Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 14:41

General

  • Target

    d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe

  • Size

    3.0MB

  • MD5

    7068ca7ab0b08a45be3189616a0981ab

  • SHA1

    13790b2b37df8542892db4838c1e8820cee9130a

  • SHA256

    d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e

  • SHA512

    0fd2ebe99e3c2d817aa7783751a9ff2d45746c74fcb20ab884526315fa72ded74d039213c1ca0ca79eaf431eaf11788361ffa950ce25e9236bba6a53eb1df704

  • SSDEEP

    49152:dOnKV1GmNiJNiBkvEzs/7PDiYBJqgnv46z7153rfdc:dwDYijiS/7PDiYBJxJ5dc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3440
      • C:\Users\Admin\AppData\Local\Temp\d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe
        "C:\Users\Admin\AppData\Local\Temp\d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4048
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4EEB.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3208
          • C:\Users\Admin\AppData\Local\Temp\d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe
            "C:\Users\Admin\AppData\Local\Temp\d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:532
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4320
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:804
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:464

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              254KB

              MD5

              cf823f44216d1c695cbb388843937b5f

              SHA1

              2ea48a151e1699e9ce9ba9681e635ce14d4da085

              SHA256

              bb6669dfa86ddab20f435009522d8df6e2e503b641bb65b116338e337c4c3104

              SHA512

              6a1afb35ec967f03db55636f1e01e699b8d1fdc62dade946978ec26013ba0a44a8d4ebc0d8723dc028c62674fa3db344588ab6bf83ecf65b47545e351debfb47

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              573KB

              MD5

              21a9549f407a7dc96f644daf54bc504e

              SHA1

              e133a3bda7ab4fc0221fca763618ff5e75c1b5f4

              SHA256

              7d7e3cfe82185ca0741b40cab082fc2d17049f09f7b1c99203f63e11ff0363a6

              SHA512

              cd8c78879aa64fa66c38cb7b46b7dfc74cb276d50871d46e5e69fdeeeebd6ccb35ceed770182be68e461609e8946bdca2d468b360dbe4b8d7b486bf148a0bec6

            • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

              Filesize

              639KB

              MD5

              8e20cd4ac13828acae9e458cea8e8c56

              SHA1

              794cb8e8b5519214c4d4c89e9d5ff0967e224d72

              SHA256

              ed2019032918ac1a2a246a501166a13f7f2bda2f2ca354ad2db584c41c774e5c

              SHA512

              e5e6d2147fb76a7c11e738fbfacbe0b189862cdb35b7de75c82b4ed5784b90953cfda3d1052fceecf3f76a9f873b7ed052c70a4847669b7657bfce522ff907d4

            • C:\Users\Admin\AppData\Local\Temp\$$a4EEB.bat

              Filesize

              722B

              MD5

              7c9e2566fea727f4ff5082e5cf2d6683

              SHA1

              d5bdfa74e53ef72525819de4bdc05ed9efa3842b

              SHA256

              65be82e6bf3a9c13e22d4b31a11e8ae0ace0bee43798b03628f2b18b64fe3df8

              SHA512

              0f44fe9de70e66a9c8d0843ecac2b7e1e8dd9b114c97339ff303d7e6c0a25e42b13dad43265d828f15bdf74566f0b161254f7a84c12e7ac5326a3a3926772a7c

            • C:\Users\Admin\AppData\Local\Temp\d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe.exe

              Filesize

              2.9MB

              MD5

              0b034269c98948c378cc41caeeec2691

              SHA1

              d6adfd8ceb33dcd1bf415900aafe889e29450699

              SHA256

              3e41b62ca8b78f95edef4d238ad411db8be8358af531ba373dfd76e2f1ace6fd

              SHA512

              2d0747353c6a46616854ca4a5e4f256138f531c0173710881f58cad40a01a57416331ce0c49b35923dc16889059e86c5fcefdf6264f1ff32c0c149f92e5d50a2

            • C:\Windows\Logo1_.exe

              Filesize

              29KB

              MD5

              263fdf92db7400b1cdf4ebc4961adef4

              SHA1

              03f3c20d4e557bd7c1af8d3e49a61021f0bfc578

              SHA256

              0ae70243c1675a43383ede422438a0748689cdf8a0311c2b5ca55be987e3edc7

              SHA512

              c38d1e57b58250d888f9a7d251f2b57dd1be88f28cf77defad34d2cde00dd57763f46408ae2bd8790af5be752f3cdf00fe788122f851c8559b69c175670e5624

            • F:\$RECYCLE.BIN\S-1-5-21-3169499791-3545231813-3156325206-1000\_desktop.ini

              Filesize

              8B

              MD5

              6890820ebb29213eaf25c92e56fd41ee

              SHA1

              b926083cf18461657f09f2a4af604f8fafa4ae29

              SHA256

              ddb532e0e9d9e9a382d9f92ef1e5e26eba608b5f3335f1b711d99044240af3f9

              SHA512

              5ebefef8f75ecb9fce8854606cb41402dabf66347ddbbd1075f5b94a5794fc4ca240c615eee930a6eedfd117e011afd8772aba2db2c83df0f376c84e8f512cda

            • memory/4048-8-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/4048-0-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/4320-28-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/4320-38-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/4320-34-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/4320-333-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/4320-1233-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/4320-21-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/4320-4801-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/4320-12-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/4320-5240-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB