Analysis

  • max time kernel
    150s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 07:20

General

  • Target

    0cdc112290f0f4d9c44254c64ebf1d74abc2fdb7a8c79bf2923ced5eabc08681.exe

  • Size

    29KB

  • MD5

    730b6af32a222642a710fc2413b785ef

  • SHA1

    360a9cc42c446bd1011bc9262da39f3a4332681a

  • SHA256

    0cdc112290f0f4d9c44254c64ebf1d74abc2fdb7a8c79bf2923ced5eabc08681

  • SHA512

    3c059ed2e9ed0bee3513ec24bbf2b4f0f1099f9f2c4c2d44e14d02bd8062ec5f1aac49642b8a4c662bb1c697e562c6fde844935fb5501f7db24340bb0c2fa81c

  • SSDEEP

    384:Nbbco1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:pQo16GVRu1yK9fMnJG2V9dHS8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1364
      • C:\Users\Admin\AppData\Local\Temp\0cdc112290f0f4d9c44254c64ebf1d74abc2fdb7a8c79bf2923ced5eabc08681.exe
        "C:\Users\Admin\AppData\Local\Temp\0cdc112290f0f4d9c44254c64ebf1d74abc2fdb7a8c79bf2923ced5eabc08681.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:288
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2280
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      254KB

      MD5

      202549f4e2260f7a6f2663d25c5e29bf

      SHA1

      b77322a55629631fa7f903438b59fa573c107d2e

      SHA256

      6f12aa3b5d9a9fad447eeadcdae602df33146d86ee3c2bd5c6a1b1671d9e3dec

      SHA512

      00747844a004d8b8fde1cca2dc58df266dd582da33c3ec4bb2b108ce0709b319878e863cbc3fd9fdc442a996809c57b3b45f31952dce02424c0c46c44f47e101

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      573KB

      MD5

      a1783bfe3e9a32eb97163d475729ea64

      SHA1

      a9df7602fdf0dc3ebc49e7a36c402e6c385d47f5

      SHA256

      c07cd0f95cdae61d667a69451ff93aada8480023b579f81dfe0e0ab154e1b7c2

      SHA512

      ec114e17d01d92e7c8209963097003689901fb7fe313f236fef373571351066452b37c10e6f0c1496ad081402af87bbbc8fe5d5737fd3665c73d9d839312ce44

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      474KB

      MD5

      1ca79e3c2539763b0aaac5de49795afe

      SHA1

      2d240aef9a2cce22578f42ebecd3058e37a404a8

      SHA256

      e3e49eceb810b34fc826d70c6556d927a363f29c90b347ee4cfd61d7ba3ff2d9

      SHA512

      4e24d3ebcefa6545d85517bbc5bff3285f85a5967da1642a6e4e53bc2c41efc8b9092a3bbb56c1670b215d623ff5c320bcb06f654ac97482a5dff0da208349e6

    • F:\$RECYCLE.BIN\S-1-5-21-3692679935-4019334568-335155002-1000\_desktop.ini

      Filesize

      10B

      MD5

      291aa08828faa68893c7f89a0dfc158b

      SHA1

      fcae3d190f0d8c14b44dc2be0b627b0680d2eab9

      SHA256

      f9e79f635e09441b5a073e6263a1d1de881c2105d7637650b5ec2d20f6a7c841

      SHA512

      9c80a5e3e37731eb0eba85b496e512dbfe08c77c207bcb41ad429d289e3d348e8e7b83ef00052c445581df37aa60729a4f0c2dd3ed0ed2e5d05a8758a23f1f38

    • memory/288-67-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/288-21-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/288-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/288-74-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/288-15-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/288-104-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/288-1851-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/288-8-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/288-3311-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1364-5-0x0000000002650000-0x0000000002651000-memory.dmp

      Filesize

      4KB