Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 01:26

General

  • Target

    b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa.exe

  • Size

    573KB

  • MD5

    ddefc550defc29a5c9165b3f230d0bd5

  • SHA1

    932fdabe416079feb2df28d4919eb49a9d2b4d55

  • SHA256

    b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa

  • SHA512

    9e28feb153c62b79a65b9cf80bb9b348fe577bcdeb26ba05c94bfcec7ce8cbcda8e0b65b0bdef32245d48bc19ec8ff3f7bb78030a528f222d154436d8d9daa28

  • SSDEEP

    6144:cuJpE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQfu:I7a3iwbihym2g7XO3LWUQfh4Co

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1392
      • C:\Users\Admin\AppData\Local\Temp\b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa.exe
        "C:\Users\Admin\AppData\Local\Temp\b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:948
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aEA20.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2196
          • C:\Users\Admin\AppData\Local\Temp\b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa.exe
            "C:\Users\Admin\AppData\Local\Temp\b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa.exe"
            4⤵
            • Executes dropped EXE
            PID:3032
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2184
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2740
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2824

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            254KB

            MD5

            90ce7d7bbcb931da010a9570d0d6529b

            SHA1

            8430c9e40c3308ed6b68fe06206ddc8fe1f0682f

            SHA256

            5dc6799d3a8e98d4a04761df7bad18c6109983b86007b51e8f642dcd6695a5ac

            SHA512

            3af2fae3d58268c427db2e29436b8e7e10a08104e7b9c0b39ee5e11084a4df05d6c76be20157f6780b4f18573633d12670e0c7cab3e685203a6eaf3396b723ef

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            474KB

            MD5

            c00c10d640d17d701e266a6fcc683ec1

            SHA1

            fbd5b53c7f0e22f52d8201b738e9ec1cc7b953f3

            SHA256

            8626b01936d75fb83021910d1c8d27539fca7a6ca5e2fdc8a63808075674fcbf

            SHA512

            36162a1921eaaaf6bc9360e7cca63e909ec0a29d30019929787c5c07e80d73822f721c4af417609081c588b66d09035f968b86c0bc4348a86101e83f65e87db6

          • C:\Users\Admin\AppData\Local\Temp\$$aEA20.bat

            Filesize

            722B

            MD5

            f74dcec8e46ad7be23ff4b0c1224bd52

            SHA1

            6d8adf7c3816a0afeef2d4d5849a89774aca833e

            SHA256

            30d6763579eb285bc563cf58cb01edc337110faaaf3045eb99b64b2c13a265eb

            SHA512

            b5dc126ea8f5e38c16e9fd4bc6f1005dcb4223d2c1a6b86c867bb41431baf7e65ff6d5f14e6b91f08f83ab53849a38b7b44d9fb252ca04fcffc2ebe84ee8cc39

          • C:\Users\Admin\AppData\Local\Temp\b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa.exe.exe

            Filesize

            544KB

            MD5

            9a1dd1d96481d61934dcc2d568971d06

            SHA1

            f136ef9bf8bd2fc753292fb5b7cf173a22675fb3

            SHA256

            8cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525

            SHA512

            7ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa

          • C:\Windows\Logo1_.exe

            Filesize

            29KB

            MD5

            f387ffee851cb89909f398efad649424

            SHA1

            0e4943052ac21048b38c0dbdcc747b9bef7266e1

            SHA256

            a8e4748a903fdd6f8044c73ee7f47199b3fa95271904f01dcb2db9ceb800e2ee

            SHA512

            79f901a1424456a640e46f2bdb4e67ecef200a667fe7f179849779fe65efad697d90ecd6eba479e4ccfed82d957d0e12c94acbe3c8b980f80a6ae6ca7e84b431

          • F:\$RECYCLE.BIN\S-1-5-21-457978338-2990298471-2379561640-1000\_desktop.ini

            Filesize

            8B

            MD5

            646a1be8fae9210cfba53ee1aab14c96

            SHA1

            8677ff347131a9c8304f10b48012ebd8b075030c

            SHA256

            660d57a3dc71884e70a9cbd6ca26d02872f4706abeb098c6d35f6b217462edf5

            SHA512

            812b716a422628d486a4c78c66a85c641f13976537fbd452e14fab9a6c440b442632df04de8437c485c9c8164e3b3499201d3dbe681b36fe6bec749df1ab75e4

          • memory/948-12-0x0000000000270000-0x00000000002A6000-memory.dmp

            Filesize

            216KB

          • memory/948-17-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/948-0-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/948-32-0x0000000000270000-0x00000000002A6000-memory.dmp

            Filesize

            216KB

          • memory/1392-30-0x0000000001E00000-0x0000000001E01000-memory.dmp

            Filesize

            4KB

          • memory/2184-22-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2184-46-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2184-92-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2184-94-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2184-99-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2184-188-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2184-1876-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2184-40-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2184-3336-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2184-33-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB