Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2024, 12:12

General

  • Target

    2881367fb21d09434476b52cb5ac879e9165579e3ece129b08c75dc8caaa60ea.exe

  • Size

    142KB

  • MD5

    2393a15ef9bd961fbca6bdbb6febf154

  • SHA1

    6e903e00bd2cb5ddaaa943612dc1c9052fce758d

  • SHA256

    2881367fb21d09434476b52cb5ac879e9165579e3ece129b08c75dc8caaa60ea

  • SHA512

    6538c613b36f91276710c96eacd6d407bb18b2026d9a9cd9acf37c7db0513cdb41f883d73cf061a6a0cca218064cb4aa3b59eba9fa9ee75942e4166cc91228a9

  • SSDEEP

    3072:hftffepVPXmZWXyaiedMbrN6pnoXPBsr5Zrt:pVfgPXSNaPM4loo5Z5

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\2881367fb21d09434476b52cb5ac879e9165579e3ece129b08c75dc8caaa60ea.exe
        "C:\Users\Admin\AppData\Local\Temp\2881367fb21d09434476b52cb5ac879e9165579e3ece129b08c75dc8caaa60ea.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aCC63.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2312
          • C:\Users\Admin\AppData\Local\Temp\2881367fb21d09434476b52cb5ac879e9165579e3ece129b08c75dc8caaa60ea.exe
            "C:\Users\Admin\AppData\Local\Temp\2881367fb21d09434476b52cb5ac879e9165579e3ece129b08c75dc8caaa60ea.exe"
            4⤵
            • Executes dropped EXE
            PID:2724
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1988
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1068
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:528

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              e11871beadd1e16296ca2e88c8d5e774

              SHA1

              64c98d0b55e00a5aef431cf285c86030bac64b9f

              SHA256

              4e71f3d0a47c4d503c416a7290fd28209c5cbaf25751626af7f097d7df10d71b

              SHA512

              dc59104a94375a0258ee96407689c036f1bca19f5a9a7564a835e934b9238278d457d24fb3a6a0c4e8ffe8198bfebae60aba450239344c9e74411f627615299f

            • C:\Users\Admin\AppData\Local\Temp\$$aCC63.bat

              Filesize

              722B

              MD5

              59fb39e25d87ef76da267df3ca54f7a0

              SHA1

              ff99b2514e7b0e3b2d106189a768f96ccf29d885

              SHA256

              e99432dae93ec1560979bc8b5c22956ca2290a481223b77719dea90c5a30cf31

              SHA512

              23b6361d015b7aeec22a3c11ae8ca5d045e5745635a96e8f205db195b94da8af0eee51fa04acf83ae1b95a785f52dfb40998118bcccd3d377f659cdc6902fe2e

            • C:\Users\Admin\AppData\Local\Temp\2881367fb21d09434476b52cb5ac879e9165579e3ece129b08c75dc8caaa60ea.exe.exe

              Filesize

              116KB

              MD5

              14260726256d54de6ccb2eff1003c05c

              SHA1

              073c85b1d5dade530694ef00543698f16d39fd45

              SHA256

              3970359aee5c8cb9451c2c84ae6d4c859999a40ae955d8ade9abacba215a087a

              SHA512

              8bf2d18c0bc4cb42af52ff223199f3504caf73e99fd49dd489306d79364c57d2b5d61039d83cebf898aedc825ab52397613b498aa49b6714fb4fe485112b7d7d

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              2baf3b6dac6e813b0db68fadecb9e0a5

              SHA1

              1aca0077e090a90fe827bd1e5775e59600dbdcaa

              SHA256

              db3eb113e4b0349c2a1fdfb199b61df69158d220edf69f58ea0768244ee02269

              SHA512

              d03838146804f9a5a1ffcb564e9058372d88889b751502bb827345314662748b9fef6bef2fbe65750aa8c6f9406cf9e5a0dfc07bbddc9dffd54a761fb155ebbc

            • F:\$RECYCLE.BIN\S-1-5-21-3450744190-3404161390-554719085-1000\_desktop.ini

              Filesize

              8B

              MD5

              dad51e3f99562a570bb1182af054feaf

              SHA1

              b7fe437bfcc8d0745bf9cf3add29a6ce6cdb669d

              SHA256

              eecf9e0242482d54457b5a8f574245aae7badb5fcde35ebca2e0ca3c672c6903

              SHA512

              0d22ff0e9ed2f47d06bf6bb7c7969d5eb3e6680e4f289aede1c7af75d6efd856cb5d0e5989326233a8997f626cf5cbfcad1382759772ba7c56970eefcc63e1a3

            • memory/1188-30-0x0000000002D30000-0x0000000002D31000-memory.dmp

              Filesize

              4KB

            • memory/1988-1877-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1988-34-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1988-41-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1988-47-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1988-93-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1988-99-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1988-233-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1988-18-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1988-3033-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1988-3338-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2380-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2380-16-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB