Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 14:05

General

  • Target

    0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe

  • Size

    52KB

  • MD5

    f04b3c4850ffb3eadcfcdd49013daff2

  • SHA1

    26952c8a0eb5342197e6ef46394e7751ccf80b75

  • SHA256

    0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133

  • SHA512

    b077f23d68a23dc74fc63d5663ea758e930007f191bb7df44f15e8785950754af81f00c875f19544a5c5c923550b3cb132107d46a9397ad3cb44f6453991e142

  • SSDEEP

    768:pGJYg16GVRu1yK9fMnJG2V9dHS85qgt6jpYU5ltbDrYiI0oPxWExI:pGr3SHuJV9NP6jWWvr78Pxc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3520
      • C:\Users\Admin\AppData\Local\Temp\0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe
        "C:\Users\Admin\AppData\Local\Temp\0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1500
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a667A.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5004
          • C:\Users\Admin\AppData\Local\Temp\0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe
            "C:\Users\Admin\AppData\Local\Temp\0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe"
            4⤵
            • Executes dropped EXE
            PID:2648
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3144
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4100
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4596
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3824

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      247KB

      MD5

      5f0181971ad5b0ac47c6dc3c344bda3d

      SHA1

      c0b978c343cdcbcde0d9559dd340e93e3becf2ef

      SHA256

      2726302227e4f4ea4f961ea72a2213f78083e70583d9a08e578debfb1b8d2b81

      SHA512

      0f316b3725931f46471c022c57f0c61fe0373dabfb3da9d4080c9e233c184bfec5ed1b8c98eb81f1edea2fe6234e7429e888b267ea4217327c53ee73f8e2f5b7

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      573KB

      MD5

      ec2e945a357824f70f245c0b3d0580e5

      SHA1

      4ce100487f06095223db9209441443d478add3e1

      SHA256

      1c84e2a648c2feb2f2f12cfe888e95f6d4cbc7bfcfbe980b49429f6d8b86e37a

      SHA512

      f3713fc921b773b9d5db7087476fe73439b01a57b5c6c296868bb350c86082493ed97c9c8fa9ac949aa48d6b08f739f729dab92b8517e962fbc16e8ae2a68a38

    • C:\Users\Admin\AppData\Local\Temp\$$a667A.bat

      Filesize

      722B

      MD5

      cee51fa2d6590142cb9acc9aa43f426e

      SHA1

      5ad9ac5826b7591b9b1afb883c51361ac9d834cf

      SHA256

      45054708125ac44dde726b275af4e987e84ead172a3793f83acc4e7cae5604e2

      SHA512

      a572ad9012ec6ce78a7198adc1ed8f2fe473dad9d185c13161d477085a1facf6207114bd1b5c7ffffe8773306110657062b31a4ea0aa8374a174116d8685f582

    • C:\Users\Admin\AppData\Local\Temp\0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe.exe

      Filesize

      23KB

      MD5

      3f9dbfee668294872ef01b90740b01d0

      SHA1

      99a4702b65485cd14736b1c2cdfb81b455dda01c

      SHA256

      40b32fea1fcadcb2db369475e2bba58b0b83f5c3bb647e2e63877726c35a9f86

      SHA512

      0113cec160d97ea0cce70860cc5b79b502d16191ee237a3abb84309499be193aa0127dbcb41fc05a90fa61484b061ec4332ad29a918db598e32fe832b74bd1e3

    • C:\Windows\Logo1_.exe

      Filesize

      29KB

      MD5

      41d00e6ffc4c6a0cf2f90dee70d92c90

      SHA1

      e97fa0cdb1f4ed2a8eb568d11836bfa003561316

      SHA256

      eaacb8352a7177a0d406a57ac7c8f493e00a1b6648a7b74a5c3a8b5849561c40

      SHA512

      aa724b87673ffc878f06257b9a1a0c4f5fecbec61f8cc4eb833fc09cee3e5b3607c976beffb5fbb3a5a908005b821b83a780465a21d895cf29a15d19f2aa448b

    • F:\$RECYCLE.BIN\S-1-5-21-2718105630-359604950-2820636825-1000\_desktop.ini

      Filesize

      9B

      MD5

      cd0bf5c2efb8cc7ddbff2ab5d2cb7e87

      SHA1

      6830a1817f2055b6beba9063b87af16bbef7fa19

      SHA256

      d00701a279110fcafdaa6a9dcb36385845f9d2aac5b1ac1c52c015c61718dcbd

      SHA512

      6fabfd6bced63153d3dd6b376a92e824c95b15ef046607b89376a17c7ac863e92c95770ed86d8ecec3639d280dd6256a7ab1ec2d8119799fb3a479fbce96254a

    • memory/1500-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1500-11-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3144-27-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3144-33-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3144-37-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3144-20-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3144-530-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3144-1234-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3144-8-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3144-4792-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3144-5237-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB