Analysis

  • max time kernel
    156s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 03:19

General

  • Target

    40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe

  • Size

    626KB

  • MD5

    515548a6eaaab86f5cdb8dbc36fa7510

  • SHA1

    301f7c3e5c9107e0863a667f688c694efabadc65

  • SHA256

    40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207

  • SHA512

    d31b149cf9745c3f69b3183d7428365ecff03893af53e36250fcb9b7c842dc5f20c9d36695235ec1eab2c1972d93efbc8c65b048ab8daded77d1f5cfa79440e0

  • SSDEEP

    12288:3+agDvPrPC7/4HrTAThpjtJ/g76P9uS2AiqNeB/vVq+V:3BgDvPby4HnAThdDYGLpiqC/U+

Malware Config

Signatures

  • ASPack v2.12-2.42 9 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe
    "C:\Users\Admin\AppData\Local\Temp\40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
        3⤵
          PID:1272
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\$$a198A.bat
        2⤵
        • Deletes itself
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1144
        • C:\Users\Admin\AppData\Local\Temp\40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe
          "C:\Users\Admin\AppData\Local\Temp\40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:616
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 616 -s 148
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:432
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1264
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:852
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:612
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1244
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              4⤵
                PID:1580
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          1⤵
            PID:1208

          Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\$$a198A.bat

                  Filesize

                  722B

                  MD5

                  4c3eccebba9fd9f9d83fda005068a324

                  SHA1

                  a643cfb7307820bb211d46247d03d7b00364e331

                  SHA256

                  ba2bbca8f98d035e8d26410881d286eb1bb49fc62c2d5f724635d40d0533abfe

                  SHA512

                  4c9b2623314093c3a6c138f4f77df09acdffd78302fa7c54b0794cab2b9aeb582a1ee258f42a9e235f3fbbc90b851b32dd65cf9d603d51a7ac341c2e3942bf53

                • C:\Users\Admin\AppData\Local\Temp\40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe

                  Filesize

                  593KB

                  MD5

                  c92e30b27e2ddbc5338c4f2091fdf72e

                  SHA1

                  183f92cca56c360d94edf8e2730a50f31d0f0ab4

                  SHA256

                  4ca3f2b1497c1431ab5e5824371dcb7ec14b81719f9c4d872f6956079a4b33d3

                  SHA512

                  0ea0289f3d690acdd986570b5ab8931e530dc00fc3e783f3113b859ee6027993ef968d53b23ed79e36864963ca12c8c0445ba62771ccdd0bd368c9612c8bd7fe

                • C:\Users\Admin\AppData\Local\Temp\40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe.exe

                  Filesize

                  593KB

                  MD5

                  c92e30b27e2ddbc5338c4f2091fdf72e

                  SHA1

                  183f92cca56c360d94edf8e2730a50f31d0f0ab4

                  SHA256

                  4ca3f2b1497c1431ab5e5824371dcb7ec14b81719f9c4d872f6956079a4b33d3

                  SHA512

                  0ea0289f3d690acdd986570b5ab8931e530dc00fc3e783f3113b859ee6027993ef968d53b23ed79e36864963ca12c8c0445ba62771ccdd0bd368c9612c8bd7fe

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  d43daf773462ac788440bca5e211e3dc

                  SHA1

                  5969f39cc42b47f1683d0205c64e8cb79b9b1435

                  SHA256

                  c7f9f29f3d6033dd4dce10b8678891a8c6fe15c3baa90ce265c24bc510daa674

                  SHA512

                  8503fc525294a9e4195e1d2beb13d86cbb9625e4df4e7ec04844ef6a061e6c925fb8b735f90470033e6b2ee8c56116ae7352114d0ba9d535d4c11b601def7bec

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  d43daf773462ac788440bca5e211e3dc

                  SHA1

                  5969f39cc42b47f1683d0205c64e8cb79b9b1435

                  SHA256

                  c7f9f29f3d6033dd4dce10b8678891a8c6fe15c3baa90ce265c24bc510daa674

                  SHA512

                  8503fc525294a9e4195e1d2beb13d86cbb9625e4df4e7ec04844ef6a061e6c925fb8b735f90470033e6b2ee8c56116ae7352114d0ba9d535d4c11b601def7bec

                • C:\Windows\rundl132.exe

                  Filesize

                  33KB

                  MD5

                  d43daf773462ac788440bca5e211e3dc

                  SHA1

                  5969f39cc42b47f1683d0205c64e8cb79b9b1435

                  SHA256

                  c7f9f29f3d6033dd4dce10b8678891a8c6fe15c3baa90ce265c24bc510daa674

                  SHA512

                  8503fc525294a9e4195e1d2beb13d86cbb9625e4df4e7ec04844ef6a061e6c925fb8b735f90470033e6b2ee8c56116ae7352114d0ba9d535d4c11b601def7bec

                • \Users\Admin\AppData\Local\Temp\40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe

                  Filesize

                  593KB

                  MD5

                  c92e30b27e2ddbc5338c4f2091fdf72e

                  SHA1

                  183f92cca56c360d94edf8e2730a50f31d0f0ab4

                  SHA256

                  4ca3f2b1497c1431ab5e5824371dcb7ec14b81719f9c4d872f6956079a4b33d3

                  SHA512

                  0ea0289f3d690acdd986570b5ab8931e530dc00fc3e783f3113b859ee6027993ef968d53b23ed79e36864963ca12c8c0445ba62771ccdd0bd368c9612c8bd7fe

                • \Users\Admin\AppData\Local\Temp\40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe

                  Filesize

                  593KB

                  MD5

                  c92e30b27e2ddbc5338c4f2091fdf72e

                  SHA1

                  183f92cca56c360d94edf8e2730a50f31d0f0ab4

                  SHA256

                  4ca3f2b1497c1431ab5e5824371dcb7ec14b81719f9c4d872f6956079a4b33d3

                  SHA512

                  0ea0289f3d690acdd986570b5ab8931e530dc00fc3e783f3113b859ee6027993ef968d53b23ed79e36864963ca12c8c0445ba62771ccdd0bd368c9612c8bd7fe

                • \Users\Admin\AppData\Local\Temp\40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe

                  Filesize

                  593KB

                  MD5

                  c92e30b27e2ddbc5338c4f2091fdf72e

                  SHA1

                  183f92cca56c360d94edf8e2730a50f31d0f0ab4

                  SHA256

                  4ca3f2b1497c1431ab5e5824371dcb7ec14b81719f9c4d872f6956079a4b33d3

                  SHA512

                  0ea0289f3d690acdd986570b5ab8931e530dc00fc3e783f3113b859ee6027993ef968d53b23ed79e36864963ca12c8c0445ba62771ccdd0bd368c9612c8bd7fe

                • \Users\Admin\AppData\Local\Temp\40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe

                  Filesize

                  593KB

                  MD5

                  c92e30b27e2ddbc5338c4f2091fdf72e

                  SHA1

                  183f92cca56c360d94edf8e2730a50f31d0f0ab4

                  SHA256

                  4ca3f2b1497c1431ab5e5824371dcb7ec14b81719f9c4d872f6956079a4b33d3

                  SHA512

                  0ea0289f3d690acdd986570b5ab8931e530dc00fc3e783f3113b859ee6027993ef968d53b23ed79e36864963ca12c8c0445ba62771ccdd0bd368c9612c8bd7fe

                • \Users\Admin\AppData\Local\Temp\40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe

                  Filesize

                  593KB

                  MD5

                  c92e30b27e2ddbc5338c4f2091fdf72e

                  SHA1

                  183f92cca56c360d94edf8e2730a50f31d0f0ab4

                  SHA256

                  4ca3f2b1497c1431ab5e5824371dcb7ec14b81719f9c4d872f6956079a4b33d3

                  SHA512

                  0ea0289f3d690acdd986570b5ab8931e530dc00fc3e783f3113b859ee6027993ef968d53b23ed79e36864963ca12c8c0445ba62771ccdd0bd368c9612c8bd7fe

                • \Users\Admin\AppData\Local\Temp\40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe

                  Filesize

                  593KB

                  MD5

                  c92e30b27e2ddbc5338c4f2091fdf72e

                  SHA1

                  183f92cca56c360d94edf8e2730a50f31d0f0ab4

                  SHA256

                  4ca3f2b1497c1431ab5e5824371dcb7ec14b81719f9c4d872f6956079a4b33d3

                  SHA512

                  0ea0289f3d690acdd986570b5ab8931e530dc00fc3e783f3113b859ee6027993ef968d53b23ed79e36864963ca12c8c0445ba62771ccdd0bd368c9612c8bd7fe

                • \Users\Admin\AppData\Local\Temp\40396138dfeacfff5a2f7c1d2717d60134220afd1e1191efa22ca85751ea7207.exe

                  Filesize

                  593KB

                  MD5

                  c92e30b27e2ddbc5338c4f2091fdf72e

                  SHA1

                  183f92cca56c360d94edf8e2730a50f31d0f0ab4

                  SHA256

                  4ca3f2b1497c1431ab5e5824371dcb7ec14b81719f9c4d872f6956079a4b33d3

                  SHA512

                  0ea0289f3d690acdd986570b5ab8931e530dc00fc3e783f3113b859ee6027993ef968d53b23ed79e36864963ca12c8c0445ba62771ccdd0bd368c9612c8bd7fe

                • memory/1264-80-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/1264-76-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/2016-56-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/2016-60-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB