Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 23:05

General

  • Target

    35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe

  • Size

    69KB

  • MD5

    137638684e2668cd13acc772fc1ccef3

  • SHA1

    899ee1f1649758eb929a0dbf09bcfecd0b7515f3

  • SHA256

    35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530

  • SHA512

    2b0fa720db07f1f36796eb0cfd3a3e6643bc38312297b59ddbf8ec38305adf712b47ef1fe2d082b46cc3aeedc6f221923b43e7d0f5ac00d4f3e08280832667bc

  • SSDEEP

    768:pI16GVRu1yK9fMnJG2V9dHS8FKPh5Rda4FYa5gXtxISlzAyLDbDryViaPm7cg:pa3SHuJV9NY5jaJa2DISl8yLh57cg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3508
      • C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe
        "C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:224
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9CEC.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:824
          • C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe
            "C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4408
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:60
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2272
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2344

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

              Filesize

              247KB

              MD5

              e612d8861208897ec8efe5ae3b9132be

              SHA1

              7e2828de5b36bfdfff267b9b93262c886d92865b

              SHA256

              1cfad6863df695c729a12f1a71730a4c43ee4e53dc7264edee71d1dc0f3d2dcd

              SHA512

              753f6c7c586f2900e5511e7295bb1cce2b1efceb7d1ea1b54c5f223213c3f50747a5328cf252fd2dd76e9bd01b64435cd53a7902197af5dd8d46c26f6dcc3769

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              573KB

              MD5

              4ab2311c3efa42588cdac149bf585df3

              SHA1

              c3295d54c91dd9d24aca6d025f87066aa0387a82

              SHA256

              c6ae378cc908d08479562ae277d2faaf261b3b96dfa29e358db4fef9584fe9ae

              SHA512

              0b6df2a692566798c0b953a3308f1e52c0d3ff45726ea6c7aaeadf2342321358559f04f1610202ce1e62168c215d28611c4229db07dc532689468acc97614283

            • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

              Filesize

              639KB

              MD5

              4baecb97e22493a7726fa776cd11e9b6

              SHA1

              af2dad28d17ec1220505a475f669bf2663893e0d

              SHA256

              eed9c9a08f13ef7be401e0ce827001aa9849769b16dce74012e3bc6925c4fa5b

              SHA512

              75b604ac8a896dcd06f87b35acd06eb0350b5f624cf325bb7ec1e388491f00c7e79c735a4b37468b1c46f20f34c257406f156ba5490196107b8b5a67364cdb84

            • C:\Users\Admin\AppData\Local\Temp\$$a9CEC.bat

              Filesize

              722B

              MD5

              6e88fd068ec39ce4927d75940c8e6bc6

              SHA1

              7a26b3d21cca1525639b3c9728d860d962f29d04

              SHA256

              ae5ec2815bef1eb1620d566af4a6724fb495eedc8918f0f608b28c8a04d6e293

              SHA512

              797b83049e5033ea52c06eb82c3460daeff3deacc15eeb4014e6e987ac48bb2bd992843f855072b577fcb9fd04671e982b66b18d698da0d8a9fb86d49cc5b3e1

            • C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe.exe

              Filesize

              40KB

              MD5

              9c7a7c0374eda967af0d911a6de29329

              SHA1

              26ed41010559c7959a7b1eaf89e89b71b38a6968

              SHA256

              673a2c249387a223fed06d9bd779faeab4145c27ed2b1628ef08579f956fa59b

              SHA512

              f4d54e562ce436487e98e96b3904f0a8ae9838c6631b4c9542691445964e03cac023ab38e2da60e1a504bc74701dda18c13733f1da888a6210be1bb80b6be6ad

            • C:\Windows\Logo1_.exe

              Filesize

              29KB

              MD5

              9cd1b22ca5305c5cc480f0f2753b057b

              SHA1

              e39379b4793cce690ac333aa3ed5da75c213d20c

              SHA256

              363a187f7123111d576a91894824b5d5a9b840066a3825755f7f24431e30d7d5

              SHA512

              44bb942f2fd96984416cc05bbf3c2abfa2dcfe0960a38db6f3ca3d0eb9728fd306341be525dc405d9cd315eae29bd81d3f49729b29afba0d2cf1406e5fce9eb1

            • F:\$RECYCLE.BIN\S-1-5-21-3419463127-3903270268-2580331543-1000\_desktop.ini

              Filesize

              9B

              MD5

              1368e4d784ef82633de86fa6bc6e37f9

              SHA1

              77c7384e886b27647bb4f2fd364e7947e7b6abc6

              SHA256

              57507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772

              SHA512

              3cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b

            • memory/60-31-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/60-37-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/60-41-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/60-24-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/60-1237-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/60-10-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/60-4799-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/60-5244-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/224-0-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/224-8-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB