Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 06:39

General

  • Target

    60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe

  • Size

    43KB

  • MD5

    2f56bd734e06ba569d3093b30a51b90e

  • SHA1

    849fe23bea8354687c50f3317f9d59b18cd749eb

  • SHA256

    60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8

  • SHA512

    2ec221aa0dca232c3539885de9937066feed886e41334558764c3d3af302faece3a5917cf892b352f6baee1d117e1a701f76e8094db8122ed6ac883dee12afe8

  • SSDEEP

    768:wBE1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLxHUzj0x8k7rI:wsfgLdQAQfcfymNtHUXm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3544
      • C:\Users\Admin\AppData\Local\Temp\60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe
        "C:\Users\Admin\AppData\Local\Temp\60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB045.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3704
          • C:\Users\Admin\AppData\Local\Temp\60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe
            "C:\Users\Admin\AppData\Local\Temp\60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe"
            4⤵
            • Executes dropped EXE
            PID:1968
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4680
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4812
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4060

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

        Filesize

        244KB

        MD5

        33242da55fea3ceb1dcaca8a58f8fbb4

        SHA1

        efee3e801189490f52d72f9623b701b04e2578c6

        SHA256

        32e1720f825b6be8f4d3cceeea1ff36b5acd37179eb80f03040ac2a341e9f7bf

        SHA512

        426fa2ba1fc5eefaafc0e5423d8a39a296c85c35afe986f08667e207d64e60305e204045621448e1e261b0967e198f3457df7b71cd15653a9e25bced966bd779

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        6c26236b1a2636c758aa036640ae98e5

        SHA1

        61674b2332d46af1e2df2198a01af59b23208be8

        SHA256

        5d9a860e7ceb753e8e26fd9a5ff9da16ac89fdfdc4e08871cf1cfff56d4f5fea

        SHA512

        1562c5821150e2e5b85c164ff99424ea7fa955799f546c460cea7bc2aeb39cfec60a5c98faf0f1a8954d75f8549d931804f803c75c04d0162d29078ad1227783

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        636KB

        MD5

        2500f702e2b9632127c14e4eaae5d424

        SHA1

        8726fef12958265214eeb58001c995629834b13a

        SHA256

        82e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c

        SHA512

        f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c

      • C:\Users\Admin\AppData\Local\Temp\$$aB045.bat

        Filesize

        722B

        MD5

        9d61b847006f176c408f6afe4924c9f9

        SHA1

        4be40f645fb7b429774879ca2d92030b3a5e9443

        SHA256

        90f247035d97d4ca273fe1654b30e2e9e67dcc6130ebe90f54fa745af818becf

        SHA512

        bc1d85afac0446552159f3a4d086bf8afcce1e284c925d252ab1100cbdf893a86bab143149f66bb2d62fb798b0a4a598e31599781aadb0e39544e322b3554bae

      • C:\Users\Admin\AppData\Local\Temp\60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe.exe

        Filesize

        17KB

        MD5

        ea0253515fa5314836099da4dc784208

        SHA1

        17296d8de2e0770d9baaf4bec3a586ea23e6582c

        SHA256

        7d61a36c3aee18ca4e4ce39bb46475a360120b85b7f8327ea1e3f04fc570e263

        SHA512

        2cff5f0c5d987e9fc01c999d21808767b866cbe78ec3afe7d2271ace1285d216147a33006e3acf3d2178d239cd3d92234755da4714129a3e6df24fc0d28f7837

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        4f6b7b7dd1e90f9968e5197d34085d7c

        SHA1

        e49e73e61aede77f897b3be38716b22a9ed86e37

        SHA256

        c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf

        SHA512

        4225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2

      • F:\$RECYCLE.BIN\S-1-5-21-384068567-2943195810-3631207890-1000\_desktop.ini

        Filesize

        9B

        MD5

        c343746e2231a418d71c1903b6fcee6b

        SHA1

        ce3877cf0c6cd56b2ee7ced8ce1c4f7cdbbb25a3

        SHA256

        b3a272fd1b385fe9784ae0975b22ae384a87e5a27b31860304e9f109d3d423c9

        SHA512

        dda5b55b3fc369b480d7b82d04cf4ed4b96e5ba241d087bddbbf22a8d0173dda10f25b7bee88c289fad759f7aa2534ec55120d6b97f632b948c234cdc7471aa6

      • memory/1888-13-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1888-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4680-27-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4680-37-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4680-34-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4680-1233-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4680-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4680-4785-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4680-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4680-5230-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB