Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-07-2024 06:55

General

  • Target

    f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe

  • Size

    1.3MB

  • MD5

    052883fcc6a0671beb1d6e54b7ed5f53

  • SHA1

    c9c0c53fe12c0cc5a805202f9b0113e805dec61e

  • SHA256

    f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805

  • SHA512

    3078759cf8894deb98500f85029f013a8e64aa4843cfaad62ba50d6a272fe1b614c924edbd378ae309a65b81d6f1e148662e47d7e908af8d99fb6d1e947bddad

  • SSDEEP

    12288:a7+XrVWEemmRuTKKoL8CZUXuTZLGnuBEyhC3MMICFW7wMDSK8XkplRTkVjtQz6S+:a7QWgjGKoLRIMZGVcsW7ZDk07c2Vz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3508
      • C:\Users\Admin\AppData\Local\Temp\f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe
        "C:\Users\Admin\AppData\Local\Temp\f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3200
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9710.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1652
          • C:\Users\Admin\AppData\Local\Temp\f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe
            "C:\Users\Admin\AppData\Local\Temp\f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2168
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2044
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4960
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3728

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        49d73867fefcad9c060a0415bc83cbcf

        SHA1

        ad437f02232b185bfd309ec3896fd021f4e3d2c5

        SHA256

        7bd98c34a1456c9505c6cc4dbf728d1c8356e4cdc14c6fa4c73afa5ed12fae7d

        SHA512

        80802103f330e52117ce8d467a7e7e11a232f31ce9d8b173a3676ceb0b9b0448f73dfea77258400e69382ad702cb515c11b825c974dd265be91263d12f0b8a42

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        4afcc72a0eb6f173153e9ecdf2213914

        SHA1

        99500c0a9697a7d0fe4e1d43b239085ffdb1768d

        SHA256

        ffb14b1576505355adae748a96e3398b940a9f5b9b886e92423927b96112ea9f

        SHA512

        ace1123da1803f5bf138144dc933bacdf0930fe9c4e0449a265f7d3d6841d65f3a9a10f9ba9d135e5e6c74b4c5e9cfab4232c457970902f79e41b48e0cc21cd4

      • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

        Filesize

        636KB

        MD5

        7c0581e2c34a99e0e6b7b63deb7540d8

        SHA1

        2ad688b178321284f2eab56ad02ef1d32e7ea46f

        SHA256

        200d8896a4cf3d442567696ff425b2aeca8b87428173337c4f5b9022ae0d6ab0

        SHA512

        4e65033131dd98ef1eb39d5da1c3a92b8d4c3ca083edb3db7bf9f555e57285f9f5c63bdc4d24cc5aa63312edd216ebc74c0a7f74ed38783e27998a2c013a496e

      • C:\Users\Admin\AppData\Local\Temp\$$a9710.bat

        Filesize

        722B

        MD5

        29aab70f6fa08841fc1a190395872583

        SHA1

        f92b54bd11c60394519b516928a47354133f399e

        SHA256

        0f21651bf8d76f44c7fd96e0cbfe6cded9911ea81dfc9bb5d94496e7c9ba9575

        SHA512

        bacc7bafe081bff6a8057970949a41c652d8004a21fe59e4317b9e3963f5de57c8407919cec76f9ee44fd5bc0a1340c73f1315d0bc4fc185bedece26dd7a9500

      • C:\Users\Admin\AppData\Local\Temp\f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe.exe

        Filesize

        1.3MB

        MD5

        58a624edf9ecdc81c43734726e4736ad

        SHA1

        9368c84d8e11ddb41980ce625637654ec4280b33

        SHA256

        1ec6fddc32cde589671c51b28ab2dd1fb4963965d231884c15b7b1aedf15c24c

        SHA512

        d40f848ac84896fca6a38f50e806d9b11a7b0961fc647a6475f2ade4624cb754ac66a06199ae5ba9dc345ae85fb1eeb95955b8c22679a4cff45757fb6c4711b3

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        a2f15a56bca2a9c4410e0a063716a67a

        SHA1

        e56e6b63e089e069a666a681328cd36a658f6ea9

        SHA256

        2067df5a435e63d4ad6410e76ab1bb5c4324c575d58b9af9c4e8b028149c27ff

        SHA512

        d5405bb49ab47951ccab00fb71cb6159a285b40c83b28440c1b29e711a9555416ec7f2cb6478c97131568dd89013ef41b5ed0369b9b3117044d8b70a83df44d1

      • F:\$RECYCLE.BIN\S-1-5-21-1403246978-718555486-3105247137-1000\_desktop.ini

        Filesize

        9B

        MD5

        1368e4d784ef82633de86fa6bc6e37f9

        SHA1

        77c7384e886b27647bb4f2fd364e7947e7b6abc6

        SHA256

        57507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772

        SHA512

        3cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b

      • memory/2044-4806-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-44-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-29-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-11-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-1238-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-191-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2044-5253-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2168-22-0x0000000000400000-0x000000000054A000-memory.dmp

        Filesize

        1.3MB

      • memory/2168-30-0x0000000000400000-0x000000000054A000-memory.dmp

        Filesize

        1.3MB

      • memory/2168-47-0x0000000000400000-0x000000000054A000-memory.dmp

        Filesize

        1.3MB

      • memory/2168-41-0x0000000000400000-0x000000000054A000-memory.dmp

        Filesize

        1.3MB

      • memory/2168-33-0x0000000000400000-0x000000000054A000-memory.dmp

        Filesize

        1.3MB

      • memory/2168-1237-0x0000000000400000-0x000000000054A000-memory.dmp

        Filesize

        1.3MB

      • memory/2168-31-0x0000000000610000-0x0000000000611000-memory.dmp

        Filesize

        4KB

      • memory/2168-1239-0x0000000000400000-0x000000000054A000-memory.dmp

        Filesize

        1.3MB

      • memory/2168-1241-0x0000000000400000-0x000000000054A000-memory.dmp

        Filesize

        1.3MB

      • memory/2168-45-0x0000000000400000-0x000000000054A000-memory.dmp

        Filesize

        1.3MB

      • memory/2168-5256-0x0000000000400000-0x000000000054A000-memory.dmp

        Filesize

        1.3MB

      • memory/2168-4807-0x0000000000400000-0x000000000054A000-memory.dmp

        Filesize

        1.3MB

      • memory/2168-4809-0x0000000000400000-0x000000000054A000-memory.dmp

        Filesize

        1.3MB

      • memory/2168-19-0x0000000000610000-0x0000000000611000-memory.dmp

        Filesize

        4KB

      • memory/2168-5254-0x0000000000400000-0x000000000054A000-memory.dmp

        Filesize

        1.3MB

      • memory/3200-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3200-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB