Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/07/2024, 23:52

General

  • Target

    1de57f0180e5ea10fd664a46b9bbb57f207ffe7a0d5f859c2b21a2f50e08c375.exe

  • Size

    393KB

  • MD5

    32773f8fd6050b46d67d72ec4daf2f39

  • SHA1

    ea9e18a70b8bf11c59a5c809c07edb03bb52a00c

  • SHA256

    1de57f0180e5ea10fd664a46b9bbb57f207ffe7a0d5f859c2b21a2f50e08c375

  • SHA512

    a5ee10c0cdcb91ba8bd9d38fe23c8e8106a1b6eee9a2c9b3614a7512e14ffc214800039587922caeb5f786030fc6495a8b712f1cd41119d353897b31c3c05908

  • SSDEEP

    6144:AuJxnDXYQ/BWJjmpgtBZQZKQj8p3jyb7HREd4SZ1tzLbF:rDXYJmSTZwYp32bY4qtDF

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1220
      • C:\Users\Admin\AppData\Local\Temp\1de57f0180e5ea10fd664a46b9bbb57f207ffe7a0d5f859c2b21a2f50e08c375.exe
        "C:\Users\Admin\AppData\Local\Temp\1de57f0180e5ea10fd664a46b9bbb57f207ffe7a0d5f859c2b21a2f50e08c375.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aEDA9.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2488
          • C:\Users\Admin\AppData\Local\Temp\1de57f0180e5ea10fd664a46b9bbb57f207ffe7a0d5f859c2b21a2f50e08c375.exe
            "C:\Users\Admin\AppData\Local\Temp\1de57f0180e5ea10fd664a46b9bbb57f207ffe7a0d5f859c2b21a2f50e08c375.exe"
            4⤵
            • Executes dropped EXE
            PID:2856
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1408
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2292
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2820

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              254KB

              MD5

              e298ded38c899ae1f61fb97dc5e9bfdc

              SHA1

              06a0037f8de58600fc61f5a731fde84158b08830

              SHA256

              e0677d7b8be5c75da83b52fc5179f211efcd05f4f4233233a4bf43b77ceb8f32

              SHA512

              da5a40db008b00ead658194af17b75406a7b4ae96af06ef72c87a30037ab1208041d7ee7ae6c52984a45c9fb65012f2467fa8be88dcef23e4fab23d4f666b8d3

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              474KB

              MD5

              ff973db02a999ecbc9be9bb33499796d

              SHA1

              2fadc83cfc56463a638456cb4cf77be605793a9f

              SHA256

              bf3b2ca265dc1f3583cb5276da1f4c83404d5f547919d17d7bd4c328071507dd

              SHA512

              fb673f91884b3eb805809887432ac810c4d525db0bc5c1f7103b14e3d62284fb25e122c7e957981d864b699fb005e34d0c5583ac80436ecf673f22704d4e5ed0

            • C:\Users\Admin\AppData\Local\Temp\$$aEDA9.bat

              Filesize

              722B

              MD5

              40affd59dba68a3df0c79b93352637df

              SHA1

              35368b7b768a3ce58ea1f9ffd954e83378c54da0

              SHA256

              0b53658217d500697ff29a357cef0ea39e36e9da5896c3363ff2b8ce85b40b4c

              SHA512

              b1437c6d79912283953bc50c60580df9a7e89cb8ae69e5c51b4b1e0dba3593c2a5e2d48f8f82e147be5afc3428f94434911ec67fca10cab23bcf3de4747a1ee8

            • C:\Users\Admin\AppData\Local\Temp\1de57f0180e5ea10fd664a46b9bbb57f207ffe7a0d5f859c2b21a2f50e08c375.exe.exe

              Filesize

              364KB

              MD5

              213eeb5e8f54231f68e5b26a0fc81bd1

              SHA1

              1bc31a42536eacbb57d1cd92ec4b5524a82264d2

              SHA256

              b309045509efc205eb35d6037d64640093fde6c54ec5934e329b447417005a50

              SHA512

              ce35c5f453126c98329df141f821c55692f9252549c76921c231d8170df356cda1689e636758519c0b6898f11b5c836cdb4967d296b99f915e4d1980470a083b

            • C:\Windows\Logo1_.exe

              Filesize

              29KB

              MD5

              b938b3b5eeb9962908ab443e79cdb91d

              SHA1

              33f55a3f58f055862f72ad9c439fdc706176cdff

              SHA256

              3a6b8afb955bb49b1c82ce5ff988f8e382fa764fd8c4ed89deedbfd94dbd954c

              SHA512

              c1172a96991bbe0351271adda5e1ac7069c86c4900ac6b7e36305f7c438e092eeb1cc27c5b7d81c8baa08e5e466cabcb903df4d9b5bc6c7d8258cf8a9ff7298a

            • F:\$RECYCLE.BIN\S-1-5-21-940600906-3464502421-4240639183-1000\_desktop.ini

              Filesize

              9B

              MD5

              2d55518fd017e47e3d2fdb1499f0a0cb

              SHA1

              5e0e91cf08f4b70c94d582ee42471bf8ff44c6ff

              SHA256

              d615830656bcceecc6fa1159903a379b6e729160ef16ceff51d5c27d2540e52d

              SHA512

              d689aad66c472ce7380828a7363d8626c99dc7025828ccc8f69701e3659e176cf0aa50cfc69d4d813986d823a2075067195b35843f16c1144e6d74094916c2ee

            • memory/1220-29-0x0000000002D70000-0x0000000002D71000-memory.dmp

              Filesize

              4KB

            • memory/1408-96-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1408-31-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1408-38-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1408-44-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1408-90-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1408-748-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1408-1873-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1408-2259-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1408-3333-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1408-21-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1984-0-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1984-16-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB