Analysis

  • max time kernel
    149s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 18:12

General

  • Target

    603e32027cda8f7f21bc3c1e4abebe3856bf363861301216044521f1e4b1e3a2.exe

  • Size

    768KB

  • MD5

    7d8e3dc2674f529f527f3f2e25e5cb52

  • SHA1

    6d521d712909dbeb00515d189feae32ffb8fd309

  • SHA256

    603e32027cda8f7f21bc3c1e4abebe3856bf363861301216044521f1e4b1e3a2

  • SHA512

    9d208a81519c20db18671a24de1d1fba8aec54a43941100c1aff7a784b6afe6d209949356ead0e35df08122f47e84a7f3b579af80c9e447da5f93901480d2486

  • SSDEEP

    24576:776spxV2558WVIFNcLEmdBkNaFwLFm+MWSz/L/i/f:77/JaOgDAaghMRL/iH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\603e32027cda8f7f21bc3c1e4abebe3856bf363861301216044521f1e4b1e3a2.exe
        "C:\Users\Admin\AppData\Local\Temp\603e32027cda8f7f21bc3c1e4abebe3856bf363861301216044521f1e4b1e3a2.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a80F7.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3692
          • C:\Users\Admin\AppData\Local\Temp\603e32027cda8f7f21bc3c1e4abebe3856bf363861301216044521f1e4b1e3a2.exe
            "C:\Users\Admin\AppData\Local\Temp\603e32027cda8f7f21bc3c1e4abebe3856bf363861301216044521f1e4b1e3a2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:1776
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3940
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3976
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3056

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

            Filesize

            244KB

            MD5

            f048e6aefe1361962ed31dcf10f0c253

            SHA1

            65e54123268cd3d73920c2aeeade390519af7505

            SHA256

            270bdd74449b75ac4a265921aa3994e8490bfe95f66bac19be344184674e86a5

            SHA512

            78502fb1394d852e7a34d35032e7dd3e3008240ad62d7e43d62cdb69e7ef22974f3feba4f96486d1af5f17cbf6c8c6203dde569b4aba0e37c9963dd43c4837b6

          • C:\Program Files\7-Zip\7z.exe

            Filesize

            570KB

            MD5

            69b270eb1b5bb5248153fd84041c54d8

            SHA1

            bd9ddaacedc0b861aefe868b14ec23667d070244

            SHA256

            9bcb2a37876f0a5bab916c4c7e06d528bc40b6b710187593cf1d0f971923c738

            SHA512

            73ff4ab38ee6925d60933dfdc35567eeeb4eabaaa414b8a462b52dea2f98b1cf0c4c39dc2a09ef4fb2b89e239a08d14367d34c71fc8ebf5af3db232d3615a489

          • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

            Filesize

            636KB

            MD5

            2500f702e2b9632127c14e4eaae5d424

            SHA1

            8726fef12958265214eeb58001c995629834b13a

            SHA256

            82e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c

            SHA512

            f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c

          • C:\Users\Admin\AppData\Local\Temp\$$a80F7.bat

            Filesize

            722B

            MD5

            e5597bd4cde91b56c9a5bc4a00327998

            SHA1

            9d104cabd1bf5fbc3f92548085ec4b1de7f9513b

            SHA256

            bf7e8b82ac01c7aceffe383062e629f0d05e2e87ad62f100b0e36402e95a6ec7

            SHA512

            627ac293ccfe67579e470bb074f0ca0dea20c8f421dce3dfde657e56ce5b0f2b12835fb96da25aabb644597000017d085606a8e6226ead1d50dcf6e9fb2facd1

          • C:\Users\Admin\AppData\Local\Temp\603e32027cda8f7f21bc3c1e4abebe3856bf363861301216044521f1e4b1e3a2.exe.exe

            Filesize

            742KB

            MD5

            feb8de22d9cb947160d2c9b1675e9da6

            SHA1

            103050e3a435fb9969fac0e268953ed8cc0feb29

            SHA256

            4bad4e875a39a7ec86e80e9dbe8e48422c80726ff238ccc58b27676e378ef8eb

            SHA512

            413abafd4e1cc9392f39e265e08956afa76a72e1c45a6d8dbad03ee589d2bcb08c107b8fe619f96f6bc7a8f199d3821fba5d29cab9b8e9c465f2f0edf9dc0e2e

          • C:\Windows\Logo1_.exe

            Filesize

            26KB

            MD5

            b16a721c27323a57a788fa4a64f82a51

            SHA1

            b24a4d80cda438a35755f02926a15770e727c782

            SHA256

            e109a10411f1ccd6317ac7b50eb37eab6c579bac07c970ecffc83f83ac34eba9

            SHA512

            44ba649592d3ed4425710cd215a7d3917c00c03ad6812f1ca87b50b3dc9ef99dc2fbd0c5558e4d59ce82c8bc65b1ab4ccb0e0cdc236d40f32e8153f7a0ac4bbc

          • C:\Windows\wc98pp.dll

            Filesize

            50KB

            MD5

            01ce67a8b8f546986309c28d4594d29c

            SHA1

            c375555e487481ba317af381d8f8524ab20defb0

            SHA256

            74bd7a4d90534a25f73b253c4cd21d8886b4c9d83c05a609f2bce91dfc3caf5c

            SHA512

            62654f5834909a8c20e29344ff2083fcdcdc9f2a29dc68cfe0f2374cd29fb8c5be2a50ea73632e66a408dea1f34e0f76f47c32400edbaa2fd066b2eded36f94a

          • F:\$RECYCLE.BIN\S-1-5-21-355097885-2402257403-2971294179-1000\_desktop.ini

            Filesize

            9B

            MD5

            e02899454c67c7d6d1af854fdcb53b67

            SHA1

            26fb213f7c299c2a4d8c4afd234ee0b751d7a30e

            SHA256

            0e67e90646d3ba7b46f935b205c9f89e8bff2dca7aeda3cd5dfb93868b262315

            SHA512

            e1519bebf62ab4cb28e630a201312812e04f815ec0663f7b68b478da97c0bf7c7c2238a8632540d3d1f37acbe83919fb198b39ebeb222c19faa2130ab65ffffa

          • memory/1776-31-0x0000000005070000-0x0000000005081000-memory.dmp

            Filesize

            68KB

          • memory/1776-19-0x0000000002230000-0x0000000002231000-memory.dmp

            Filesize

            4KB

          • memory/1776-30-0x0000000000400000-0x00000000004D3000-memory.dmp

            Filesize

            844KB

          • memory/1776-32-0x0000000002230000-0x0000000002231000-memory.dmp

            Filesize

            4KB

          • memory/1776-25-0x0000000005070000-0x0000000005081000-memory.dmp

            Filesize

            68KB

          • memory/3016-0-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3016-11-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3940-49-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3940-57-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3940-28-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3940-1091-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3940-1260-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3940-39-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3940-4822-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3940-8-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3940-5271-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB