Analysis

  • max time kernel
    149s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 07:51

General

  • Target

    9683f1b075e9d5b4710ef563ba4453a0f58aab8adf9ed215b8fb53c3b45922a6.exe

  • Size

    389KB

  • MD5

    a186d26c400d713317cc74d2f9a5de55

  • SHA1

    cfdfa9c81c20c50c747896781091cd0f06bfa26d

  • SHA256

    9683f1b075e9d5b4710ef563ba4453a0f58aab8adf9ed215b8fb53c3b45922a6

  • SHA512

    c9b42b90490256aed4c9eba4c8c5b26ed9750c517f56e9372add4e3217fde8de87e2e515835cfbcfe3a19d3afebd930f57a76d9ce778167a027c53e4b46cd527

  • SSDEEP

    6144:wjuJ6P2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1moH2:w0ahVy41

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3552
      • C:\Users\Admin\AppData\Local\Temp\9683f1b075e9d5b4710ef563ba4453a0f58aab8adf9ed215b8fb53c3b45922a6.exe
        "C:\Users\Admin\AppData\Local\Temp\9683f1b075e9d5b4710ef563ba4453a0f58aab8adf9ed215b8fb53c3b45922a6.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4184
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a69A7.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2612
          • C:\Users\Admin\AppData\Local\Temp\9683f1b075e9d5b4710ef563ba4453a0f58aab8adf9ed215b8fb53c3b45922a6.exe
            "C:\Users\Admin\AppData\Local\Temp\9683f1b075e9d5b4710ef563ba4453a0f58aab8adf9ed215b8fb53c3b45922a6.exe"
            4⤵
            • Executes dropped EXE
            PID:1528
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4760
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:968
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3772

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      247KB

      MD5

      287a4b9db04bc2483835e8b2f7192c72

      SHA1

      9a204ea51eb87e5bc91ee8a1c2d178f90dfb4de8

      SHA256

      7873af059f981d359c687e615f397fb92e89611c95d3d8f7a7b56fe307c6a7c9

      SHA512

      e355ab74e57113c3baf6b836b3ee5ca8ef5632ec92b11e5c4573865dda2ddacacd3be7156ac348d8456f72e51cc0b3ad198c6c5e423356bd5a7564f5f10a08d3

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      573KB

      MD5

      f2afa955bd7f124f00488e1b563b9de0

      SHA1

      4195bb2fccd0fc84f53c041e9cab49461d773503

      SHA256

      1e2f034e2816ba040229f8ea69e561138b86e02e8d7f496e852d80aab7b778c5

      SHA512

      0621b4d44af0b3bab2455a5808ff59a44e0d994644e24474e12c3fad3bd294c4b29c6ba40d912da91fb04aa1974950524ca08a466a48f57749ed1f710574352a

    • C:\Users\Admin\AppData\Local\Temp\$$a69A7.bat

      Filesize

      722B

      MD5

      8dae9a25cc51abb39cac0dd1731320b8

      SHA1

      3a9a1a56d84e64fa9a2d890e60c5530819a672da

      SHA256

      b1156854e64021e7695edfdeefb08b7106c1df768b7dcc2ff6a47472b3c401f1

      SHA512

      f09ab9740ba3da1cf581e32b7ce06649dfac0b414887d05e69711bca27115260622a94895f51283afcfc71768d05c6f3d9d9703f1c06c2cad593c6d386c5e412

    • C:\Users\Admin\AppData\Local\Temp\9683f1b075e9d5b4710ef563ba4453a0f58aab8adf9ed215b8fb53c3b45922a6.exe.exe

      Filesize

      360KB

      MD5

      5fbd45261a2de3bb42f489e825a9a935

      SHA1

      ff388f6e9efe651ec62c4152c1739783e7899293

      SHA256

      9e63701598199d5c47217e23b44d0e3ec5d53f5419166b1b6c68a7e9e8fc47a4

      SHA512

      7f22b1995a07016adb342c551454d602bfbe511525139aee8581b62116608e9e278fd81c26382f1333c7eccded4474196e73c093bb5cbf8e8f203e865024c058

    • C:\Windows\rundl132.exe

      Filesize

      29KB

      MD5

      6ac428eef76d1945c3dc0031625da53b

      SHA1

      f2bd6e6e9fee3b344cf11b9c062f31dfe243a63f

      SHA256

      2c0a36a0fd028938bbeaf080613ae6118137d93bee054e208f4e328e5709ceb5

      SHA512

      4f13ca5c312d93d21938db31fc60560836db21fc9bc718ff15aa464cfe4e5cdea4ec14aeec3e06b161f41f9aef2e0458b320b828b25f2e27e54f44cb757fb9c5

    • F:\$RECYCLE.BIN\S-1-5-21-2392887640-1187051047-2909758433-1000\_desktop.ini

      Filesize

      9B

      MD5

      cd0bf5c2efb8cc7ddbff2ab5d2cb7e87

      SHA1

      6830a1817f2055b6beba9063b87af16bbef7fa19

      SHA256

      d00701a279110fcafdaa6a9dcb36385845f9d2aac5b1ac1c52c015c61718dcbd

      SHA512

      6fabfd6bced63153d3dd6b376a92e824c95b15ef046607b89376a17c7ac863e92c95770ed86d8ecec3639d280dd6256a7ab1ec2d8119799fb3a479fbce96254a

    • memory/4184-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4184-12-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4760-27-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4760-33-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4760-37-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4760-20-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4760-855-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4760-1234-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4760-13-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4760-4791-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4760-5236-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB