Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 20:21

General

  • Target

    d12d7a537b20072f4eb35aa6cd74cc193e472fd4001e19d6a41106d091633f88.exe

  • Size

    276KB

  • MD5

    8e99a71124e6030881803a3f5d759107

  • SHA1

    90e3cf7c0492f9c1f3f18ab2330b62f5b318d589

  • SHA256

    d12d7a537b20072f4eb35aa6cd74cc193e472fd4001e19d6a41106d091633f88

  • SHA512

    c1a5feac670e4b26318eb98c0d4588ffec1ff67bf30cafe1741e4cd00f0f6492cc1fead557bd2c25c825923e76a59ca03453bc6a779be6129409b4cd4fc75ba4

  • SSDEEP

    6144:0VfjmNewhSzYK3I2wSEN2NmuZpf50UUtTdRZj/wao8SzOucx3:27+eT4ihZpf5mV/ecx3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3468
      • C:\Users\Admin\AppData\Local\Temp\d12d7a537b20072f4eb35aa6cd74cc193e472fd4001e19d6a41106d091633f88.exe
        "C:\Users\Admin\AppData\Local\Temp\d12d7a537b20072f4eb35aa6cd74cc193e472fd4001e19d6a41106d091633f88.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:840
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7BC7.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2280
          • C:\Users\Admin\AppData\Local\Temp\d12d7a537b20072f4eb35aa6cd74cc193e472fd4001e19d6a41106d091633f88.exe
            "C:\Users\Admin\AppData\Local\Temp\d12d7a537b20072f4eb35aa6cd74cc193e472fd4001e19d6a41106d091633f88.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:896
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3672
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4016
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      244KB

      MD5

      5aa4338434853c59bcde9d90cc7cf799

      SHA1

      2c181af79469166b7d9c1b4434fcaf0774de92e2

      SHA256

      dc87dd3d518bea8e2a0a9436ec184ae4de99e9d924eeac4b70ce1d6684fb61bc

      SHA512

      c39a896b1c32e9b1fa94711fe8fb16bd7660920139f5f053a579bfbda14be888fc75d111d11f878852169bf6054951882d5f090e19105dab796e8b0484115bcc

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      570KB

      MD5

      0a65037a70b947632f86b1405b0b81f2

      SHA1

      68714eac7d4baf1521a7e16599f34bc22a73cd67

      SHA256

      1889dfdb23441c347bb5d2e15e5ead7e5cb970937e871ae705174fad41098311

      SHA512

      1a4927435efe085b461a2eb02b097d5c500220948e3b6d07a8a83971b4371fb6d205f5d8f5fa791c274ca39aeeffadb98ac0929b2d425c05d02d10af02782a8c

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      636KB

      MD5

      2500f702e2b9632127c14e4eaae5d424

      SHA1

      8726fef12958265214eeb58001c995629834b13a

      SHA256

      82e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c

      SHA512

      f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c

    • C:\Users\Admin\AppData\Local\Temp\$$a7BC7.bat

      Filesize

      722B

      MD5

      68036fad3dc4fe129daa4ecc8e87c282

      SHA1

      f898c0b1ef6200463b0d33e878d022ba0f72c0e6

      SHA256

      be4846cfc76c19e81c16237e9694cb70e98bfbe2d92b6db05540f5780e9e64df

      SHA512

      05949ac1d0d37551e9dfbeff8cf328bd72e2c4573544dd2e43f6caca23c6933add90342b457728506c02b38f143fad838eff55029338f0abe7a1a9ad7dc4e45c

    • C:\Users\Admin\AppData\Local\Temp\d12d7a537b20072f4eb35aa6cd74cc193e472fd4001e19d6a41106d091633f88.exe.exe

      Filesize

      250KB

      MD5

      cfdef927b84a2f4f15d3d8390382a66b

      SHA1

      e949eda1a7ebb220a80cf03f91217fd721b056bc

      SHA256

      7f772900923fd4b987acdbceb6780a0022a371e2bbedd910776097f16dd271ea

      SHA512

      ff9858ed119510ab3ee0ce89d925e46dbb6a5187d851d18a85a5c24e4f384e40416f8d103b28482cf8c762136f6687f839d32ffe50193df608db44a301bffb2e

    • C:\Windows\Logo1_.exe

      Filesize

      26KB

      MD5

      eef1439386c015a2051ca663969bc0fe

      SHA1

      7556ca851b74d7b07b69f2280d46a93541a2afec

      SHA256

      d5b33c767d3bd46605b4e1d6f4ba80a098b0cfba7f1dc70a6142b81ef79f9cba

      SHA512

      f1d1f6d0bbbe1e503c63c471b18e260b95433c29c8edf0090a4c35bb8567514f1796275f32446f7a9041cebef75ee69457b0a90e4163ce978175ecaa401440ac

    • F:\$RECYCLE.BIN\S-1-5-21-2392887640-1187051047-2909758433-1000\_desktop.ini

      Filesize

      9B

      MD5

      f74f4ac317419affe59fa4d389dd7e7c

      SHA1

      010f494382d5a64298702fe3732c9b96f438c653

      SHA256

      74fafb0f14fb17a8a4963d5f46fc50b3517e7aa13414ac5f42edfdf212a9bb01

      SHA512

      f82fea1632b97d2b6771f43a6941c84d7fbb86f4c4f69e9b4335aa0e166e2670f09d451da61b13cb16994b9294e99b1cfa27f2447579645b3886b7bd014cc00f

    • memory/840-10-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/840-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3672-27-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3672-37-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3672-33-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3672-441-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3672-1234-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3672-20-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3672-4791-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3672-9-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3672-5236-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB