Analysis

  • max time kernel
    150s
  • max time network
    108s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:27

General

  • Target

    60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c.exe

  • Size

    130KB

  • MD5

    367d663b41a11fa2a6a33f76db2f3540

  • SHA1

    d3ddf332930fe9ccf664a27b643ba7a87503e7d6

  • SHA256

    60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c

  • SHA512

    23ddc16bd0548b15ff12d8e0be3a6b725942da7329bac793c794332756f7f9efec2c91cc44063601a80782df599895913e3147e9bfaf63e62bb038a40ec464a2

  • SSDEEP

    3072:VTre+ao/3N/YJEgPbtNLHBlQZfIWC6xXMIYga:c+ao1/YDtN7KcIYZ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c.exe
      "C:\Users\Admin\AppData\Local\Temp\60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1576
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:1224
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a2608.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:768
          • C:\Users\Admin\AppData\Local\Temp\60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c.exe
            "C:\Users\Admin\AppData\Local\Temp\60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1776
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1696
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1500
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:108
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:968
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:1344

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\$$a2608.bat

          Filesize

          722B

          MD5

          4857a0caeff8abcb844dab7d9d07dc05

          SHA1

          10d50cf358d114ca3a786d7bd19ded38afd0d6df

          SHA256

          6f41b873a4fb05f1875798e877fb13a732191aa46a62e06b2c2e59bf8e217bb6

          SHA512

          59637e65f1abbd5e6a9a1c02ea07747f2a1de014bf28642d6a9e49b0001d9529e0dd30bc1c59dfaa932882a5226532e89d6b58ffc6bfd570ca9b3ef5406148d8

        • C:\Users\Admin\AppData\Local\Temp\60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c.exe

          Filesize

          96KB

          MD5

          9d4df63bd8e402563e77346cea1358de

          SHA1

          ef0ad30f93bf57ca391b60517c1a42f1d5c524cf

          SHA256

          dd8e7b74748ca2b7f88b393a1edafde2f96a1a928fa694a7fa44af2f97aa02d1

          SHA512

          99b383c57aa1cf81543e963fb69248d2ee375f94e1c78e6228c4e66308ce33af92b395a437d9d10e7aad9a1d066b49716f02b49bcd4161569cd33147d25f79ab

        • C:\Users\Admin\AppData\Local\Temp\60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c.exe.exe

          Filesize

          96KB

          MD5

          9d4df63bd8e402563e77346cea1358de

          SHA1

          ef0ad30f93bf57ca391b60517c1a42f1d5c524cf

          SHA256

          dd8e7b74748ca2b7f88b393a1edafde2f96a1a928fa694a7fa44af2f97aa02d1

          SHA512

          99b383c57aa1cf81543e963fb69248d2ee375f94e1c78e6228c4e66308ce33af92b395a437d9d10e7aad9a1d066b49716f02b49bcd4161569cd33147d25f79ab

        • C:\Windows\Logo1_.exe

          Filesize

          33KB

          MD5

          16fd3807ffc5cabf5ddd0c85848f74ce

          SHA1

          db57e93a46eea2e9fa245b5e6ced21987a10fd98

          SHA256

          0f2f83db0723a7c8d1d853b2a6ff4080925937f4c3910355d66a0adec7363b50

          SHA512

          23a98cf4f1df516a4f0b936522de5eb71b8819196352e9ca2325a65dc98db80da066116278adf97c6ae996b8cf34e31c47a98fb4c6002d4ea554e7624bbef00f

        • C:\Windows\Logo1_.exe

          Filesize

          33KB

          MD5

          16fd3807ffc5cabf5ddd0c85848f74ce

          SHA1

          db57e93a46eea2e9fa245b5e6ced21987a10fd98

          SHA256

          0f2f83db0723a7c8d1d853b2a6ff4080925937f4c3910355d66a0adec7363b50

          SHA512

          23a98cf4f1df516a4f0b936522de5eb71b8819196352e9ca2325a65dc98db80da066116278adf97c6ae996b8cf34e31c47a98fb4c6002d4ea554e7624bbef00f

        • C:\Windows\rundl132.exe

          Filesize

          33KB

          MD5

          16fd3807ffc5cabf5ddd0c85848f74ce

          SHA1

          db57e93a46eea2e9fa245b5e6ced21987a10fd98

          SHA256

          0f2f83db0723a7c8d1d853b2a6ff4080925937f4c3910355d66a0adec7363b50

          SHA512

          23a98cf4f1df516a4f0b936522de5eb71b8819196352e9ca2325a65dc98db80da066116278adf97c6ae996b8cf34e31c47a98fb4c6002d4ea554e7624bbef00f

        • \Users\Admin\AppData\Local\Temp\60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c.exe

          Filesize

          96KB

          MD5

          9d4df63bd8e402563e77346cea1358de

          SHA1

          ef0ad30f93bf57ca391b60517c1a42f1d5c524cf

          SHA256

          dd8e7b74748ca2b7f88b393a1edafde2f96a1a928fa694a7fa44af2f97aa02d1

          SHA512

          99b383c57aa1cf81543e963fb69248d2ee375f94e1c78e6228c4e66308ce33af92b395a437d9d10e7aad9a1d066b49716f02b49bcd4161569cd33147d25f79ab

        • \Users\Admin\AppData\Local\Temp\60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c.exe

          Filesize

          96KB

          MD5

          9d4df63bd8e402563e77346cea1358de

          SHA1

          ef0ad30f93bf57ca391b60517c1a42f1d5c524cf

          SHA256

          dd8e7b74748ca2b7f88b393a1edafde2f96a1a928fa694a7fa44af2f97aa02d1

          SHA512

          99b383c57aa1cf81543e963fb69248d2ee375f94e1c78e6228c4e66308ce33af92b395a437d9d10e7aad9a1d066b49716f02b49bcd4161569cd33147d25f79ab

        • memory/108-65-0x0000000000000000-mapping.dmp

        • memory/768-57-0x0000000000000000-mapping.dmp

        • memory/968-73-0x0000000000000000-mapping.dmp

        • memory/1224-55-0x0000000000000000-mapping.dmp

        • memory/1344-74-0x0000000000000000-mapping.dmp

        • memory/1500-62-0x0000000000000000-mapping.dmp

        • memory/1516-56-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/1516-60-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/1576-54-0x0000000000000000-mapping.dmp

        • memory/1696-71-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/1696-58-0x0000000000000000-mapping.dmp

        • memory/1696-75-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/1776-69-0x000007FEFB7F1000-0x000007FEFB7F3000-memory.dmp

          Filesize

          8KB

        • memory/1776-67-0x0000000000000000-mapping.dmp