Analysis

  • max time kernel
    150s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 09:17

General

  • Target

    320e838a46df9f5f7d77d984b671e508c9b21c2e13d1ec85fb685e786be1d0ac.exe

  • Size

    573KB

  • MD5

    d11cac0363080a9ff695dda0a92750de

  • SHA1

    ffb2e8e275168cc36e86e21c6295554bb7fc3b3d

  • SHA256

    320e838a46df9f5f7d77d984b671e508c9b21c2e13d1ec85fb685e786be1d0ac

  • SHA512

    4d441ac17fe8425d7eee4e9f214b6b57bc9d53f7756c4f5c0b344788979e50c41954a5165c12435c114309ab03c7030b1ce326216be89222a67849a56e5a19b3

  • SSDEEP

    6144:SM2uJXYE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHk:SMf7a3iwbihym2g7XO3LWUQfh4Co

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1184
      • C:\Users\Admin\AppData\Local\Temp\320e838a46df9f5f7d77d984b671e508c9b21c2e13d1ec85fb685e786be1d0ac.exe
        "C:\Users\Admin\AppData\Local\Temp\320e838a46df9f5f7d77d984b671e508c9b21c2e13d1ec85fb685e786be1d0ac.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3032
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aD115.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1568
          • C:\Users\Admin\AppData\Local\Temp\320e838a46df9f5f7d77d984b671e508c9b21c2e13d1ec85fb685e786be1d0ac.exe
            "C:\Users\Admin\AppData\Local\Temp\320e838a46df9f5f7d77d984b671e508c9b21c2e13d1ec85fb685e786be1d0ac.exe"
            4⤵
            • Executes dropped EXE
            PID:2764
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:868
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1728
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2676

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      254KB

      MD5

      3e3adb8e4b50277e3335ca4f141b1a1d

      SHA1

      3cd90c89ef2fb5a4ad405148c80c5728054afd15

      SHA256

      1097364e543d3e1289d03ce19251f1f81e309753b78ebf7dba7bffa24293af1d

      SHA512

      4d084f4870debf8dfb992080cd500245cb9b775036f6f8d530ac18d91988dc855faf681f802c14fac2af3d55592d7639e3003a8ee05d9a623101f5a1e6fab9b7

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      474KB

      MD5

      a129ff6e8fb70f53efa3d7ffa661a6c7

      SHA1

      08cb3f944ac454c45fa7c5dc7b4f3baa676aa427

      SHA256

      c807165aee414ab50b72e5497f2bfa612636dc7d2596c2e947c0a2985dadeab5

      SHA512

      93c3a31b918d586c845dbadd7e40ffb991445ec21e9bfe57c375d772d41e35d090ffd6d96718e21f7bae4a760a3895c4584d21f0c71919a031d287ea5f407f73

    • C:\Users\Admin\AppData\Local\Temp\$$aD115.bat

      Filesize

      722B

      MD5

      e9090d0e5afc8b30d12251b3e2451844

      SHA1

      40238ab7160d9529bbdf2642b98f6e86f59a53f1

      SHA256

      162f5b92efb606f40fcf95c44e36a8fc09a423f11afc0cc3380b1200693f3a65

      SHA512

      168258100487b65ff154192cc0e372139f98f17e2c741106585abfc7ab8da5cca39179b5c38eaa769c9ab7c4d7ea8323aad2a7f8d72755ca728adf5e96ed22ff

    • C:\Users\Admin\AppData\Local\Temp\320e838a46df9f5f7d77d984b671e508c9b21c2e13d1ec85fb685e786be1d0ac.exe.exe

      Filesize

      544KB

      MD5

      9a1dd1d96481d61934dcc2d568971d06

      SHA1

      f136ef9bf8bd2fc753292fb5b7cf173a22675fb3

      SHA256

      8cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525

      SHA512

      7ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa

    • C:\Windows\Logo1_.exe

      Filesize

      29KB

      MD5

      4fa81886de1e800c373f83420b798879

      SHA1

      c6170438839a40cae91a812654eec65390606075

      SHA256

      729027820403e4ad791f8862a49ee1a5d1d3eba33fc4e47894f12464baa53054

      SHA512

      81b907574a1a7699cfac7e131a4144b3aacc99f899f9a944c6c44034a6ae4d5288dacb5d164b3fd6ee3545077ec6aa7fbe5da9ff25d914cedeebbb8bbd55cd0b

    • F:\$RECYCLE.BIN\S-1-5-21-3434294380-2554721341-1919518612-1000\_desktop.ini

      Filesize

      9B

      MD5

      e92b0dcf7d27eb997606ca871d866c93

      SHA1

      69b76ef532ec922985b95329dbc5133f8d9fa994

      SHA256

      d0caa78610c77bb9fda1e6430ae7d9859d955dd9b19d26d12e409c8a39e24053

      SHA512

      8ea4006e99155f3821e05771cd80a7b2172078f77f2d1fe5daac4089809d94bad706d11a1af95ee3ea8d66959e65fe415dee8199ea7e1bf17d0b9f578cdb25ee

    • memory/868-253-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/868-1876-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/868-19-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/868-32-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/868-3336-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/868-40-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/868-46-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/868-92-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/868-99-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1184-30-0x0000000002D60000-0x0000000002D61000-memory.dmp

      Filesize

      4KB

    • memory/3032-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3032-15-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3032-18-0x0000000000220000-0x0000000000256000-memory.dmp

      Filesize

      216KB

    • memory/3032-17-0x0000000000220000-0x0000000000256000-memory.dmp

      Filesize

      216KB