74cebc30

                SHA1

                6c3d43933b458fc53062a5d51b8d9570be6d3e2d

                SHA256

                f23e73059d7cbbe7cc9f6a50932f5aa26d25feaf6e1a32c35cd01fa49183a619

                SHA512

                cb317a0becd259af4982ae63e97a1205c250a9cf09b47fbb0460eb2bcbe93421014f49f72c33b51dcd7517034be9b95b09ab7c0312cd79bf5b41b4fd8df6ac77

              • C:\Program Files\7-Zip\7z.exe

                Filesize

                570KB

                MD5

                662ac2ff73a0428213e4fb19ccd5fec3

                SHA1

                bec0ee8e1d7bd1496959d9ef9f043eac07611379

                SHA256

                47f518a26a7052c0d89c3e33c9480ad79557c0aec94b65d6ae6d346234118966

                SHA512

                7b9086833001c5aac552606736d85fc60697c37a13ad606479b1c4de9c12082799de6285c1a6f994dc9b79fc57416c5dddc858d0c54aed4e44bde9c02e825ef1

              • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

                Filesize

                636KB

                MD5

                53ee62011469b286a2a1b5658c86b9bf

                SHA1

                9bdac0b23b0a965947c780c6a6b48fc7122f9ade

                SHA256

                7125735e4e8595f1c17ff3235bc65dacabc2ec874b29ac7ba8eddd80ad10b3c0

                SHA512

                c9c24e578da0a38048e71548fac66465bcb624e971f745bba559e8c49fd621752e718d4c983a90a97277407bb23348ca109436e1eeebef030c3b599c712ff236

              • C:\Users\Admin\AppData\Local\Temp\$$a7242.bat

                Filesize

                722B

                MD5

                b52e3a4187c4c4fb9bd9b4ad6555c19a

                SHA1

                5039ceef91f9a9b6057202cafd32a7df003b1927

                SHA256

                e94ee5af4b4e8edf80b77409e6d3df1b71719bd0d73fa5ada46fdf8ca79051e3

                SHA512

                0c64809cf43abdecdc31a1889020c42c32547e53c7046f505dd7e3c6ae56fb6fd81287234e307e61cc47db9352194ba39e55df3ba7f691b702cc38d1a2ecfebe

              • C:\Users\Admin\AppData\Local\Temp\eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe.exe

                Filesize

                1.0MB

                MD5

                40839a6bbd02735818ae0fa7133d1e73

                SHA1

                ea396b178afbe9e266aae0cdddc48bb7922fdd43

                SHA256

                59c6b341306ab7dea4f59787407c41201c7aae2a44100544092f82cb59f90f2c

                SHA512

                4b0c4c9e194859da15738fef29d41a33f1ab84ae072a0cb5df01d168afc00ceacdfee803938318ae8b61051cca886fc18c151a3baf339a0fad773e32c4791649

              • C:\Windows\Logo1_.exe

                Filesize

                26KB

                MD5

                d375bd04f866e1b3276ba3b9779966ad

                SHA1

                1da9855e29a5384522563e0c4bdac786712d8b12

                SHA256

                a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be

                SHA512

                78aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10

              • F:\$RECYCLE.BIN\S-1-5-21-2804150937-2146708401-419095071-1000\_desktop.ini

                Filesize

                9B

                MD5

                4b66be111b497cdd28c15afccbbd2620

                SHA1

                43ffb36014883f201e76464ded7ec69f2973d43b

                SHA256

                483e991549f8cb58e18e7a79a14cf6065e121f897e73b6f4edff227432a733dc

                SHA512

                32fddfbca04f67fdb0e865862e6f29b06cd079ddba416d801ceedcba8ed88b8dda77663fc8bd5bdd0224f722cd337c9d58edfc2e97e4fab73fa56f6f6198bb21

              • memory/1844-9-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/1844-0-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/2536-27-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/2536-37-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/2536-33-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/2536-1231-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/2536-20-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/2536-4797-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/2536-11-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/2536-5236-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB