Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2022, 18:27

General

  • Target

    d1fa290ea359a55a160dec6c73d46e332e7cf7d51d4195f07818eb3518d24f63.exe

  • Size

    109KB

  • MD5

    00477772b9aa9b02406cc7bc507fa696

  • SHA1

    dde714441a22b11858c63c9cf514c882111f8e31

  • SHA256

    d1fa290ea359a55a160dec6c73d46e332e7cf7d51d4195f07818eb3518d24f63

  • SHA512

    7be0469624fd8c504773bc40d08baf5fa8f3b03e56fc885eebe1ee52b62e49ab691ed0f318e730bc4615745654d647c00054b91c9bedc4a276ea17e8d940f548

  • SSDEEP

    1536:77qnkAQtSaoGo5n4iLG0/WM6T4HSaYqey/XxAyN0Hrnj/5vG4CGlNz:SCSjGoLpWM6CB/XxAyKH//EeB

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1040
      • C:\Users\Admin\AppData\Local\Temp\d1fa290ea359a55a160dec6c73d46e332e7cf7d51d4195f07818eb3518d24f63.exe
        "C:\Users\Admin\AppData\Local\Temp\d1fa290ea359a55a160dec6c73d46e332e7cf7d51d4195f07818eb3518d24f63.exe"
        2⤵
        • Drops file in Drivers directory
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1804
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3704
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:3624
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB1B1.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1972
            • C:\Users\Admin\AppData\Local\Temp\d1fa290ea359a55a160dec6c73d46e332e7cf7d51d4195f07818eb3518d24f63.exe
              "C:\Users\Admin\AppData\Local\Temp\d1fa290ea359a55a160dec6c73d46e332e7cf7d51d4195f07818eb3518d24f63.exe"
              4⤵
              • Executes dropped EXE
              PID:1384
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Adds Run key to start application
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2280
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1228
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:1016
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:4712
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:1092

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$$aB1B1.bat

            Filesize

            722B

            MD5

            990488ea8a307d32d79ee64be674f839

            SHA1

            5787c96720185d4798a46ebaeb51863c8e7a601a

            SHA256

            95d680fe7bd02f6fd31837c4aaa7a82aa66a27c038c45b9577cf3a81a34e835b

            SHA512

            efa5361176e4ee8d962ee336e7c59a7fa72aee14149642ff38c98dd36fa9fe4d6ed911eea6b4b1ca9fb1831c4e90b4b9351d8c855801e63bfc67711a405945c4

          • C:\Users\Admin\AppData\Local\Temp\d1fa290ea359a55a160dec6c73d46e332e7cf7d51d4195f07818eb3518d24f63.exe

            Filesize

            16KB

            MD5

            c4a4ce5248be79a4aae5112d98e9f1c3

            SHA1

            da8a1cce89f5451020e2f0349c7c91a1b79e3530

            SHA256

            5fa6a952c7eae674f235bee7f33ae2a87d350924f95a3119fa1941ceb68c9592

            SHA512

            69d8d6820a31105ca64572883ea0363d4c2cdbac584c76d45d08d8d4025757bc191a322e1e3cbd45a20d74c6e85a49c460216d46b99d226565f97bdf1f3b77d5

          • C:\Users\Admin\AppData\Local\Temp\d1fa290ea359a55a160dec6c73d46e332e7cf7d51d4195f07818eb3518d24f63.exe.exe

            Filesize

            16KB

            MD5

            c4a4ce5248be79a4aae5112d98e9f1c3

            SHA1

            da8a1cce89f5451020e2f0349c7c91a1b79e3530

            SHA256

            5fa6a952c7eae674f235bee7f33ae2a87d350924f95a3119fa1941ceb68c9592

            SHA512

            69d8d6820a31105ca64572883ea0363d4c2cdbac584c76d45d08d8d4025757bc191a322e1e3cbd45a20d74c6e85a49c460216d46b99d226565f97bdf1f3b77d5

          • C:\Windows\Logo1_.exe

            Filesize

            93KB

            MD5

            d8ed0a9567a0d95dae297487189a5a55

            SHA1

            86a5b41976d8ad5bd70ebf70e8ad5b6661402134

            SHA256

            3f6bb19caaf16166c1cb87fbd30a63e36122d2f6020709e0ffd5c947f5cdd4a9

            SHA512

            de01e86613e6e6ef6be6aaa4543c5df7894b6f2230aa409b918f157a7de4afaf3cf5fd065470584f464330ca7df390a2ab79b5cbf3b19d019861d0cf0255ad31

          • C:\Windows\Logo1_.exe

            Filesize

            93KB

            MD5

            d8ed0a9567a0d95dae297487189a5a55

            SHA1

            86a5b41976d8ad5bd70ebf70e8ad5b6661402134

            SHA256

            3f6bb19caaf16166c1cb87fbd30a63e36122d2f6020709e0ffd5c947f5cdd4a9

            SHA512

            de01e86613e6e6ef6be6aaa4543c5df7894b6f2230aa409b918f157a7de4afaf3cf5fd065470584f464330ca7df390a2ab79b5cbf3b19d019861d0cf0255ad31

          • C:\Windows\uninstall\rundl132.exe

            Filesize

            93KB

            MD5

            d8ed0a9567a0d95dae297487189a5a55

            SHA1

            86a5b41976d8ad5bd70ebf70e8ad5b6661402134

            SHA256

            3f6bb19caaf16166c1cb87fbd30a63e36122d2f6020709e0ffd5c947f5cdd4a9

            SHA512

            de01e86613e6e6ef6be6aaa4543c5df7894b6f2230aa409b918f157a7de4afaf3cf5fd065470584f464330ca7df390a2ab79b5cbf3b19d019861d0cf0255ad31