Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-09-2024 17:58

General

  • Target

    296a303021ac8d1191c277422b0cc72886c1db7e7a4f35dab1dee27dcefd4c00.exe

  • Size

    2.6MB

  • MD5

    16333439ebfaf3672d34e3fce0be2781

  • SHA1

    83b6dbc518e674269001074aedd9211ec2d1140b

  • SHA256

    296a303021ac8d1191c277422b0cc72886c1db7e7a4f35dab1dee27dcefd4c00

  • SHA512

    95bb0d99425ef59453f8ca4b697492d4c385fce88ec15565f4ff7fa3f0c162fd02d9f284b09a54b5d68e73b6df08d7ec9632ed750e16b6573e55caff24e2b8ca

  • SSDEEP

    49152:+7+GPAnO2nABGt4IdjWx8Uh3ToaG4VbUVfQ25iBxpN4f6cP:imnCqt6oabOV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3448
      • C:\Users\Admin\AppData\Local\Temp\296a303021ac8d1191c277422b0cc72886c1db7e7a4f35dab1dee27dcefd4c00.exe
        "C:\Users\Admin\AppData\Local\Temp\296a303021ac8d1191c277422b0cc72886c1db7e7a4f35dab1dee27dcefd4c00.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a86B4.bat
          3⤵
          • System Location Discovery: System Language Discovery
          PID:116
          • C:\Users\Admin\AppData\Local\Temp\296a303021ac8d1191c277422b0cc72886c1db7e7a4f35dab1dee27dcefd4c00.exe
            "C:\Users\Admin\AppData\Local\Temp\296a303021ac8d1191c277422b0cc72886c1db7e7a4f35dab1dee27dcefd4c00.exe"
            4⤵
            • Executes dropped EXE
            PID:2532
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:5088
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4128
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      244KB

      MD5

      d240ade91552b6c4fcdd569166888832

      SHA1

      bcdc9e060643bc75146747a9f6dd4458c0cdd041

      SHA256

      6e7d226ed3c97eb01343ad57bea58037fcbf62b8e410c85cedb594dd688dd15e

      SHA512

      407fde75174a5e5bbffa9938108f6bce2e19d11e70b272ce5cfec20eef85326357fb3a39513236d2ddac4dcc86665108b1bd0cbb7c673c497db9e65cd0af0886

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      570KB

      MD5

      662ac2ff73a0428213e4fb19ccd5fec3

      SHA1

      bec0ee8e1d7bd1496959d9ef9f043eac07611379

      SHA256

      47f518a26a7052c0d89c3e33c9480ad79557c0aec94b65d6ae6d346234118966

      SHA512

      7b9086833001c5aac552606736d85fc60697c37a13ad606479b1c4de9c12082799de6285c1a6f994dc9b79fc57416c5dddc858d0c54aed4e44bde9c02e825ef1

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      636KB

      MD5

      53ee62011469b286a2a1b5658c86b9bf

      SHA1

      9bdac0b23b0a965947c780c6a6b48fc7122f9ade

      SHA256

      7125735e4e8595f1c17ff3235bc65dacabc2ec874b29ac7ba8eddd80ad10b3c0

      SHA512

      c9c24e578da0a38048e71548fac66465bcb624e971f745bba559e8c49fd621752e718d4c983a90a97277407bb23348ca109436e1eeebef030c3b599c712ff236

    • C:\Users\Admin\AppData\Local\Temp\$$a86B4.bat

      Filesize

      722B

      MD5

      4350ab03d29645c3f611a553e596ec53

      SHA1

      7308b6339eca2c319d126e27072c97fab020e3c4

      SHA256

      dc80498560ee9ace99fada5d6be80be446e250b7711d64e65951737c8ac784f8

      SHA512

      9c2a0b779a7b99ab6ce35e02e88227bd4e9f1aa56a7486ee579d07daa2e28ef4b104816463d086b5c122553d7271f4a70529e5b2fcee68b8c36f210621c43647

    • C:\Users\Admin\AppData\Local\Temp\296a303021ac8d1191c277422b0cc72886c1db7e7a4f35dab1dee27dcefd4c00.exe.exe

      Filesize

      2.6MB

      MD5

      bb7c48cddde076e7eb44022520f40f77

      SHA1

      fa931347e36814acd9805a8c173f8f095b5872bb

      SHA256

      adbe0d3f8b972dbfd0df14f42155446f1814fc745cda0ffc618bf1015c83bff7

      SHA512

      cb1ec269592caff8a783624dd6fc147f80added921a88499a5a5074a273b9dc06f0fc7f84d08479a5d3ef7e61decadaae7993ed9ec7e7af89c3ddbd75ab63a7d

    • C:\Windows\Logo1_.exe

      Filesize

      26KB

      MD5

      d375bd04f866e1b3276ba3b9779966ad

      SHA1

      1da9855e29a5384522563e0c4bdac786712d8b12

      SHA256

      a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be

      SHA512

      78aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10

    • F:\$RECYCLE.BIN\S-1-5-21-2392887640-1187051047-2909758433-1000\_desktop.ini

      Filesize

      9B

      MD5

      f74f4ac317419affe59fa4d389dd7e7c

      SHA1

      010f494382d5a64298702fe3732c9b96f438c653

      SHA256

      74fafb0f14fb17a8a4963d5f46fc50b3517e7aa13414ac5f42edfdf212a9bb01

      SHA512

      f82fea1632b97d2b6771f43a6941c84d7fbb86f4c4f69e9b4335aa0e166e2670f09d451da61b13cb16994b9294e99b1cfa27f2447579645b3886b7bd014cc00f

    • memory/2584-9-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2584-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5088-27-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5088-37-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5088-33-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5088-621-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5088-1234-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5088-20-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5088-4791-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5088-8-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5088-5236-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB