Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 00:50

General

  • Target

    77c1d1810ff974221b72cf90df1b8c028aa03660cd247ced79717079d842c246.exe

  • Size

    244KB

  • MD5

    97a533e33765046422715a4e1dc2f203

  • SHA1

    e044a853e84ba0dc3f191c7884c2797e223ca4e6

  • SHA256

    77c1d1810ff974221b72cf90df1b8c028aa03660cd247ced79717079d842c246

  • SHA512

    9dca0a7f943889065b79b573024cdf1d735ad4a09958d66d1c6741297377f4e285f03d876cec1e6fca62a82e0972dd656195bb41c9e631b6359346351e4a47ac

  • SSDEEP

    6144:8VfjmN9qml5a6EdkQxiUmRQColKGAOPQK2GwIgfx+qSfF0:+7+Uml5a6EdkQgUmR7G9QK3wJx+qSfF0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\77c1d1810ff974221b72cf90df1b8c028aa03660cd247ced79717079d842c246.exe
        "C:\Users\Admin\AppData\Local\Temp\77c1d1810ff974221b72cf90df1b8c028aa03660cd247ced79717079d842c246.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1212
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a735B.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4536
          • C:\Users\Admin\AppData\Local\Temp\77c1d1810ff974221b72cf90df1b8c028aa03660cd247ced79717079d842c246.exe
            "C:\Users\Admin\AppData\Local\Temp\77c1d1810ff974221b72cf90df1b8c028aa03660cd247ced79717079d842c246.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3192
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4856
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4764
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      570KB

      MD5

      b0377341fb1cd23bf08b0d0547e0be76

      SHA1

      70451ec369ba4e7a53f3d1e01b1e39b42020afa9

      SHA256

      8b76fb803f3718f1bb27e140c54dd162a09a4222d9482dfb51c8a915d2b30dac

      SHA512

      123513077bb4d2d0a03ffaf4076d38ce49c91d7b56b86a3776b37007d0ffd59b2f15c46cbd7192123837eda586e8ff89bc73fc4c556faf416c2b86e885607f02

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      636KB

      MD5

      2500f702e2b9632127c14e4eaae5d424

      SHA1

      8726fef12958265214eeb58001c995629834b13a

      SHA256

      82e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c

      SHA512

      f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c

    • C:\Users\Admin\AppData\Local\Temp\$$a735B.bat

      Filesize

      722B

      MD5

      a572a7f7b9155391e97453313b768877

      SHA1

      4523c556d5679cd9c0aef63e51dd1d764742af98

      SHA256

      73f352f6a48d20b98203e591cc96765d2bdaf07fcf6901cd96459808d704c790

      SHA512

      5bab733e9c691546e9c5c6839cdb4e7c7b34747b77f0b532c61fabbee5b578b9ba9dffa28183790122f455bcba874a35430c7d8687c67537930a480ea171aa29

    • C:\Users\Admin\AppData\Local\Temp\77c1d1810ff974221b72cf90df1b8c028aa03660cd247ced79717079d842c246.exe

      Filesize

      217KB

      MD5

      021c57c74de40f7c3b4fcf58a54d3649

      SHA1

      ef363ab45b6fe3dd5b768655adc4188aadf6b6fd

      SHA256

      04adf40ba58d0ab892091c188822191f2597bc47dab8b92423e8fc546dc437ef

      SHA512

      77e3bbb08c661285a49a66e8090a54f535727731c44b7253ea09ffe9548bae9d120ef38a67dfa8a5d8da170dde3e9c1928b96c64dfc07b7f67f93b478937c018

    • C:\Windows\Logo1_.exe

      Filesize

      26KB

      MD5

      78710f16d099deb583cc8950bbd86633

      SHA1

      0cfcd3d2029cd4705f5ed116ac631a284d18a0a4

      SHA256

      95374ecebea4ca70e62a8ef2ad6f9372b21ed81b18fc1ab17818166922a66629

      SHA512

      a6bf6957c800ac7a628a169f32e224e928f087ce332847ba1a3bb8a013277f799198a6d2e4f6f3d29bb2a26dd01ab552d80c78935ac55a96ef281e9df54e6cdd

    • F:\$RECYCLE.BIN\S-1-5-21-2412658365-3084825385-3340777666-1000\_desktop.ini

      Filesize

      9B

      MD5

      727587ac9e9b63e6089c94853023cbc1

      SHA1

      8610a447d0588044a25ec41cd3eb02009d3b270e

      SHA256

      ea10466ad4251dafdbb3d06f5e87fb5ba60894cc800b5024c0ee470430f998e0

      SHA512

      583b9c3b5ed8d3f6d72014af85357378fad213a009fc336dd0160ed6a60a91b1c179e0ec25b822f0ac1479d60d98b1c969ac75fa2b05ecd29dca577cdaf8289b

    • memory/1212-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1212-11-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4856-28-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4856-34-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4856-38-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4856-21-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4856-489-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4856-1235-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4856-4793-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4856-8-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4856-5238-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB