Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 08:15

General

  • Target

    990c9afe4c6bbb6e9922fc40da5496fcae311fa0e9fecdd5faf5dc4c21552787.exe

  • Size

    29KB

  • MD5

    4090e8e16284b5e25cb91af9158b9a02

  • SHA1

    80fb44c3e6a13cd7ce56b7fda213a58098bd1c65

  • SHA256

    990c9afe4c6bbb6e9922fc40da5496fcae311fa0e9fecdd5faf5dc4c21552787

  • SHA512

    7945149be5fd2c5e4f36fb7962816a24a29c3828896e513e8f02088b5a610d13cf99ac1b66bf5831271a3ada03618919605c318815091e44c09931177aac5a58

  • SSDEEP

    384:NbbJ0U1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:puU16GVRu1yK9fMnJG2V9dHS8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3492
      • C:\Users\Admin\AppData\Local\Temp\990c9afe4c6bbb6e9922fc40da5496fcae311fa0e9fecdd5faf5dc4c21552787.exe
        "C:\Users\Admin\AppData\Local\Temp\990c9afe4c6bbb6e9922fc40da5496fcae311fa0e9fecdd5faf5dc4c21552787.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1432
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4324
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3688
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=2820,i,10369132178352108590,11047993562598554317,262144 --variations-seed-version --mojo-platform-channel-handle=3760 /prefetch:8
      1⤵
        PID:4520

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\dotnet\dotnet.exe

              Filesize

              173KB

              MD5

              80f4ad08cafbca4cb212b9a9d817c56a

              SHA1

              4b3f7114e03d66444edcf7e4c0c1ea87afda5ff4

              SHA256

              1ae5a8e1fbfed7a17fe838ae8d5734dac7e52e7fecc52ddd147c1e28b2ae2adf

              SHA512

              a1f292eebe8287f5e27d5f329f80bc32b72c30465dfb16dc6646bad16f9ea3a4938016b5b7ab893105457c9afb3a7d48fff3f192c1a28caaef72101b4fd6045a

            • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

              Filesize

              639KB

              MD5

              c6d6354b442f8417dc66b1723a800f2f

              SHA1

              94525ba06431ca98c5b8b58c60b24ac8811b1748

              SHA256

              848e14757895f1da1da61c8bb06127caaeb36eb3361768b3baf1a7974ad16716

              SHA512

              49b347afad74e96aeedddaaf3bbf7cb261c5590b4991af35f3fcd5fe2a22954266e5dc84b100590731da608ba49aa04fd5f22c7997d20ca5999cc63103180a5f

            • F:\$RECYCLE.BIN\S-1-5-21-2170637797-568393320-3232933035-1000\_desktop.ini

              Filesize

              9B

              MD5

              ee6da0916e43a13c40e1dec936bccc09

              SHA1

              3c41c332d37b563dad6d1c8ccec540428eae35f9

              SHA256

              0259d8b67e15053053cf5d982948c58d2c6121d2f86b7aefa7c7948979c6e28c

              SHA512

              b70fefd584ad9b4f8c71125a4be5e157cdcbccec18c7f64d235d10c98d4c6005b9c8b6261221211b48f5ceec417792d34750b488f0e2a33dfd702e0094f625a7

            • memory/1432-0-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1432-5-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1432-12-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1432-18-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1432-22-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1432-396-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1432-1225-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1432-4850-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/1432-5307-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB