Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 06:03

General

  • Target

    02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe

  • Size

    393KB

  • MD5

    8eaf7b4efcc8dd3567706983eb7df5c3

  • SHA1

    f4ea36e1cc2895ff735f32d4e9d32b049dd800a3

  • SHA256

    02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51

  • SHA512

    f26ed01c1a1b5753b5b8db3aed7074d58f496a2261c9e703e231bd5b45b94a02332253f5d911bb2d4d041675ccad4c435381d9484a655fc49473c171f2d90484

  • SSDEEP

    6144:w5uJOnDXYQ/BWJjmpgtBZQZKQj8p3jyb7HREd4SZ1tzLbF:w3DXYJmSTZwYp32bY4qtDF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3440
      • C:\Users\Admin\AppData\Local\Temp\02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe
        "C:\Users\Admin\AppData\Local\Temp\02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3428
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBD06.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4716
          • C:\Users\Admin\AppData\Local\Temp\02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe
            "C:\Users\Admin\AppData\Local\Temp\02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe"
            4⤵
            • Executes dropped EXE
            PID:3576
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3840
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3208

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      247KB

      MD5

      6dd38c010083e5c13ff3936a5548205a

      SHA1

      a6a6aeb9015170dc88f15153f63b7d7ddb91a036

      SHA256

      55b5774046171e5182383aebde54e6bbc6a6c1f0ad6da1ab592329e14202bfa2

      SHA512

      002afe6d11c710abe9a69a00bbdb02eba11ec3edec7c38cbcca84f897aa4c399e460a98820a7efe9c94ad0cf05527705ccbb29477fe8969ac3545564b3ac8a37

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      573KB

      MD5

      1719a2d1601992ea793d68322ec8b503

      SHA1

      9d6144a655fa6e3b622e514aa287702492bce00b

      SHA256

      6380c20c410827f37697fb381db2ef5558bfef573e386bb6a2407e81b239d609

      SHA512

      d08719e0beef69a1f5acfadfc95bdba1e685a1cd51608dbea50c0a4b939ca732c11ecdfe2b2c0f1705a323ecc1d1464da5fd8de7643a052ddebe26070ed4019b

    • C:\Users\Admin\AppData\Local\Temp\$$aBD06.bat

      Filesize

      722B

      MD5

      e70448fa1296813fd3ce52c20e14a7df

      SHA1

      213eb04e2fe11e4013aab321bc557c0eae11cf87

      SHA256

      00a07ead5d294fb75a10e3899d91edd1f76830cbbb48b68de19853875bfd8565

      SHA512

      125b6b6142ec7a62def9d9cfbc06344ac25c00b4a1bf9b7275075d9141bf86cd7401188da70a5fe7671afbcbc72e61f044eea935a93b8c9f14dfc8505c12c8d7

    • C:\Users\Admin\AppData\Local\Temp\02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe.exe

      Filesize

      364KB

      MD5

      213eeb5e8f54231f68e5b26a0fc81bd1

      SHA1

      1bc31a42536eacbb57d1cd92ec4b5524a82264d2

      SHA256

      b309045509efc205eb35d6037d64640093fde6c54ec5934e329b447417005a50

      SHA512

      ce35c5f453126c98329df141f821c55692f9252549c76921c231d8170df356cda1689e636758519c0b6898f11b5c836cdb4967d296b99f915e4d1980470a083b

    • C:\Windows\Logo1_.exe

      Filesize

      29KB

      MD5

      fe81b352c926f7b1f4c870e720357e97

      SHA1

      34b1cfd656edd3961964a52c1e22c46d50efc25b

      SHA256

      d39225fb89e1911dd419a40747fa7d039f64c60740c4d606f59e7da28f84f00d

      SHA512

      2a7673cb82f6ee26823303c51453809e8b8573d0cb3c6129407c363bff6a611d8349fa9d90ee756cd5e589e9ffc3509b34eed61318922f37721913eb9bbd1808

    • F:\$RECYCLE.BIN\S-1-5-21-1194130065-3471212556-1656947724-1000\_desktop.ini

      Filesize

      9B

      MD5

      4a3bb7dd20666e6acdbbb0a30534552a

      SHA1

      9734039e7de3c663de70f65e731dc3426e73940c

      SHA256

      44b303f424240fd96e60c63ce757a0011734fd320fe031942712f1a1a083fd47

      SHA512

      8b20f7e731d617da7c6d7c1fe1b50424ce3edc58cbc7598b662f0db6e0a31dc92e2d1ecd56021fe43e035bd36e4edd9d3cb80f22afc224096cc3974396076f07

    • memory/2756-26-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2756-19-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2756-32-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2756-36-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2756-652-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2756-1233-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2756-9-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2756-4791-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2756-5236-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3428-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3428-8-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB