Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 15:01

General

  • Target

    0e1d7b1bc93df70ebd41fb4b5a2ae0e85f519568786e352f1404a425b2ee3799.exe

  • Size

    26KB

  • MD5

    e207b9fe562e784a003de76c8985e4b0

  • SHA1

    a913efadc46fbea856276be5133f6e5f070cc582

  • SHA256

    0e1d7b1bc93df70ebd41fb4b5a2ae0e85f519568786e352f1404a425b2ee3799

  • SHA512

    8026fd862af1fdbb2486d05be17a2cd71bb54d6c6dc019ad8936aefbb1c601019486ad1e3b3b3b48820aa52da0fc06190f1a58c2292f4e898bc138a932538d32

  • SSDEEP

    768:t1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLvC:rfgLdQAQfcfymN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1108
      • C:\Users\Admin\AppData\Local\Temp\0e1d7b1bc93df70ebd41fb4b5a2ae0e85f519568786e352f1404a425b2ee3799.exe
        "C:\Users\Admin\AppData\Local\Temp\0e1d7b1bc93df70ebd41fb4b5a2ae0e85f519568786e352f1404a425b2ee3799.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1964
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2696
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1908

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      251KB

      MD5

      020dd361aee3b7ecae67da12b15ae361

      SHA1

      e3aa218a75213a2e7102add43d608636bfb7b7db

      SHA256

      186997192aa315c769688c76f07124978d7f5ecbbb5a5e04c10d7a5925c502e5

      SHA512

      06725449fdfd2b592749e9d6b97583881d7e285edca4f86fd54879577585cfa784cd7a9c32e7b681d8e2a37943a0bda844dafa24cb29a240d0cbcb2247af1da6

    • C:\Program Files\7-Zip\7zFM.exe

      Filesize

      956KB

      MD5

      2f75721dd9bd9a7d43e28e21f6cf40af

      SHA1

      0d053ab5af7f8158f1b97395e5841254d421107d

      SHA256

      01b62b7a53b9d8089a23482e5c3dc8a6501813e85fb9ffd248a55e9aaea99781

      SHA512

      beca81525eb7972b9f34a9147c1d942e130857bd0438124473256dd639500e43f3bb124693e948fc4e7a2327e3cc7d57a0efab45077943a41ff7e84b40bd0510

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      471KB

      MD5

      28f6479e5c0b7a32e8ae773b9221a22a

      SHA1

      882e24734f4d42c4e0b95bb695c921ee66ae2042

      SHA256

      5ec41e0b29c00dd288859df2f583b0e771c11c01d8fd519fe2bd8921b3bed4f3

      SHA512

      d27c5c01bfe526652af0083bc17c4a3212fc00d594344b6a1a39999248623fba1ae14c79ec849c3567d1bf952cdf7e1e4fd5b22fde938227d89338529fb43685

    • F:\$RECYCLE.BIN\S-1-5-21-2872745919-2748461613-2989606286-1000\_desktop.ini

      Filesize

      9B

      MD5

      5412111268dd2c1fb1cf8697bfab9b6c

      SHA1

      16d0b289e83c74cb50a004edd7c5750ac706f321

      SHA256

      f3aa35be7048ddbf11fc581e5f9476745d75bcf097e121ba2915614e360a0cdc

      SHA512

      13fc5bf11faaf5471fde8a1bafdcc6d27521bad796e5e532c94d9c8232dd70088e70b6d5ac60c4c15d13e59926ac38e9a9e01b4dd4694a77d70bdd1ae7005ccf

    • memory/1108-5-0x0000000002CF0000-0x0000000002CF1000-memory.dmp

      Filesize

      4KB

    • memory/1964-66-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1964-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1964-73-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1964-20-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1964-383-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1964-1849-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1964-14-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1964-3309-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1964-7-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB