Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 01:48

General

  • Target

    b4897e55d06a33fe6e2d9b2fa9b587d3ae1a97ea03a2b9e77719b121424c4948.exe

  • Size

    68KB

  • MD5

    94aeea7408449f314a70fd6d703f515a

  • SHA1

    7a69a1c807711cba0b449469c6c47e4d8bbb3ad2

  • SHA256

    b4897e55d06a33fe6e2d9b2fa9b587d3ae1a97ea03a2b9e77719b121424c4948

  • SHA512

    063c8ab821f97644d53844d52d5618b76c33c2e51cc46b576833c5a39c9279ad9287621bf0daba39b6cc4d79c2a1d777c776ceae48e8eac189ce8cf9466bd9c4

  • SSDEEP

    1536:r3SHmLKarIpYeEToa9D4ZQKbgZi1dst7x9PxQ:rkF3pdlZQKbgZi1St7xQ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\b4897e55d06a33fe6e2d9b2fa9b587d3ae1a97ea03a2b9e77719b121424c4948.exe
        "C:\Users\Admin\AppData\Local\Temp\b4897e55d06a33fe6e2d9b2fa9b587d3ae1a97ea03a2b9e77719b121424c4948.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a4EDB.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2368
          • C:\Users\Admin\AppData\Local\Temp\b4897e55d06a33fe6e2d9b2fa9b587d3ae1a97ea03a2b9e77719b121424c4948.exe
            "C:\Users\Admin\AppData\Local\Temp\b4897e55d06a33fe6e2d9b2fa9b587d3ae1a97ea03a2b9e77719b121424c4948.exe"
            4⤵
            • Executes dropped EXE
            PID:2860
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2144
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2720
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2844

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        252KB

        MD5

        3b6ab73ad7d6d27bbc1f2b09b6a7a13a

        SHA1

        a9adb49e14c018f19837e90e2d5cd930cd3c8d40

        SHA256

        996c71e8a6f399e7895e24bb031067770cad117cd9569743244ba32c97a310f8

        SHA512

        ce509a807c60da7faa8c579f0228195334decf42787fc578e384a6d77e10ba17d7e2f5781ac75578b31278612587a48bdd8d5c8e93481c0dc4376a0d41ef5ed9

      • C:\Users\Admin\AppData\Local\Temp\$$a4EDB.bat

        Filesize

        722B

        MD5

        7ab5ef1c2aba5b39cf86ff29c592f403

        SHA1

        4f519902dfe9d61587818e9b3469ccb7e4200118

        SHA256

        4b00beb0dc086a08975e4f938112368611eeef332824ebfab778182f40aa5011

        SHA512

        09de02f04a8171c308a0d751cb1960c187e62325f2be9b3e3f70037ebf26b292fceb664b0cffcea83a4c8c16235b9418215698dc23e233856905597a4ecb232e

      • C:\Users\Admin\AppData\Local\Temp\b4897e55d06a33fe6e2d9b2fa9b587d3ae1a97ea03a2b9e77719b121424c4948.exe.exe

        Filesize

        41KB

        MD5

        977e405c109268909fd24a94cc23d4f0

        SHA1

        af5d032c2b6caa2164cf298e95b09060665c4188

        SHA256

        cd24c61fe7dc3896c6c928c92a2adc58fab0a3ff61ef7ddcac1ba794182ab12f

        SHA512

        12b4b59c1a8e65e72aa07ee4b6b6cd9fdedead01d5ce8e30f16ca26b5d733655e23a71c1d273a950a5b1a6cce810b696612de4a1148ac5f468ddf05d4549eed5

      • C:\Windows\Logo1_.exe

        Filesize

        27KB

        MD5

        faa537da04333b1d2264b5e74336142e

        SHA1

        8ac278558286edcbe5b0648d0052dc98e148aa40

        SHA256

        9c1055873c600ca7e5e6d55aff2bc1287d91b6e7e7dd73af40175e27cdc8c131

        SHA512

        91ba1be7a655d818e3ba62c5bb1c023ce19e5105a5d1b798d9da1faf6dded3c0ea4507617ed56dbf911f2a235547f02f4ecf1fd353e0451ea0870eb6605f2dd1

      • F:\$RECYCLE.BIN\S-1-5-21-2212144002-1172735686-1556890956-1000\_desktop.ini

        Filesize

        9B

        MD5

        ece8e24737d1957fb4e94d8890ee8d02

        SHA1

        6c79bfb99f560a2102a903116f5a0c195f7885e4

        SHA256

        d920366b3c62a677cf0cf1f267a7c2f3dd693f2ff60ee023091bf9c39c5e30b8

        SHA512

        ccf58b4da1ad1379a546f307bca8dc4452a61a3cb443814f4d9566b8d8d35cc9d794ada4d1a13296ed5bc0248ba5ef538e5dc5e22861c2ead3f479beeb5c2d37

      • memory/1212-30-0x0000000002A00000-0x0000000002A01000-memory.dmp

        Filesize

        4KB

      • memory/2144-45-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2144-19-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2144-32-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2144-39-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2144-91-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2144-97-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2144-145-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2144-1874-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2144-3334-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2564-16-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2564-17-0x0000000000260000-0x0000000000295000-memory.dmp

        Filesize

        212KB

      • memory/2564-0-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/2564-15-0x0000000000260000-0x0000000000295000-memory.dmp

        Filesize

        212KB