Analysis

  • max time kernel
    31s
  • max time network
    39s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 00:30

Errors

Reason
Machine shutdown

General

  • Target

    61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe

  • Size

    93KB

  • MD5

    da2c3124b37b03be53cf43a96b160660

  • SHA1

    1bd706e5010e53d585daaa3c23eb6bcbeb160dfb

  • SHA256

    61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758

  • SHA512

    ccf2c231d60948f70bddf222aebe02f0bb53c7a0eb515594fff24f124bde0daacc190ad26b970a8a4b4365e2a39732d27e37c45cd299a2e0ffdcbfa107751cb6

  • SSDEEP

    1536:2HvaYzMXqtGNttyeiZnZLYm1byapmebn4ddJZeY86iLflLJYEIs67rxo:2HvaY46tGNttyeQLYm1WLK4ddJMY86iL

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3448
      • C:\Users\Admin\AppData\Local\Temp\61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe
        "C:\Users\Admin\AppData\Local\Temp\61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1824
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4340
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:5100
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a80C9.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4916
          • C:\Users\Admin\AppData\Local\Temp\61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe
            "C:\Users\Admin\AppData\Local\Temp\61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe"
            4⤵
            • Executes dropped EXE
            PID:2140
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4728
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4616
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2360
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4416
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:652

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$$a80C9.bat

            Filesize

            722B

            MD5

            b1f63d61f2190aa72e9e0322e4305965

            SHA1

            75e4825775a44a3dab84eff578b832f4fa016c76

            SHA256

            07e7bbd817f89ce1544d483f891e1527d5fa294fab747d3a9dbb94a713769446

            SHA512

            1305924ca2b1b5c28d5965d249620504eb6452ad3989e9a6278644ad43b60cb8076a580a577030ee58f95f749208d142c307a3e21eaff63528a443ce77ab2201

          • C:\Users\Admin\AppData\Local\Temp\61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe.exe

            Filesize

            59KB

            MD5

            dfc18f7068913dde25742b856788d7ca

            SHA1

            cbaa23f782c2ddcd7c9ff024fd0b096952a2b387

            SHA256

            ff4ac75c02247000da084de006c214d3dd3583867bd3533ba788e22734c7a2bf

            SHA512

            d0c7ec1dae41a803325b51c12490c355ed779d297daa35247889950491e52427810132f0829fc7ffa3022f1a106f4e4ba78ed612223395313a6f267e9ab24945

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            bee6df131a9c9bccab2c2e85139f6842

            SHA1

            d7d095b827384b3b5f4e0cf9b8afb543998f1796

            SHA256

            1a8911fd47aa3e98991935402374717b26afeed5d8eb431edcd4625f1a16f962

            SHA512

            2457aa406a3010ce789237d55fa17fc0f5694c847699af8044f21ea935179ffc69056c0c2ba4ba3eee3158c51afb2d11d2c372eca3e1ca77c44545cb74cd4812

          • C:\Windows\system32\drivers\etc\hosts

            Filesize

            842B

            MD5

            6f4adf207ef402d9ef40c6aa52ffd245

            SHA1

            4b05b495619c643f02e278dede8f5b1392555a57

            SHA256

            d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e

            SHA512

            a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

          • memory/1824-0-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1824-12-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4728-9-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4728-20-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB