Analysis

  • max time kernel
    155s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-08-2023 06:06

General

  • Target

    ce9d756654d78d1a78d4fb528dede195b0029d70af55837b7d9de1d31cf2ba19.exe

  • Size

    2.8MB

  • MD5

    0db2f877034eae2d714b3079697a5792

  • SHA1

    918cc48474a409a6455d37a921b39162915d224c

  • SHA256

    ce9d756654d78d1a78d4fb528dede195b0029d70af55837b7d9de1d31cf2ba19

  • SHA512

    4c4062482897b45a5d4b88284504817bea810b2641e830b149409a5d351a37c327f638cd086be61ea81dea8596c7fda9b905ee21715de71fbea77736b222851d

  • SSDEEP

    49152:o6gLKJuMarhVnMFwTH8/giBiBcbk4ZxZ2DqFeVMhuxcPh:1d1XdhBiiMa7

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3192
      • C:\Users\Admin\AppData\Local\Temp\ce9d756654d78d1a78d4fb528dede195b0029d70af55837b7d9de1d31cf2ba19.exe
        "C:\Users\Admin\AppData\Local\Temp\ce9d756654d78d1a78d4fb528dede195b0029d70af55837b7d9de1d31cf2ba19.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4856
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4788
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1664
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB2D5.bat
            3⤵
              PID:1772
              • C:\Users\Admin\AppData\Local\Temp\ce9d756654d78d1a78d4fb528dede195b0029d70af55837b7d9de1d31cf2ba19.exe
                "C:\Users\Admin\AppData\Local\Temp\ce9d756654d78d1a78d4fb528dede195b0029d70af55837b7d9de1d31cf2ba19.exe"
                4⤵
                • Executes dropped EXE
                PID:496
            • C:\Windows\Logo1_.exe
              C:\Windows\Logo1_.exe
              3⤵
              • Drops startup file
              • Executes dropped EXE
              • Enumerates connected drives
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1120
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:4428
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:4164
                • C:\Windows\SysWOW64\net.exe
                  net stop "Kingsoft AntiVirus Service"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1612
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                    5⤵
                      PID:2508

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              258KB

              MD5

              f113ec0dbd1353dea0bfe91596d40a33

              SHA1

              d1fed3336384ac56c793bdbc33592c28c5eaaa00

              SHA256

              201a414fb3585b5a3bba5f210e9c771c4222aa8c6561a6e6d10bce0aeb6409ca

              SHA512

              3c37b89f08e11b3994dca677b3c77432dbe96eb20a18d0eb686644f627a2a8c4cbbd11cb557141b77cf0881c79119a8015ad9fb287df05f3fd7b5c3ad1932f09

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              491KB

              MD5

              3cc995d5492b863b71e1b41fe62f1751

              SHA1

              ab55b979051f1ea3f148eec25c2ba06f69d3a727

              SHA256

              ca0dc4f754b431800cc5c366c03f0043da51441c7efe2c03fc350defa9fc0bf5

              SHA512

              3d09b8f372ac9358944819f20e0e7bc74b4de3d8e1fc76e562b91234a66a2748017e613de7b6fa3720406a56e76fd0b4b2b959b07a76261b7b98f4af0005281c

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              478KB

              MD5

              f21c2dfde391ab45214bb0248d4bd581

              SHA1

              1fbaeecc0edf4e060aa3e0d99fa7c0b77c0ead38

              SHA256

              7bad92eb6ccddf94866799ad54a186ee5eef88c2030219dc02626b9db61f54e0

              SHA512

              8c3c60f0e026607c129a3b08c6401a9243519c134124859eaa160253bd542297dd8da2f96834a0ccf4a3209119d78a47fb97360fe697a40dd1fb297faf692b25

            • C:\Users\Admin\AppData\Local\Temp\$$aB2D5.bat

              Filesize

              722B

              MD5

              ecc5d1ca2546687d94def2bba3e549d7

              SHA1

              a7fb39331762aeeadb764165860423257034f0e8

              SHA256

              40dc9d91ff091db11e14a5c2c44d82d86e6c7feeb52ee25b18dce61158cc0678

              SHA512

              5148ae2e9eab77eea48440d46d01ed9b6edba88d4d5e319097534c860c5e2909936741aa47d96173a63064dbc2b3856489327277e9a7baf4860b3c40f2893688

            • C:\Users\Admin\AppData\Local\Temp\ce9d756654d78d1a78d4fb528dede195b0029d70af55837b7d9de1d31cf2ba19.exe

              Filesize

              2.8MB

              MD5

              095092f4e746810c5829038d48afd55a

              SHA1

              246eb3d41194dddc826049bbafeb6fc522ec044a

              SHA256

              2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

              SHA512

              7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

            • C:\Users\Admin\AppData\Local\Temp\ce9d756654d78d1a78d4fb528dede195b0029d70af55837b7d9de1d31cf2ba19.exe.exe

              Filesize

              2.8MB

              MD5

              095092f4e746810c5829038d48afd55a

              SHA1

              246eb3d41194dddc826049bbafeb6fc522ec044a

              SHA256

              2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

              SHA512

              7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

            • C:\Windows\Logo1_.exe

              Filesize

              33KB

              MD5

              a043b1636ac93797c40597eb606d8600

              SHA1

              dfdb44a7e495b6e9aca6ac3aa8e32cecace9d50a

              SHA256

              ba3b1134537a0250b123d63468f174c263e00331ae9dd05a45d10b08243abf85

              SHA512

              350e5cb96af9006a9aeec8013188add97f29e4d9f881d4bdf1a8733d9b43cf4a45eabc5d668ac338b2c6be1a3f97d872a52ce18db5036585fed2658577dd2183

            • C:\Windows\Logo1_.exe

              Filesize

              33KB

              MD5

              a043b1636ac93797c40597eb606d8600

              SHA1

              dfdb44a7e495b6e9aca6ac3aa8e32cecace9d50a

              SHA256

              ba3b1134537a0250b123d63468f174c263e00331ae9dd05a45d10b08243abf85

              SHA512

              350e5cb96af9006a9aeec8013188add97f29e4d9f881d4bdf1a8733d9b43cf4a45eabc5d668ac338b2c6be1a3f97d872a52ce18db5036585fed2658577dd2183

            • C:\Windows\rundl132.exe

              Filesize

              33KB

              MD5

              a043b1636ac93797c40597eb606d8600

              SHA1

              dfdb44a7e495b6e9aca6ac3aa8e32cecace9d50a

              SHA256

              ba3b1134537a0250b123d63468f174c263e00331ae9dd05a45d10b08243abf85

              SHA512

              350e5cb96af9006a9aeec8013188add97f29e4d9f881d4bdf1a8733d9b43cf4a45eabc5d668ac338b2c6be1a3f97d872a52ce18db5036585fed2658577dd2183

            • F:\$RECYCLE.BIN\S-1-5-21-3195054982-4292022746-1467505928-1000\_desktop.ini

              Filesize

              9B

              MD5

              c0232c2f01c543d260713210da47a57b

              SHA1

              63f2c13c2c5c83091133c2802e69993d52e3ec65

              SHA256

              278e1b8fd3f40d95faaecf548098b8d9ee4b32e98a8878559c8c8dfcd5cd1197

              SHA512

              2ccfd67393a63f03f588296bb798d7a7d4ec2ea5d6ac486cb7bdf8a5a66b1df944d8b548f317e58bfe17dea2ae54e536ffe77bc11a43c931f3d10e299ab3fca0

            • memory/1120-17-0x0000000000400000-0x000000000043D000-memory.dmp

              Filesize

              244KB

            • memory/1120-1231-0x0000000000400000-0x000000000043D000-memory.dmp

              Filesize

              244KB

            • memory/1120-4346-0x0000000000400000-0x000000000043D000-memory.dmp

              Filesize

              244KB

            • memory/1120-8-0x0000000000400000-0x000000000043D000-memory.dmp

              Filesize

              244KB

            • memory/1120-7827-0x0000000000400000-0x000000000043D000-memory.dmp

              Filesize

              244KB

            • memory/1120-8697-0x0000000000400000-0x000000000043D000-memory.dmp

              Filesize

              244KB

            • memory/4856-0-0x0000000000400000-0x000000000043D000-memory.dmp

              Filesize

              244KB

            • memory/4856-10-0x0000000000400000-0x000000000043D000-memory.dmp

              Filesize

              244KB