Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-09-2024 19:11

General

  • Target

    8cac402dd766f0d2ad3e43b33c1a28e6adefb82ba82a08bba4eab5fdce4d0065.exe

  • Size

    5.7MB

  • MD5

    4a68244d97e67cd1f860568881ef3d79

  • SHA1

    6fb54ef307e50f2bc3e0b7cd45cf6671c0c0fe19

  • SHA256

    8cac402dd766f0d2ad3e43b33c1a28e6adefb82ba82a08bba4eab5fdce4d0065

  • SHA512

    8a56738cde0b3adbc02b51283e1523cfb00450730befd72c911d85464a2933618fd83a19026ac3e0960371b218a0149a888525cb6813180d0a17d2187bd60fe8

  • SSDEEP

    49152:VPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTPBJ:RKUgTH2M2m9UMpu1QfLczqssnKSk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3448
      • C:\Users\Admin\AppData\Local\Temp\8cac402dd766f0d2ad3e43b33c1a28e6adefb82ba82a08bba4eab5fdce4d0065.exe
        "C:\Users\Admin\AppData\Local\Temp\8cac402dd766f0d2ad3e43b33c1a28e6adefb82ba82a08bba4eab5fdce4d0065.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4440
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aFA1F.bat
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4172
          • C:\Users\Admin\AppData\Local\Temp\8cac402dd766f0d2ad3e43b33c1a28e6adefb82ba82a08bba4eab5fdce4d0065.exe
            "C:\Users\Admin\AppData\Local\Temp\8cac402dd766f0d2ad3e43b33c1a28e6adefb82ba82a08bba4eab5fdce4d0065.exe"
            4⤵
            • Executes dropped EXE
            PID:2484
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1772
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2400
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2256

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      244KB

      MD5

      0d8e4b615212d76312cd6603038e6850

      SHA1

      b4a8ff5f7b960b7875b8f67865f2aff4b99a3fb0

      SHA256

      e590a7d96dc085099aa75433056502c390a7c0e286f2d235869439b14d5e324c

      SHA512

      78d8f3fcacae44ec1b8a51ac37fd932c4be832fe88b842eaff14ac1a5952394ce8b370a03453f5db1e6479ae7438682cd6e2e8b69e8e554ef3638a3c923932cf

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      571KB

      MD5

      0f33a50ab70e16ec93c7b25919a29437

      SHA1

      9e846997bc245034f3cb7be797a4ba0401fcc84b

      SHA256

      7a9a23e5419dd2307c1943ca1d388ca05ca96ca79306829b0a099f564efbcbeb

      SHA512

      952d9fde1ab86b5dd0336a38813067be429109460744245d5818b576cf803d6d547632e91fb9cceb7dd0a971b49a9ee7afdf105f7f97e6b7ac73fa375e2adec9

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      637KB

      MD5

      9cba1e86016b20490fff38fb45ff4963

      SHA1

      378720d36869d50d06e9ffeef87488fbc2a8c8f7

      SHA256

      a22e6d0f5c7d44fefc2204e0f7c7b048e1684f6cf249ba98c006bbf791c22d19

      SHA512

      2f3737d29ea3925d10ea5c717786425f6434be732974586328f03691a35cd1539828e3301685749e5c4135b8094f15b87fb9659915de63678a25749e2f8f5765

    • C:\Users\Admin\AppData\Local\Temp\$$aFA1F.bat

      Filesize

      722B

      MD5

      d4df753276549575465927ca4183b989

      SHA1

      1a0cb331e5b46f8861cc949222d8f057a5e1fff7

      SHA256

      c2b842741d1c3754714c91bb5634c8b8d589e9e5294cf9a9b67987c1b5de9dc4

      SHA512

      8a31fbc0ce272f8cce4a59a04b737a8a28d0820b8927d04f4f74a73e539c52ae70f46939fb1a861b63c136e76bc066f922a32041ab6351d42aac2f8a7c3f58a9

    • C:\Users\Admin\AppData\Local\Temp\8cac402dd766f0d2ad3e43b33c1a28e6adefb82ba82a08bba4eab5fdce4d0065.exe.exe

      Filesize

      5.7MB

      MD5

      ba18e99b3e17adb5b029eaebc457dd89

      SHA1

      ec0458f3c00d35b323f08d4e1cc2e72899429c38

      SHA256

      f5ee36de8edf9be2ac2752b219cfdcb7ca1677071b8e116cb876306e9f1b6628

      SHA512

      1f41929e6f5b555b60c411c7810cbf14e3af26100df5ac4533ec3739a278c1b925687284660efb4868e3741305098e2737836229efc9fe46c97a6057c10e677c

    • C:\Windows\Logo1_.exe

      Filesize

      27KB

      MD5

      28f7618d6ac7640752f28eff279db335

      SHA1

      371175b345ec827c8ba1536e56b6207fad8d0341

      SHA256

      0d22e6b659c65ab784a4b55ac616ed96ca73b6e53c5258a5b62f2e3056d496b5

      SHA512

      2d6f5ca76b7c5bac52b0eeebfc3b60d9d364a8b6112c2d149da6a55635056814aefe152ba6bed68d88756414d3185517aec1702aae5f8c8b5a97195a53231170

    • F:\$RECYCLE.BIN\S-1-5-21-2392887640-1187051047-2909758433-1000\_desktop.ini

      Filesize

      9B

      MD5

      e2a14c19421b289cbd51a76363b166bd

      SHA1

      5d0621d68da5a444f49c090b0725c7044d47fdb7

      SHA256

      844af243be560dc4e478aa7ea28f4959f9df45f204006bade7ae52398d651835

      SHA512

      8c49bec05605c4d2b8f07f00a7a39e70f5bd4f7c84ba221c615447f947053bf3bb0496c38e2bf8b15235c493cc5a0b41f34285fed1adb4c13572f25b67e178e5

    • memory/1772-27-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1772-33-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1772-37-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1772-20-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1772-476-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1772-1234-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1772-8-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1772-4791-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/1772-5236-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/4440-0-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/4440-11-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB