Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:09

General

  • Target

    20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe

  • Size

    26KB

  • MD5

    70d4176c1c7ea7039b3b5446bb28e756

  • SHA1

    58bf39974eae416d4fbe6da9ecd647d01a64dc5f

  • SHA256

    20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db

  • SHA512

    721e3a09fe766ae437ec58db26798a3521c7ee6c6d564c680c2e343858ed5c063000bc259e64b8bc34313c0ce3f31b480b0165d097a3790d8f284e17891b421d

  • SSDEEP

    768:utb1ODKAaDMG8H92RwZNQSwcfymNBg+g61Go0ssQ:AfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1180
      • C:\Users\Admin\AppData\Local\Temp\20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe
        "C:\Users\Admin\AppData\Local\Temp\20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1320
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      251KB

      MD5

      8b898d581e907caf3660a40839fa5a1d

      SHA1

      38419b4d9d9245c11d990de6af70afd07199984d

      SHA256

      5804ee850f13a18d40823e26cdc395a31478de2b25a75e773bc6784a2d7b3f4c

      SHA512

      1efb8fc9b774d269bb972f58b39338c4b85ea95f7610752c9f286540722be617e081511d7e5f356de9ee4ec25c807290dd250855221a181986aa739da23f38f5

    • C:\Program Files\7-Zip\7zFM.exe

      Filesize

      956KB

      MD5

      e8493156a3b7d765969f114809c4828b

      SHA1

      0888da3b9d171fe48f53461da2e9d27ff0c13387

      SHA256

      be29ef3bec341bcfc94faf7e0ae5889bd5766bee62997a28b3a269d1a9a7eaf7

      SHA512

      77cb82894428ffcc18879d2b6b5ae96f6c86a1965425b8b72a48adf32c8d1fb1d3afeb77cb329b344b8767caa62787b9759f10faa30112708eee1d25ef4c9946

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      471KB

      MD5

      fce01a67577fb7ed0e3e01dad325c7ea

      SHA1

      e120f2e97491465d6cd86700fb30830214d9f8ab

      SHA256

      e23cc73613a5c5ce0937c9c9b219ba3f777b7e27a385e12280b570ade7144842

      SHA512

      823ad15be7d6f243b35016746481e1e53714e625cc621eeb3a82163fa2402e2ea4be2c076d0f0ca178cf99537e879b8b8142a939b299b14ad4efc49db23156d8

    • F:\$RECYCLE.BIN\S-1-5-21-2872745919-2748461613-2989606286-1000\_desktop.ini

      Filesize

      9B

      MD5

      82fa69b12ac2df558c85e86426eb13eb

      SHA1

      ad90b8756e3bebe04450f6950419c761844d7b7e

      SHA256

      f7622a3740b818722e46a36b5aeb1c0ba6bec25bec811e3dcfe0b5ba1d728775

      SHA512

      3c4da39d3b0d68ade3ff8ded69bf1e78a1ef88f7ed70c85572ae06e6be78155ffc2f557f577208e579191be2d8be2a1fa833b9ca74a35bb69cf9c32c23f4d99f

    • memory/1180-5-0x0000000002ED0000-0x0000000002ED1000-memory.dmp

      Filesize

      4KB

    • memory/2508-66-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2508-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2508-73-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2508-20-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2508-345-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2508-1849-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2508-14-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2508-3309-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2508-7-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB