Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 10:14

General

  • Target

    91994eca993f0fbbc6bfa49b43e381f2bc9b01a02b25b486bba57a7d75044daf.exe

  • Size

    29KB

  • MD5

    68f8fd91e358f6b908a9cefc157b0faf

  • SHA1

    1067044f27b6cea929321f1012e72eccf264eda6

  • SHA256

    91994eca993f0fbbc6bfa49b43e381f2bc9b01a02b25b486bba57a7d75044daf

  • SHA512

    d5ba48a30a37a5956c9888717102586435434c05afc6fe21bf498f47de863d8e79d99cea6961cdb0a9251f25ba448eb9b7d84e794fd633518ea13a4ffff7ad9e

  • SSDEEP

    384:NbbnIPW1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:psPW16GVRu1yK9fMnJG2V9dHS8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1136
      • C:\Users\Admin\AppData\Local\Temp\91994eca993f0fbbc6bfa49b43e381f2bc9b01a02b25b486bba57a7d75044daf.exe
        "C:\Users\Admin\AppData\Local\Temp\91994eca993f0fbbc6bfa49b43e381f2bc9b01a02b25b486bba57a7d75044daf.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:900
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3060
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2528

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              254KB

              MD5

              06518376ff8536cf21c3955ffd751adb

              SHA1

              d15d8920ff048cd8c85e2c13eabd0454a7c1e9b0

              SHA256

              fecc7082de325692461f873f9e95a8d3fb6a360f1be027930dc6f09c1bf068cb

              SHA512

              eede88e014b9520935c806af19ec2d7e5783f0c8bfd28bd742f5edfa12c89176a385b7018eb45a388753467d72be1174c78d416bec517ddec4f3b4e5d083faf3

            • C:\Program Files\7-Zip\7zFM.exe

              Filesize

              959KB

              MD5

              bd04e32fe0e5bfaba5ce8e9093cf1c34

              SHA1

              f9e71444c68b6b478e2188625e462b16cafb5c33

              SHA256

              75d2a018585eec4bc196138e4591c3b5b31946caccb5a8072a87490a1ac13f7b

              SHA512

              99908cadc3fdbb3658db1af4c9f4b8c17f33043c1e397330970ac58778fbae83c9d93e6fddb0a8ec2c6e775e3a3a1b5f3d615ee2104c1ec9a74c40a51cc94b5c

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              474KB

              MD5

              17e5de36cf448d652adab881a4557ec2

              SHA1

              c45337444120f4cc4a9a65b2bee63cd61618ca2a

              SHA256

              32568fb07078e0d4e77efac9ad862454dba63de5c5f920d9a14de709372f2430

              SHA512

              22678c9ca2d70d9a3377d1f2c6c91d7649adcaccee564acdf1bd6373e60f13f6e21fc09feed5b590475889996287961a1450542741ef0888a4a0b5e9c9812b92

            • F:\$RECYCLE.BIN\S-1-5-21-940600906-3464502421-4240639183-1000\_desktop.ini

              Filesize

              9B

              MD5

              1368e4d784ef82633de86fa6bc6e37f9

              SHA1

              77c7384e886b27647bb4f2fd364e7947e7b6abc6

              SHA256

              57507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772

              SHA512

              3cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b

            • memory/900-66-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/900-20-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/900-0-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/900-72-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/900-14-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/900-417-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/900-1849-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/900-7-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/900-3309-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1136-5-0x0000000002D20000-0x0000000002D21000-memory.dmp

              Filesize

              4KB