Analysis

  • max time kernel
    149s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 18:52

General

  • Target

    5cbeb007d9359a588e31e4e4ae5f0c84638f1c05411fb053e894932388819f38.exe

  • Size

    484KB

  • MD5

    99fde31f13ca8a0524a5734ade4cb3e7

  • SHA1

    c7882ba73a502f25aae095b0638bc8ab11481ddf

  • SHA256

    5cbeb007d9359a588e31e4e4ae5f0c84638f1c05411fb053e894932388819f38

  • SHA512

    387e0094c1b203d7f035bebe5a83ff65887b9742040637290e51196f8589f4aaacd5c0eb0ed55470aadc95dba45a44b9e1ed08d9d7bc1fe22f20f54261929f40

  • SSDEEP

    6144:fVfjmNOz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fay7:N7+I1gL5pRTcAkS/3hzN8qE43fm78V

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\5cbeb007d9359a588e31e4e4ae5f0c84638f1c05411fb053e894932388819f38.exe
        "C:\Users\Admin\AppData\Local\Temp\5cbeb007d9359a588e31e4e4ae5f0c84638f1c05411fb053e894932388819f38.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4740
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9FE9.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4652
          • C:\Users\Admin\AppData\Local\Temp\5cbeb007d9359a588e31e4e4ae5f0c84638f1c05411fb053e894932388819f38.exe
            "C:\Users\Admin\AppData\Local\Temp\5cbeb007d9359a588e31e4e4ae5f0c84638f1c05411fb053e894932388819f38.exe"
            4⤵
            • Executes dropped EXE
            PID:1292
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:448
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2108
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:1392

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

              Filesize

              244KB

              MD5

              01729c17d91e88f012a6bdb353cc1fee

              SHA1

              a114c67b8f9c2583285633e8fc471e1302eaf8a0

              SHA256

              0a6da00d3d4f1b3e390884402707b9be3eeb0b1e5968dd499201939cd673f862

              SHA512

              ea1975834414aa1700ecc9cd2ae4d812db9396518d35ba77f4886f14b69cf667678f1c41dce8df7824fa3f177c6653cfe627b68f62ffe95a5312165bfd19f605

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              570KB

              MD5

              7b206196b8d9c0b9a5895ea80eb7e834

              SHA1

              54c6f73cc74b373495f91c9ff4f2ee8c579f4b3f

              SHA256

              0c75f08f3272cb0ae725738be41b32d495637f65ce942b39d638ce7402ced159

              SHA512

              04665b738a1a1cc82a18e1a60da7c2303a6b650e00c918867bba5112f20e2774f239ecc7b2cd96798cab50af6c9cc2bf2f78d7e6a9bf02b64f34780ab5cb6a30

            • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

              Filesize

              636KB

              MD5

              53ee62011469b286a2a1b5658c86b9bf

              SHA1

              9bdac0b23b0a965947c780c6a6b48fc7122f9ade

              SHA256

              7125735e4e8595f1c17ff3235bc65dacabc2ec874b29ac7ba8eddd80ad10b3c0

              SHA512

              c9c24e578da0a38048e71548fac66465bcb624e971f745bba559e8c49fd621752e718d4c983a90a97277407bb23348ca109436e1eeebef030c3b599c712ff236

            • C:\Users\Admin\AppData\Local\Temp\$$a9FE9.bat

              Filesize

              722B

              MD5

              32e144457c2131b8f407ff0657049f00

              SHA1

              2cef8126677efd68c2a2030812f404d94eb3d7cd

              SHA256

              e3ea56317a9b73d9372c6149fe86c9278a332f7ae9abe9652e50033369ea766e

              SHA512

              56b07c6dc85f0b297c506a148ab5d7f1a21e37b2f1c1a6d5586e26a1d9585143ed8083924c40d6672bfab4f020858b5bec3f0db0ff725a2c5efcb8b201363bc4

            • C:\Users\Admin\AppData\Local\Temp\5cbeb007d9359a588e31e4e4ae5f0c84638f1c05411fb053e894932388819f38.exe.exe

              Filesize

              458KB

              MD5

              619f7135621b50fd1900ff24aade1524

              SHA1

              6c7ea8bbd435163ae3945cbef30ef6b9872a4591

              SHA256

              344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

              SHA512

              2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              ede08e8e12b90be2cfe1190ed3141fed

              SHA1

              98b6a57387c2278fb10ed0be35d68e1e0a462e7d

              SHA256

              cfd72e0036602b6f2ff6171657099432524a03ab5aa3bf8668603fef43bc294d

              SHA512

              13a3651720c3f4a25dff552a5d2bd5a500a225269d2f385a988622cffc635c28d1ce04b43c22d631a0c59da8688119cd95b05fa8d99cf1be69623063753331f7

            • F:\$RECYCLE.BIN\S-1-5-21-1176886754-713327781-2233697964-1000\_desktop.ini

              Filesize

              9B

              MD5

              2efce5174bcf8d378a924333f75e26ad

              SHA1

              4fe6e1d729b55d42eb9d74aca11b36a94402de14

              SHA256

              04ccb9bec2864153c72852867d8e65dca07eca4e5edcfb4beb62cb364dcd91fa

              SHA512

              24684969632fb0562a3a7a5fec91d869d627730d8e9d83a2b17e326d7047e3fbff205eec207914e42ecd50fef68a212c19f3599ded271c00e66acc22f1f04c16

            • memory/448-27-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/448-34-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/448-37-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/448-20-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/448-1067-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/448-1234-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/448-4800-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/448-10-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/448-5245-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4740-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4740-9-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB