Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 12:34

General

  • Target

    38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe

  • Size

    713KB

  • MD5

    8f611028b6eb10f2dc91d3515b62fcba

  • SHA1

    4431412ab5f057b64f592f48dc8ba8a948ba4a3a

  • SHA256

    38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7

  • SHA512

    1ca318ce6b038ab563cbde483be4121069aaff4c1ef646e2344cf36f4ec034a265e8e2147c0279cd36d708b26951a9a4f26bc694fb8d942a0964cf68a27a40a6

  • SSDEEP

    12288:bfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:LLOS2opPIXV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3472
      • C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe
        "C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:448
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9839.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1004
          • C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe
            "C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe"
            4⤵
            • Executes dropped EXE
            PID:1480
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4220
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2940
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4400

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      247KB

      MD5

      98d6ec076affb1dea33abdd4843c21a9

      SHA1

      582d4e5c8b09f21af9a280f6e0d707d3fb7b8502

      SHA256

      e74c06cab239b237e5553a83b62005fdc796750d9cf6a11b5d7d78b6099adafa

      SHA512

      4dd48a27489cae7e04ca9cd70987af6fc968c0d11a301a3117ff68447e06d9f23ba8cdc642f4be2380b082ff4cf8bf60145eb26e95e1d24fa5b07199e50ca33c

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      573KB

      MD5

      77b7038561b33c2346fc1744724908c4

      SHA1

      3a4942ed70b781b1977d87d69db1269d22c030ea

      SHA256

      b856781d2b3b0bd516413ac4332fa0973a8a30f08cd22e95cef2bbe850e8d701

      SHA512

      09819da55166dbd72f4595c97c2a44d98e71c69a294dc248a6810cac15710ff5f38e53613968466d597658aafb3afefbb199f755dbea2d4a17311de1d09c8a07

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      639KB

      MD5

      fdc5a81c18567cb220564ba55e8d7be7

      SHA1

      dfd68e6c2ee80bca6834cc65acd20ac712763211

      SHA256

      2fa38747faeabdadfee00a92284940d5ba67bd18cc5f2eac1d24b2eb51ef4560

      SHA512

      65459f75900b5e80025e8fa3b02ff74ff87df408c85a811aeee1596aaa071548f63db773ac6418c4d26a98211f5b3997b5e5be6402be0e87d4ab6622eaaeb31e

    • C:\Users\Admin\AppData\Local\Temp\$$a9839.bat

      Filesize

      722B

      MD5

      638ab9b0ef842a49431b8daac5f56f0a

      SHA1

      c532d2d33261bfa78d4cfce6e1cccf0347cfce6a

      SHA256

      881996ff18d317fc494cfbaf4e9de13b60c7fad93847885d494a3ca1ef641a1e

      SHA512

      90f61d71ab51752d917eeed77bef07f6b6c345934faf7d6fa52221d75be622a7e5b6e8d82f8d0e2f04fedbdc1fbb5990dd5467a90d23adc1c5f58fb125cf462b

    • C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe.exe

      Filesize

      684KB

      MD5

      50f289df0c19484e970849aac4e6f977

      SHA1

      3dc77c8830836ab844975eb002149b66da2e10be

      SHA256

      b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305

      SHA512

      877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38

    • C:\Windows\rundl132.exe

      Filesize

      29KB

      MD5

      02c3a4e7f369c64fcc4c92be92bc6e29

      SHA1

      031a8330543a7a12de06d356e5e2b75ec8bf760a

      SHA256

      a737dfa46ed58e1ac2264b44e764be23b0d8548717967a4494c13d7669638ac0

      SHA512

      69469ae10b8942fb7ba0e72b47e375dffb31dca5fd8a9ef738dad403b19d17b0e4bc55ebb4d25244d5d99e9e99972bc80675f16554bb8f72f17bfa7d010fa76f

    • F:\$RECYCLE.BIN\S-1-5-21-1302416131-1437503476-2806442725-1000\_desktop.ini

      Filesize

      9B

      MD5

      01a8a4ee3580d4da5c60557485bef735

      SHA1

      f792412989fd2ce56b5d859cceef65819bf0ddf0

      SHA256

      e2897bad6bc31a67e597a2ef77fce6939385cf6bd64587f2cc006436c43a4f2b

      SHA512

      8ae193b79f1861b54d2a26031b161bf9aa6929661871de0f2c1cd1db91c5384244332bafc72bea107045eb0b41d876053ce11f5ce70147832f1871816c641145

    • memory/448-11-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/448-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4220-27-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4220-37-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4220-33-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4220-512-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4220-1234-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4220-20-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4220-4792-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4220-9-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4220-5237-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB