Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2024 21:54

General

  • Target

    574125e2c04d2b76c5738c95efbb3f59f9c3219c729eb8ec093744361420aa3f.exe

  • Size

    132KB

  • MD5

    e9189581342f1140180bb5368ae2edde

  • SHA1

    3576bb622860757dcb4a6009c51fc33b245d2dd7

  • SHA256

    574125e2c04d2b76c5738c95efbb3f59f9c3219c729eb8ec093744361420aa3f

  • SHA512

    623c4579c24fdddb0042708bf30eb139243031849b2241fba2adb74c433f27ce0e2a5ad174f5cb406988f90ee8a8fd3bab6c9d0af86b1061870a727336d622c0

  • SSDEEP

    3072:xAyLd0K/JdOebFhcYfWLI2d/1Fb5eOBpY2Ss4t:XLZ/JdEVM+deOBbSJt

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\574125e2c04d2b76c5738c95efbb3f59f9c3219c729eb8ec093744361420aa3f.exe
    "C:\Users\Admin\AppData\Local\Temp\574125e2c04d2b76c5738c95efbb3f59f9c3219c729eb8ec093744361420aa3f.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:292
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1390.bat
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Users\Admin\AppData\Local\Temp\574125e2c04d2b76c5738c95efbb3f59f9c3219c729eb8ec093744361420aa3f.exe
        "C:\Users\Admin\AppData\Local\Temp\574125e2c04d2b76c5738c95efbb3f59f9c3219c729eb8ec093744361420aa3f.exe"
        3⤵
        • Executes dropped EXE
        PID:2552
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:2736

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\$$a1390.bat

      Filesize

      722B

      MD5

      ce8cef4fbfcdc53d51cf537807a132e6

      SHA1

      dc40d863dbf832376c3e41bea94a79abb8588f0c

      SHA256

      f042d56a05766b19ec6ad4c5eab1f93be45ca65931c6d4e01ad0789448740a6e

      SHA512

      7b3d7ec654ddfe56c825b8f81de8f0b688627e4992feefd556bb1aea6bf20a5a2e0a25f277314aa2d67ca373de7351944ffd3b66ef555cf924a89ecf0d9629e3

    • C:\Users\Admin\AppData\Local\Temp\574125e2c04d2b76c5738c95efbb3f59f9c3219c729eb8ec093744361420aa3f.exe.exe

      Filesize

      66KB

      MD5

      7255c3ac9f65161062fe5161bb743a5f

      SHA1

      f9965b2c29fe9a9d236ec60920657dc2ed7f869f

      SHA256

      20e74d12502aae815b3d23956792c87a10a57cab0752fc968b9917360436f072

      SHA512

      ab85a02b8bf22fe0b4e79eca8b6f1bef7f30f6faed15d2565ee9a99d2452262d45ce6297b571f7db5711bd7a0beda59b1d3d9d6864dd9028dcce079607f0f646

    • C:\Windows\Logo1_.exe

      Filesize

      66KB

      MD5

      3df5852b7f00b2d927fd157fe3ab9d7b

      SHA1

      405b1d2054eb357133bd5019c749f07d8ebae9ba

      SHA256

      717c8d0200f827fd26f0759f16cf562cb417c5e25d3fd464ca9cd7b1b1a80ffb

      SHA512

      b82e7054cd24e9577fd24ec5228bb8271ee34a5cdcfd7a269cbbabc4d843f5bbfafaafe4f46891f8dfceaf543a9c286243558e9c521574b41eca3e77c17ee0c2

    • memory/292-13-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/1580-21-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/1580-22-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/1580-24-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/1580-30-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/1580-32-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/1580-137-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/1580-163-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/1580-238-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB