Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 22:02

General

  • Target

    fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe

  • Size

    27KB

  • MD5

    3bef880e03d2b1c8f6fc24362d07b4be

  • SHA1

    ae621aeb03296a07404744121f4ef77da1223b1a

  • SHA256

    fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f

  • SHA512

    8ff63310d477391c053ab04472d80e87a8e5bf62fd3ceef41e5718f25b9304f92ceab89d2ad2054579a1b8778592520697532e12d56593a251007a45e3fd4655

  • SSDEEP

    384:MM/D1Gt5M0zhIV/DZ3KZp7JcTO4yf9KFL/KaUUqd3qR+FlYTj9QTN0wpD9p5Cs:PD16GVRu1yK9fMFLKaTxsujCT7pZpY

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe
        "C:\Users\Admin\AppData\Local\Temp\fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2084
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2124
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1408

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            252KB

            MD5

            b53f8691375fd738d997cf10e73d278e

            SHA1

            379b6a852009cdd1782a668145e56684b87a58b6

            SHA256

            9407f9e045c9708e3dfb420a843de0c80a112d734646e41f1bb3feeaf4bc9fae

            SHA512

            d054762b8093b3b8f35d41992024672ed4abc2e4880fc7566f7777c207c42c1dbb12c8dfeb808360c9f784f733bb5cfe34adba911cfe897b4c98f983bfe35123

          • C:\Program Files\7-Zip\7zFM.exe

            Filesize

            957KB

            MD5

            e0257bdbfd4764103ea668a7e876cb5f

            SHA1

            470577c417b1021b7c5634830b34a34091340e73

            SHA256

            d0027317a8d528ab8486bee7417763dbeb6c0be018a44201e5250d620b0c8fde

            SHA512

            b2d86982e56316bef9dbf54cf0fbe44f7d84de33a5bdf548379e2d950152c3e91cae486b1452f921558cbd9e52b631bcf76431bcfa8dec1e8228f95529fe6004

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            472KB

            MD5

            88eb1bca8c399bc3f46e99cdde2f047e

            SHA1

            55fafbceb011e1af2edced978686a90971bd95f2

            SHA256

            42fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428

            SHA512

            149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728

          • F:\$RECYCLE.BIN\S-1-5-21-457978338-2990298471-2379561640-1000\_desktop.ini

            Filesize

            9B

            MD5

            475984718232cf008bb73666d834f1f4

            SHA1

            12f23c9301c222f599a279e02a811d274d0f4abc

            SHA256

            a5b32591119f87eb3c8a00c0c39e26ea6d6414aa9887d85fcb4903e1c14921b5

            SHA512

            80235dc2560b7991d79f9550cdeca6ac02c00cee6bf186f8f20d4ff3fbd7718be937b73ab768d71c4027e153557b08bbfd95ea88d2e0857a7c70cf1da6fa9937

          • memory/1280-5-0x0000000002AA0000-0x0000000002AA1000-memory.dmp

            Filesize

            4KB

          • memory/2084-66-0x0000000000400000-0x0000000000435000-memory.dmp

            Filesize

            212KB

          • memory/2084-0-0x0000000000400000-0x0000000000435000-memory.dmp

            Filesize

            212KB

          • memory/2084-73-0x0000000000400000-0x0000000000435000-memory.dmp

            Filesize

            212KB

          • memory/2084-20-0x0000000000400000-0x0000000000435000-memory.dmp

            Filesize

            212KB

          • memory/2084-86-0x0000000000400000-0x0000000000435000-memory.dmp

            Filesize

            212KB

          • memory/2084-1849-0x0000000000400000-0x0000000000435000-memory.dmp

            Filesize

            212KB

          • memory/2084-14-0x0000000000400000-0x0000000000435000-memory.dmp

            Filesize

            212KB

          • memory/2084-3309-0x0000000000400000-0x0000000000435000-memory.dmp

            Filesize

            212KB

          • memory/2084-7-0x0000000000400000-0x0000000000435000-memory.dmp

            Filesize

            212KB