Analysis

  • max time kernel
    151s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:26

General

  • Target

    e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe

  • Size

    269KB

  • MD5

    006a802df60dc9b22b77c4c798f9a703

  • SHA1

    6d410bf03883f133d1d094285c4615ca999e658b

  • SHA256

    e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c

  • SHA512

    1e35e4425f60c27d8aea2e8c34fc3333437a65f17f6663ceb6ee0d17643f1ddefc8961e72d69cdda9667ff327fc843d55d4facbcf66f43af67a67f7ac8f5b663

  • SSDEEP

    6144:cc46tGdyN83nLbxKVJ3nCMkQe5HZAsHFZlxo:cc3NNgsHyMqLHFZlxo

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1360
      • C:\Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe
        "C:\Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1524
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1692
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:624
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a4B05.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:948
            • C:\Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe
              "C:\Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1176
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1380
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:580
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:584
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1832
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:1996

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$$a4B05.bat

            Filesize

            722B

            MD5

            e7d87a089d5fee780fe3238dbcd2a75e

            SHA1

            39c2259e5ca71f83b7e83c6f3f4aeb1ce4aa0bc9

            SHA256

            51b47fe7a7666520d552278a7615c121a8b180e1d4869cab8a310091a79a62a0

            SHA512

            5f9e18b9f4bd87294d582630e77c6e260fc36e16c37a64d3b0d0fea37b238e69747d57098ea84581f0837ec0565094e9070a150e9e333896c13ce1e9274e640b

          • C:\Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe

            Filesize

            236KB

            MD5

            d095376682210d6ddcaeb636500eb0cb

            SHA1

            f3ba099deee863c83f78e1814eb345b56560b11a

            SHA256

            06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

            SHA512

            546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

          • C:\Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe.exe

            Filesize

            236KB

            MD5

            d095376682210d6ddcaeb636500eb0cb

            SHA1

            f3ba099deee863c83f78e1814eb345b56560b11a

            SHA256

            06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

            SHA512

            546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            b8738498596b67cee4b863b2926ff65a

            SHA1

            34b936a96fc79e56a988247770d03324b10ce3cb

            SHA256

            d69bf681ee6babb017e664e9b8ba5a03b7d2ff60abe2259174667019d00e8ff0

            SHA512

            ce88ba3d2bdaebc4e9f2468213b69d497f33b4c85a4bf68af5bce8a282d3905f22aa8a89341d093bfaa4f01fbbec7462138d2ca725b4c0cf31d69b87889871a3

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            b8738498596b67cee4b863b2926ff65a

            SHA1

            34b936a96fc79e56a988247770d03324b10ce3cb

            SHA256

            d69bf681ee6babb017e664e9b8ba5a03b7d2ff60abe2259174667019d00e8ff0

            SHA512

            ce88ba3d2bdaebc4e9f2468213b69d497f33b4c85a4bf68af5bce8a282d3905f22aa8a89341d093bfaa4f01fbbec7462138d2ca725b4c0cf31d69b87889871a3

          • C:\Windows\rundl132.exe

            Filesize

            33KB

            MD5

            b8738498596b67cee4b863b2926ff65a

            SHA1

            34b936a96fc79e56a988247770d03324b10ce3cb

            SHA256

            d69bf681ee6babb017e664e9b8ba5a03b7d2ff60abe2259174667019d00e8ff0

            SHA512

            ce88ba3d2bdaebc4e9f2468213b69d497f33b4c85a4bf68af5bce8a282d3905f22aa8a89341d093bfaa4f01fbbec7462138d2ca725b4c0cf31d69b87889871a3

          • \Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe

            Filesize

            236KB

            MD5

            d095376682210d6ddcaeb636500eb0cb

            SHA1

            f3ba099deee863c83f78e1814eb345b56560b11a

            SHA256

            06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

            SHA512

            546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

          • \Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe

            Filesize

            236KB

            MD5

            d095376682210d6ddcaeb636500eb0cb

            SHA1

            f3ba099deee863c83f78e1814eb345b56560b11a

            SHA256

            06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

            SHA512

            546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

          • \Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe

            Filesize

            236KB

            MD5

            d095376682210d6ddcaeb636500eb0cb

            SHA1

            f3ba099deee863c83f78e1814eb345b56560b11a

            SHA256

            06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

            SHA512

            546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

          • \Users\Admin\AppData\Local\Temp\e9739036b9a7077547cab1fc7272d72a3e6c4c49f24b40fda2272715f3fd999c.exe

            Filesize

            236KB

            MD5

            d095376682210d6ddcaeb636500eb0cb

            SHA1

            f3ba099deee863c83f78e1814eb345b56560b11a

            SHA256

            06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

            SHA512

            546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

          • memory/580-62-0x0000000000000000-mapping.dmp

          • memory/584-63-0x0000000000000000-mapping.dmp

          • memory/624-56-0x0000000000000000-mapping.dmp

          • memory/948-57-0x0000000000000000-mapping.dmp

          • memory/1176-70-0x0000000075B51000-0x0000000075B53000-memory.dmp

            Filesize

            8KB

          • memory/1176-68-0x0000000000000000-mapping.dmp

          • memory/1380-58-0x0000000000000000-mapping.dmp

          • memory/1380-64-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1380-77-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1524-60-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1524-54-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1692-55-0x0000000000000000-mapping.dmp

          • memory/1832-75-0x0000000000000000-mapping.dmp

          • memory/1996-76-0x0000000000000000-mapping.dmp