Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 19:28

General

  • Target

    33364869f4ab87354624d3ea482e71397d79727753a7dc83fa8416f5daba6056.exe

  • Size

    160KB

  • MD5

    0ec51b9dd23acc5d4de0cbff6e7725b2

  • SHA1

    5a7e4a6dff4875097306b1b097c07c81f64c7654

  • SHA256

    33364869f4ab87354624d3ea482e71397d79727753a7dc83fa8416f5daba6056

  • SHA512

    1d3c2e883bae8057da9d018add7fb514f7f1579bda760eb833de5ecbe02cb9bd4ba73cd9df81c035f8cd99b1ee00e7c88ca697f8cddcd090604311d39d3906e8

  • SSDEEP

    3072:pTgkuJVLi99djmMGWBgh1002J8emEu3T7TO+9Z9sTOVrZzxVxU:LuJKYWBW1Wu3rOOuOVr8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3420
      • C:\Users\Admin\AppData\Local\Temp\33364869f4ab87354624d3ea482e71397d79727753a7dc83fa8416f5daba6056.exe
        "C:\Users\Admin\AppData\Local\Temp\33364869f4ab87354624d3ea482e71397d79727753a7dc83fa8416f5daba6056.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4332
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBA47.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2844
          • C:\Users\Admin\AppData\Local\Temp\33364869f4ab87354624d3ea482e71397d79727753a7dc83fa8416f5daba6056.exe
            "C:\Users\Admin\AppData\Local\Temp\33364869f4ab87354624d3ea482e71397d79727753a7dc83fa8416f5daba6056.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4772
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3840
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4516
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4200

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      247KB

      MD5

      39f77f4bf41f3d1062fa8fe88ae0ac96

      SHA1

      28c26ed527b667140444e78da9aa28ac701c4655

      SHA256

      83ee7a1787cd3d526fce9c190f60de08f690b87a311640a3edd96f0c20d4f52a

      SHA512

      bd75b82865d35661deda19c09ae68b62aa738095088ca01fb38ac2dfe87ef36f5d88e4155b50ff9ff7105c0f608a46d7fe4fc058e945f2fed28ca0f07cb98220

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      573KB

      MD5

      7a309f6b6f27b64fd4a2e54329f7d5d3

      SHA1

      373365dfaab881b5a69cc1b146ccf374d0b8691b

      SHA256

      2358f0d6cbeda72d2511ad79449f3840dd09fca5ced6a40b6dbbfcb5058b10be

      SHA512

      44df9b6c082c8d1a1ffee59f38769cd7acf8b75f8640957a5c10127ba4fba625b79722eb6ecc4296618cdc921dcd882e4af6019f71595596c03e163fbbf9a0e8

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      639KB

      MD5

      c8d281da4c32df16eef470c27c8cb459

      SHA1

      00efc9f6844bfaa37c264b6452c6a7356638ab10

      SHA256

      058c81e5a07f2c6c33cf28dff71d07ad8f179046108d945159957e891bfd9c62

      SHA512

      e3c79e19f620068f668d4ebaa5097f1a95a30dabb8dce75f3787171dddbea9f684fc7ce8d1011a398f38084d7af96dd1ff9a02d25906aab9b13861b8363d24bb

    • C:\Users\Admin\AppData\Local\Temp\$$aBA47.bat

      Filesize

      722B

      MD5

      79abf2d59d4470e2eaf07a486fdfbe91

      SHA1

      c75646e84f39ba050e8e45e3fe8e5dd28749e389

      SHA256

      dc95de88abac58a24e5166147180142f56a3f8bc126c96bd99425c3d53eb7e84

      SHA512

      0d2689014a12e756a6a75d95e1484cf63a130d50b2c71f990008c4d6a143d8a7ceb3da991e189e03280bd0f4a0c833a1930392966e2f43bff5b8ec1ece4ebfb5

    • C:\Users\Admin\AppData\Local\Temp\33364869f4ab87354624d3ea482e71397d79727753a7dc83fa8416f5daba6056.exe.exe

      Filesize

      131KB

      MD5

      16438a96a8adb85472ca72da04701b29

      SHA1

      b1f5ee8bc083804de4de820255107f6541c84735

      SHA256

      9291cd97d2f1b119438f16e97ea75119f19fd959ec5414e84b337530d692e289

      SHA512

      58f659a29cb34245a261b7666b1cda4b76f2df1039f3713dda6ff5a97c33b4cc273b110d10b4131a6a5c13897efcfa9a5ef3031e0e5fb14db1adc0ac1ef25dcd

    • C:\Windows\Logo1_.exe

      Filesize

      29KB

      MD5

      266614ad6b767347ec5a54a3d233d117

      SHA1

      df820e937b640d5c87ed87cae5b472ced3ae380d

      SHA256

      4fce448ab6e2fe63c7fb3ace3da1099037eb8d73ffb6484f90660778ee13b086

      SHA512

      d7d506be66ee98edaa6a1e82fdffafab7d7654ce45f214d8ce1eb4bafcd67df46fd5fa4533632e6ea8b1be1406cc42d2584909eea454c07a22726a19257c7bed

    • F:\$RECYCLE.BIN\S-1-5-21-523280732-2327480845-3730041215-1000\_desktop.ini

      Filesize

      9B

      MD5

      82fa69b12ac2df558c85e86426eb13eb

      SHA1

      ad90b8756e3bebe04450f6950419c761844d7b7e

      SHA256

      f7622a3740b818722e46a36b5aeb1c0ba6bec25bec811e3dcfe0b5ba1d728775

      SHA512

      3c4da39d3b0d68ade3ff8ded69bf1e78a1ef88f7ed70c85572ae06e6be78155ffc2f557f577208e579191be2d8be2a1fa833b9ca74a35bb69cf9c32c23f4d99f

    • memory/3840-27-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3840-33-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3840-37-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3840-20-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3840-488-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3840-1234-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3840-4785-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3840-11-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3840-5230-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4332-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4332-10-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB