Analysis

  • max time kernel
    151s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 15:30

General

  • Target

    4a2d5bcabfafe890daf62ef6fa23070dfbd14a04d3753b89e0380cab9cc8c65a.exe

  • Size

    121KB

  • MD5

    085c34714071458bbf95588791ce1b33

  • SHA1

    3380f65b05ab5025e1e63f1892fffb8164768084

  • SHA256

    4a2d5bcabfafe890daf62ef6fa23070dfbd14a04d3753b89e0380cab9cc8c65a

  • SHA512

    96d30ab7f7ecfbccc2e3c8119957c6be3423ccd99b0c140ef79c00f9b800c76734869ed2f4602476baf770887ca64206a3272a3e233f67ee7a0297b064303632

  • SSDEEP

    1536:27qnkAQtSaoGo5n4iLG0/WM6HGHSaYqemmjxi2uC+ysafJe6QEM:nCSjGoLpWM6slmjxNu4JBXk

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1236
      • C:\Users\Admin\AppData\Local\Temp\4a2d5bcabfafe890daf62ef6fa23070dfbd14a04d3753b89e0380cab9cc8c65a.exe
        "C:\Users\Admin\AppData\Local\Temp\4a2d5bcabfafe890daf62ef6fa23070dfbd14a04d3753b89e0380cab9cc8c65a.exe"
        2⤵
        • Drops file in Drivers directory
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1720
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1028
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a2888.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:552
            • C:\Users\Admin\AppData\Local\Temp\4a2d5bcabfafe890daf62ef6fa23070dfbd14a04d3753b89e0380cab9cc8c65a.exe
              "C:\Users\Admin\AppData\Local\Temp\4a2d5bcabfafe890daf62ef6fa23070dfbd14a04d3753b89e0380cab9cc8c65a.exe"
              4⤵
              • Executes dropped EXE
              PID:1108
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Adds Run key to start application
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:628
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:516
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:1776
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1360
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:1324

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$$a2888.bat

            Filesize

            722B

            MD5

            d0b6f14fe98098f579a0ab8ffd4b2d72

            SHA1

            d7bf1895725c1ce806e75b0f960932fc67ff21f9

            SHA256

            b70fa5b6dd0c226ec9cf8afec5a5f8720650bb4475a342b7408f07de3930d21e

            SHA512

            ab8b2e30cc22f88f8e49faa6de265bc8646e078bef01089036bcf5bd9db7119e2e23612422473a29d5a9e0cfc8864514b80daa343f88a400ae3d90d15733f992

          • C:\Users\Admin\AppData\Local\Temp\4a2d5bcabfafe890daf62ef6fa23070dfbd14a04d3753b89e0380cab9cc8c65a.exe

            Filesize

            28KB

            MD5

            a8f5f83037e906d2e9e099c35c239197

            SHA1

            fc4419c022afd2e92eef60ca57f1ada48354bfea

            SHA256

            1e1bf35df960dc94de265ac6715233ca908819149526c7cf01a31ccb418bdc1a

            SHA512

            3249baf8558fe493f417e4ad1053b26f216c45ff9e08742c5fbf676ad013bc9aedb6eab5c72601a3df12e0a77ed721b2382ef43c5e190ad26c2d5c5e94ca5c23

          • C:\Users\Admin\AppData\Local\Temp\4a2d5bcabfafe890daf62ef6fa23070dfbd14a04d3753b89e0380cab9cc8c65a.exe.exe

            Filesize

            28KB

            MD5

            a8f5f83037e906d2e9e099c35c239197

            SHA1

            fc4419c022afd2e92eef60ca57f1ada48354bfea

            SHA256

            1e1bf35df960dc94de265ac6715233ca908819149526c7cf01a31ccb418bdc1a

            SHA512

            3249baf8558fe493f417e4ad1053b26f216c45ff9e08742c5fbf676ad013bc9aedb6eab5c72601a3df12e0a77ed721b2382ef43c5e190ad26c2d5c5e94ca5c23

          • C:\Windows\Logo1_.exe

            Filesize

            93KB

            MD5

            4812c27e497de8c92c4a81863796caae

            SHA1

            392223229195aff1c13383d87e2650288091cda9

            SHA256

            b34edb82a325d51d912bdc6fe03bbc17fe7c3bf6a5bf830882197c81ca61b41f

            SHA512

            949016e5a7fb80df83876cc7d31d71b70cd1c1c7e576eb33de8922c4f724e52f93886f3fdb54538fdb94aafa387203917f4f78590f0e8d14e8b1a3ce24a7787a

          • C:\Windows\Logo1_.exe

            Filesize

            93KB

            MD5

            4812c27e497de8c92c4a81863796caae

            SHA1

            392223229195aff1c13383d87e2650288091cda9

            SHA256

            b34edb82a325d51d912bdc6fe03bbc17fe7c3bf6a5bf830882197c81ca61b41f

            SHA512

            949016e5a7fb80df83876cc7d31d71b70cd1c1c7e576eb33de8922c4f724e52f93886f3fdb54538fdb94aafa387203917f4f78590f0e8d14e8b1a3ce24a7787a

          • C:\Windows\uninstall\rundl132.exe

            Filesize

            93KB

            MD5

            4812c27e497de8c92c4a81863796caae

            SHA1

            392223229195aff1c13383d87e2650288091cda9

            SHA256

            b34edb82a325d51d912bdc6fe03bbc17fe7c3bf6a5bf830882197c81ca61b41f

            SHA512

            949016e5a7fb80df83876cc7d31d71b70cd1c1c7e576eb33de8922c4f724e52f93886f3fdb54538fdb94aafa387203917f4f78590f0e8d14e8b1a3ce24a7787a

          • \Users\Admin\AppData\Local\Temp\4a2d5bcabfafe890daf62ef6fa23070dfbd14a04d3753b89e0380cab9cc8c65a.exe

            Filesize

            28KB

            MD5

            a8f5f83037e906d2e9e099c35c239197

            SHA1

            fc4419c022afd2e92eef60ca57f1ada48354bfea

            SHA256

            1e1bf35df960dc94de265ac6715233ca908819149526c7cf01a31ccb418bdc1a

            SHA512

            3249baf8558fe493f417e4ad1053b26f216c45ff9e08742c5fbf676ad013bc9aedb6eab5c72601a3df12e0a77ed721b2382ef43c5e190ad26c2d5c5e94ca5c23

          • \Users\Admin\AppData\Local\Temp\4a2d5bcabfafe890daf62ef6fa23070dfbd14a04d3753b89e0380cab9cc8c65a.exe

            Filesize

            28KB

            MD5

            a8f5f83037e906d2e9e099c35c239197

            SHA1

            fc4419c022afd2e92eef60ca57f1ada48354bfea

            SHA256

            1e1bf35df960dc94de265ac6715233ca908819149526c7cf01a31ccb418bdc1a

            SHA512

            3249baf8558fe493f417e4ad1053b26f216c45ff9e08742c5fbf676ad013bc9aedb6eab5c72601a3df12e0a77ed721b2382ef43c5e190ad26c2d5c5e94ca5c23