Analysis

  • max time kernel
    149s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 01:26

General

  • Target

    b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa.exe

  • Size

    573KB

  • MD5

    ddefc550defc29a5c9165b3f230d0bd5

  • SHA1

    932fdabe416079feb2df28d4919eb49a9d2b4d55

  • SHA256

    b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa

  • SHA512

    9e28feb153c62b79a65b9cf80bb9b348fe577bcdeb26ba05c94bfcec7ce8cbcda8e0b65b0bdef32245d48bc19ec8ff3f7bb78030a528f222d154436d8d9daa28

  • SSDEEP

    6144:cuJpE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQfu:I7a3iwbihym2g7XO3LWUQfh4Co

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3524
      • C:\Users\Admin\AppData\Local\Temp\b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa.exe
        "C:\Users\Admin\AppData\Local\Temp\b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2072
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8CBF.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3464
          • C:\Users\Admin\AppData\Local\Temp\b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa.exe
            "C:\Users\Admin\AppData\Local\Temp\b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa.exe"
            4⤵
            • Executes dropped EXE
            PID:1712
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4652
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2016
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2936

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

            Filesize

            247KB

            MD5

            38a1ce5bc6de4b348ed9969bfb029030

            SHA1

            2448558cae1a5ca112df36762bd7e0ce47d8bfde

            SHA256

            911890f10bdb4eb990e2f599ffe6390279627893fcbe1b366b7e309b4dc1cf42

            SHA512

            a0d2e21dc9bdc978876ef5c72a375ca9707e5319bfdadcb93dfe2714b230a241b4849e6b14613e03df9640929ed48f718d911c5c7f244337b253126891a547b9

          • C:\Program Files\ConnectRequest.exe

            Filesize

            299KB

            MD5

            0808e4c9106e2697bb762d55b7bc0299

            SHA1

            d1c0014c8442ddddf0de51a023bb376ecf963fa6

            SHA256

            3ab43df000007cb641a09d5961635f8d4671ac0c31b9dfba45ce3e23396ea799

            SHA512

            e5487d36849baafcb81216fbeb97ff3290939ed5475abbe93ae8958a445057d1a6993e45e7356ae285c7d02c766703f23fb23bfdda4c62f8869cb7bf7b61a892

          • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

            Filesize

            639KB

            MD5

            332c30390acb5bf4dd9ea7fc4b2f2e7b

            SHA1

            35b18aa86403ef77c45038b36a8c3b490e27068a

            SHA256

            280d4fa5c5f254cace3d0e17c848ad63f5a13cccc25ad81e6dd07e0cd3678407

            SHA512

            7f7611c396e406934e75b417bca334854f640860093577a03b4d2059e54af39c79d1e75458e5a9ed0e3e75160966b9a668131f55dd94946501d139198b84f791

          • C:\Users\Admin\AppData\Local\Temp\$$a8CBF.bat

            Filesize

            722B

            MD5

            0be12b7330b70f9574767035e097f44c

            SHA1

            f835d5f00e2ea843e043d1535686b66da5d4184b

            SHA256

            5e4ccf57bd0dddd79dac67bd58a7afd5afc32eeb310a5fdb52a04efc032c8df5

            SHA512

            dc643f96fd7dc31912ce7a183515eb5b8014783f29a87b1ab8de46d012d290235da4eb430f23c4bf7d5f08a3223b636c0a8a47c8fd4e04df8d525530f7641bc4

          • C:\Users\Admin\AppData\Local\Temp\b01021d07c1a21cc50ca0cf178c5d185794251e9b1bfb0698237984529c6fbfa.exe.exe

            Filesize

            544KB

            MD5

            9a1dd1d96481d61934dcc2d568971d06

            SHA1

            f136ef9bf8bd2fc753292fb5b7cf173a22675fb3

            SHA256

            8cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525

            SHA512

            7ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa

          • C:\Windows\Logo1_.exe

            Filesize

            29KB

            MD5

            f387ffee851cb89909f398efad649424

            SHA1

            0e4943052ac21048b38c0dbdcc747b9bef7266e1

            SHA256

            a8e4748a903fdd6f8044c73ee7f47199b3fa95271904f01dcb2db9ceb800e2ee

            SHA512

            79f901a1424456a640e46f2bdb4e67ecef200a667fe7f179849779fe65efad697d90ecd6eba479e4ccfed82d957d0e12c94acbe3c8b980f80a6ae6ca7e84b431

          • F:\$RECYCLE.BIN\S-1-5-21-2412658365-3084825385-3340777666-1000\_desktop.ini

            Filesize

            8B

            MD5

            646a1be8fae9210cfba53ee1aab14c96

            SHA1

            8677ff347131a9c8304f10b48012ebd8b075030c

            SHA256

            660d57a3dc71884e70a9cbd6ca26d02872f4706abeb098c6d35f6b217462edf5

            SHA512

            812b716a422628d486a4c78c66a85c641f13976537fbd452e14fab9a6c440b442632df04de8437c485c9c8164e3b3499201d3dbe681b36fe6bec749df1ab75e4

          • memory/2072-11-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2072-0-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4652-27-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4652-37-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4652-33-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4652-824-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4652-1235-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4652-20-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4652-4793-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4652-8-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4652-5238-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB