Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 08:15

General

  • Target

    8924bbe5bdf9e3b378dd6d4dfa9df15b16d87b7560160ff4527c00ae119af332.exe

  • Size

    77KB

  • MD5

    3b1c642edd290c457c15e7bc3d7f94d8

  • SHA1

    34d829aa65e40b5b0676576f1a742c6c55922c4d

  • SHA256

    8924bbe5bdf9e3b378dd6d4dfa9df15b16d87b7560160ff4527c00ae119af332

  • SHA512

    83c801371d1e34831371133a95c30234f6861654f178d79ee24e43643a0d36ef64f65c29d7c9766956c8f8549a30d94f8ab8b41637b35a62c0856b3a6e66cf8f

  • SSDEEP

    1536:IKufgLdQAQfcfymNQtxh7mnJAOMWajiWKu4l:gftffjmNc7tdXji6G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3544
      • C:\Users\Admin\AppData\Local\Temp\8924bbe5bdf9e3b378dd6d4dfa9df15b16d87b7560160ff4527c00ae119af332.exe
        "C:\Users\Admin\AppData\Local\Temp\8924bbe5bdf9e3b378dd6d4dfa9df15b16d87b7560160ff4527c00ae119af332.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2408
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a93A5.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2088
          • C:\Users\Admin\AppData\Local\Temp\8924bbe5bdf9e3b378dd6d4dfa9df15b16d87b7560160ff4527c00ae119af332.exe
            "C:\Users\Admin\AppData\Local\Temp\8924bbe5bdf9e3b378dd6d4dfa9df15b16d87b7560160ff4527c00ae119af332.exe"
            4⤵
            • Executes dropped EXE
            PID:620
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4640
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:116
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:5012

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      244KB

      MD5

      fbdc7658700bc44721a98403b73e201e

      SHA1

      9e9af0ff2a9fd0cfcf9c97f84ba74bca12b91bc5

      SHA256

      0ef057e3cd69042167a7339836c4f1b08c52ee88354527d47987e5f1f141e4f8

      SHA512

      58983a0f33ca927ecc8884e9373ed7c66a05037767d18f3ba2580703b4d4762605fc0e827c5a3eacec6a015079cd0623805f5aee0f0f623abc31c8129854c052

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      570KB

      MD5

      c5463f866bd960d71014c2dcfc452157

      SHA1

      eb5fdf8dd9172e38764574fea9ea06f5c9d2c11d

      SHA256

      49c42bbff7297a8191e2f1d44823322da1474d3d9102b502eb8085adc06f523f

      SHA512

      b02a267a3fefba74e5a1f5a142508c8830b8b34e6e9053bdab010b08e20a75b69a1fb163916f511ca5aaa780cb7c235c8eb6d5ae6b21693049187c5863a98fa7

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      636KB

      MD5

      2500f702e2b9632127c14e4eaae5d424

      SHA1

      8726fef12958265214eeb58001c995629834b13a

      SHA256

      82e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c

      SHA512

      f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c

    • C:\Users\Admin\AppData\Local\Temp\$$a93A5.bat

      Filesize

      722B

      MD5

      9684905e7105f978209fbd3c0eda1f8e

      SHA1

      b3af1959185fa5adff4f75054154f4c932664dd4

      SHA256

      d8154acbf5cf65755df74ad80e6ef6a6956c813092bd74b0ebbebcfdd9fb0a86

      SHA512

      747843765f666aecb20a75aa1654de0a153b8b04973dbb2938b654d0ebbc2f3bfa39feffa60f2ea3122c4f2700042372d6533caff200fdcc29602e8f6b7bf74a

    • C:\Users\Admin\AppData\Local\Temp\8924bbe5bdf9e3b378dd6d4dfa9df15b16d87b7560160ff4527c00ae119af332.exe.exe

      Filesize

      50KB

      MD5

      24cbac7dd7547358d199bdd0ce75fcf9

      SHA1

      d9515ab2c4324eb889eac13e28021d50bbbc1c6f

      SHA256

      62a42690f89996010d7b42a090f7f0873aeffbe8325a3ca76477aa8b11f5bb98

      SHA512

      db29ce85dc4b5b93aebea5dc6bda6fd563f6ba688c6f42d40b8788bd020d23191e1501d89f8201b8106d8dc0c1e07e7244792761664bc2c6aa8a85a85c8a3dce

    • C:\Windows\Logo1_.exe

      Filesize

      26KB

      MD5

      f676cd4660f256211a6586e02b66b916

      SHA1

      9fa73fd6cfbe4a4630a10d8384d7dc7ca1c86e9b

      SHA256

      00650a49c505eb5e6aea23737df3f4ed9d7725c4dfa7d096445d38a9b2603886

      SHA512

      edc4ee02ff43407def336504187f78d600470194978deb67a31baf57d23c4557ebe52700b896e750be17187a7619e3cbd8642ed501a4736d547ce546c3400fc0

    • F:\$RECYCLE.BIN\S-1-5-21-2878641211-696417878-3864914810-1000\_desktop.ini

      Filesize

      10B

      MD5

      688d58fa5756a393f9472937ef284c25

      SHA1

      18ee07a5ee8de4fbd046763cd4a55ef2e6c3f808

      SHA256

      e21f27bdf2d90c77d75658b5217d5af4519a6c1bfc326a109eb4a085a2b83302

      SHA512

      c84930eb323c71ffc1edac543a2f60e366de40b39a88b18dba09c1272fae0b12262f4fae496bc9546598507fc37729d829f93b101bbec4739a05be33e0010a3f

    • memory/2408-11-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2408-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4640-27-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4640-37-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4640-33-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4640-531-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4640-1234-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4640-20-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4640-4785-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4640-8-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4640-5254-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB