Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:20

General

  • Target

    a4f6bac28ce905dcf1c5a4c3d07a1b5edc3c5a412db15463e9980c8223b37157.exe

  • Size

    337KB

  • MD5

    49d0eacdd73f421461da2c5529464d1c

  • SHA1

    698449fbd9426a9e839493d4a1966f746e7d3e1e

  • SHA256

    a4f6bac28ce905dcf1c5a4c3d07a1b5edc3c5a412db15463e9980c8223b37157

  • SHA512

    20402c7a7b63d34e001757a9571ccc9b818603b44ad2077af2fea49e8b427032eae058f4f0e8f3747bba5205e3f78f90d57d655d69b00c23e7b3ef4215942edc

  • SSDEEP

    6144:nVfjmNa3QxfAjg8CSFwq++b+s8snHA+ZwUKkfCSFwq++b+s8s:V7+ioX+b+sBngywEoX+b+sp

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\a4f6bac28ce905dcf1c5a4c3d07a1b5edc3c5a412db15463e9980c8223b37157.exe
        "C:\Users\Admin\AppData\Local\Temp\a4f6bac28ce905dcf1c5a4c3d07a1b5edc3c5a412db15463e9980c8223b37157.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a9BF1.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2452
          • C:\Users\Admin\AppData\Local\Temp\a4f6bac28ce905dcf1c5a4c3d07a1b5edc3c5a412db15463e9980c8223b37157.exe
            "C:\Users\Admin\AppData\Local\Temp\a4f6bac28ce905dcf1c5a4c3d07a1b5edc3c5a412db15463e9980c8223b37157.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2856
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2400
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2092
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:1864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\$$a9BF1.bat

      Filesize

      722B

      MD5

      4a54ce9d39ec92ba999bce46afea44cc

      SHA1

      8e0cc059f27d0fb01cc3e31a1f24cc1036deb743

      SHA256

      cdaf75340adcc90407c5c4a724c5784a98fb3581b31074824070fce164902ac9

      SHA512

      b34c288bba113da19d4f7f7d3fd34c1343aedb34c5708f9a6bca7dd91c737714f28a8ca5086cbf87c67ee65841bad115fed38891bfacb7ca755ec373789982ff

    • C:\Users\Admin\AppData\Local\Temp\a4f6bac28ce905dcf1c5a4c3d07a1b5edc3c5a412db15463e9980c8223b37157.exe.exe

      Filesize

      311KB

      MD5

      4fb7bab8644e827b14185267102161af

      SHA1

      9621c1a86dbd7f9f80c5c4feddce60044224d097

      SHA256

      cf7d06ed150dafb79bd893c49398e6bcd4251989d638c15d9f4a19872f79e8da

      SHA512

      28c44808bd9c86aae4e98c8c7f115487adc14252448c2eb1ca2abd78cd368aa3223221e3a6fd60cc8586d6a36e0e80cfdf72eb97e7eb35a533d867156951e9f2

    • C:\Windows\Logo1_.exe

      Filesize

      26KB

      MD5

      2da5a57d1ba2ed4b46bc3c9817948557

      SHA1

      8b28792220f874e0abd68de5d946c3ae111f6abb

      SHA256

      e3c3821d97d831fe32ef85bf7e78b397eba5cd839568aeae330e28e702eb662f

      SHA512

      29940a2b80714d8f816a0d6b4f5d93cfb4aeae5e0303f6f06d5091a3e0dc405ae1a1def41ea5e2e709ed6c20d4f4fd8f1d9527ca6eb4eb6d6cf1bc5fce4a7e91

    • F:\$RECYCLE.BIN\S-1-5-21-2872745919-2748461613-2989606286-1000\_desktop.ini

      Filesize

      9B

      MD5

      d04a2c5969edc73e31046150e6e48b05

      SHA1

      2785510be3ab399ade3b33d2f1318e76e81ae4e1

      SHA256

      7360d26161d1066f0ba367ee7abc4f1ba6dd99765f6eceb0babad6563fbfaf0b

      SHA512

      e1712b114dac60d616f9c01ea219d254103ee338c60fa991ab0b79f0ce2e7082b68e9b75226cf6f1702d8fdedb72f2e13631f0c7a263add00f726dcfa62ecdd9

    • memory/1196-35-0x0000000002D20000-0x0000000002D21000-memory.dmp

      Filesize

      4KB

    • memory/1720-18-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1720-19-0x0000000000220000-0x0000000000254000-memory.dmp

      Filesize

      208KB

    • memory/1720-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1720-12-0x0000000000220000-0x0000000000254000-memory.dmp

      Filesize

      208KB

    • memory/2400-1882-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2400-472-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2400-105-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2400-99-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2400-37-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2400-53-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2400-47-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2856-32-0x0000000074620000-0x0000000074D0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2856-39-0x0000000074620000-0x0000000074D0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2856-38-0x000000007462E000-0x000000007462F000-memory.dmp

      Filesize

      4KB

    • memory/2856-33-0x0000000074620000-0x0000000074D0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2856-31-0x0000000074620000-0x0000000074D0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2856-30-0x00000000003D0000-0x0000000000424000-memory.dmp

      Filesize

      336KB

    • memory/2856-29-0x000000007462E000-0x000000007462F000-memory.dmp

      Filesize

      4KB