Analysis

  • max time kernel
    150s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 03:09

General

  • Target

    36bd4933ec5fdb10a5914ef3ff319e60.exe

  • Size

    2.3MB

  • MD5

    36bd4933ec5fdb10a5914ef3ff319e60

  • SHA1

    20f5df024590c10b9353d3d746e36c2c038222af

  • SHA256

    cc86bc48d4f1cc13fcd84842ab4a30c9086f12eac0daa6f9b7f9353a65deaba9

  • SHA512

    7b4436a9adc4a52c226c839ea962b767c68d2780e5a25035abfa97ea94deb8a52ce7bb1815df5dcf4f7e00f77b62b1b634b56db74fe2b0c307ffeaa9d7fadb95

  • SSDEEP

    49152:cOE39Y0jCMnxDHpgmpz873cKsvVBAUZLYgio6EZGaXBuQQ9ec0NUEB:/1Mnx7p19873cKstBAUZLGqa0NUEB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36bd4933ec5fdb10a5914ef3ff319e60.exe
    "C:\Users\Admin\AppData\Local\Temp\36bd4933ec5fdb10a5914ef3ff319e60.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a48E0.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1088
      • C:\Users\Admin\AppData\Local\Temp\36bd4933ec5fdb10a5914ef3ff319e60.exe
        "C:\Users\Admin\AppData\Local\Temp\36bd4933ec5fdb10a5914ef3ff319e60.exe"
        3⤵
        • Executes dropped EXE
        PID:2968
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:928
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:3180

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\7-Zip\7zG.exe

            Filesize

            750KB

            MD5

            a7b3865ba649fd66cd830878dea6c5f2

            SHA1

            949f6d0eeff7efc6da7dc5bc1f4dd6e092bf2e2b

            SHA256

            9fbc11a841eb1249c8635be81ad70286c0db9bc84fb51e32e584c7fff33469f7

            SHA512

            1ebe25a263a61cf5156f1e7f835142fc9bc68563ca6857730c4675cbde26788b3b24378921476bfad6e8cd2c1f01f22b2de88ce901ab169e48536341c827f60a

          • C:\Users\Admin\AppData\Local\Temp\$$a48E0.bat

            Filesize

            530B

            MD5

            fcea7d5992b218ea555c16db40a70d4a

            SHA1

            5c4bfed2e28d8393eb19ad6796a5fd60a5d1ed46

            SHA256

            6d493cff154fe685914ac57c841f1a0ff34f1d3a01ec6b40796c6e5d0ad2412d

            SHA512

            0a6b062acd27c07e2084a21b3c6f13a8e88c411c3444e1525fc63de775c312f7ca4ad6c6eb41ce5cb7916d8bfa8d264c0be7828fe3f0a9b5884a1ab45ae53d49

          • C:\Users\Admin\AppData\Local\Temp\36bd4933ec5fdb10a5914ef3ff319e60.exe.exe

            Filesize

            2.3MB

            MD5

            643c51fd99bb9be6929acd63f50a1f60

            SHA1

            2614e35d129468e0226abf4b82fc827f596915b6

            SHA256

            b266ca5c912404a50ddb09eecb65158471677335e0ee6bdb3a3896509f9296e9

            SHA512

            df54310775c19144a18eab4358203a59351ef138ff896d1a3646800f546c93e23ebfd1f4bbf105511d3065abb945c99a231e5144f8061c3dcdc8651d33858d6f

          • C:\Windows\Logo1_.exe

            Filesize

            66KB

            MD5

            a81c8cb12d60acf8c759fa71889799c6

            SHA1

            797ea1fb6f2704e56448db6ff0992d5bc322b4ad

            SHA256

            c8d74f72173f6a12145368db4df2d22522e58e06973e4360293fb6d83375079e

            SHA512

            c8ddf074f4d467e170211fbcbca12fbec25b8ebcf40c0969bc9e9130c12337e633e5d8000803c1dfccb9edd34756c8beb2af66edeb1b39905b46534e1ea9bd67

          • memory/928-12-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/928-13-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/928-15-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/928-17-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/928-141-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/928-205-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/928-218-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/4016-6-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB