Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 23:05

General

  • Target

    35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe

  • Size

    69KB

  • MD5

    137638684e2668cd13acc772fc1ccef3

  • SHA1

    899ee1f1649758eb929a0dbf09bcfecd0b7515f3

  • SHA256

    35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530

  • SHA512

    2b0fa720db07f1f36796eb0cfd3a3e6643bc38312297b59ddbf8ec38305adf712b47ef1fe2d082b46cc3aeedc6f221923b43e7d0f5ac00d4f3e08280832667bc

  • SSDEEP

    768:pI16GVRu1yK9fMnJG2V9dHS8FKPh5Rda4FYa5gXtxISlzAyLDbDryViaPm7cg:pa3SHuJV9NY5jaJa2DISl8yLh57cg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1324
      • C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe
        "C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a2B54.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe
            "C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1996
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2972
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2724
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2616

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        254KB

        MD5

        2f23f4e1efacb0e10c93de18de903b15

        SHA1

        c8003971a3eb07aa2f63fd4cb80582c2f6c5a895

        SHA256

        c11bbf970a4f483f0e5beeaefb8afb247abe6133b1c42c9f2f6b51ed13f52b93

        SHA512

        a9526b065dd729db5555826c35da470e546ac2a40f555ef40f5a415d5e90349b6d2099f700fd385ca2259d64cddb9a95b50d3d8a7450b6734d6739df87cd7692

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        474KB

        MD5

        1b12b9060b8875ff79fd921d924df171

        SHA1

        2cefdd8b0ba05d21051feb64909fef80f4d4f799

        SHA256

        b4e50274be3a43611ffaa568b252b827c66855f4f50024b31ac68712cdb4eaba

        SHA512

        26c4d288eb0525f4abaa9fa9704aabd30b21d0dc444a4d352edc92ca584b384c00dc16c3ba9b904ba9cf8718a0e51501e505873d5b09cfc76013eb8f5e5f393a

      • C:\Users\Admin\AppData\Local\Temp\$$a2B54.bat

        Filesize

        722B

        MD5

        d912643ab49e8cc43b811a6325505d43

        SHA1

        b854185aad2da89e4031df72d462bcb9a184ece1

        SHA256

        420fe404fe8e6c8624915a76d17f58a5c6d3655cce40c5866c3bee7264b485df

        SHA512

        cb27ab5b86663e631147df27ecdb7a7255189db96b4b4afe963e0e74c620e199c838dda389a8acb8411fbe6378fca9f85515a259866c0c6711050c4392dbb1b5

      • C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe.exe

        Filesize

        40KB

        MD5

        9c7a7c0374eda967af0d911a6de29329

        SHA1

        26ed41010559c7959a7b1eaf89e89b71b38a6968

        SHA256

        673a2c249387a223fed06d9bd779faeab4145c27ed2b1628ef08579f956fa59b

        SHA512

        f4d54e562ce436487e98e96b3904f0a8ae9838c6631b4c9542691445964e03cac023ab38e2da60e1a504bc74701dda18c13733f1da888a6210be1bb80b6be6ad

      • C:\Windows\rundl132.exe

        Filesize

        29KB

        MD5

        9cd1b22ca5305c5cc480f0f2753b057b

        SHA1

        e39379b4793cce690ac333aa3ed5da75c213d20c

        SHA256

        363a187f7123111d576a91894824b5d5a9b840066a3825755f7f24431e30d7d5

        SHA512

        44bb942f2fd96984416cc05bbf3c2abfa2dcfe0960a38db6f3ca3d0eb9728fd306341be525dc405d9cd315eae29bd81d3f49729b29afba0d2cf1406e5fce9eb1

      • F:\$RECYCLE.BIN\S-1-5-21-3502430532-24693940-2469786940-1000\_desktop.ini

        Filesize

        9B

        MD5

        1368e4d784ef82633de86fa6bc6e37f9

        SHA1

        77c7384e886b27647bb4f2fd364e7947e7b6abc6

        SHA256

        57507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772

        SHA512

        3cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b

      • memory/1324-35-0x00000000024E0000-0x00000000024E1000-memory.dmp

        Filesize

        4KB

      • memory/2772-16-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2772-0-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2972-37-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2972-44-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2972-50-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2972-96-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2972-102-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2972-820-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2972-1879-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2972-2682-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2972-3339-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2972-18-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB