Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2023, 02:51

General

  • Target

    37a07cdb3e94885a8eff37498c22efff40decf30f130bde650cbb75ec24eded9.exe

  • Size

    33KB

  • MD5

    36e3596f9c1e223688f6de54bab9f62a

  • SHA1

    ed95c7c3e48492bff85d3d7bf19712abf5ebd5d7

  • SHA256

    37a07cdb3e94885a8eff37498c22efff40decf30f130bde650cbb75ec24eded9

  • SHA512

    7e57eb06d20bcdc72f6f6a8c93e678abceac005ccae19668028260913e1d6d2eab32e0c241275ad311545408764b6d76d9ca5d15565e347e7ddf20c43ae7cc60

  • SSDEEP

    768:AKuchyO5RroZJ767395uINH2iTQKvFrQ2XKxgkQe:AKuchye+Zk77RNH2iT919XKKkQe

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2584
      • C:\Users\Admin\AppData\Local\Temp\37a07cdb3e94885a8eff37498c22efff40decf30f130bde650cbb75ec24eded9.exe
        "C:\Users\Admin\AppData\Local\Temp\37a07cdb3e94885a8eff37498c22efff40decf30f130bde650cbb75ec24eded9.exe"
        2⤵
        • Drops startup file
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1704
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:3704
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2148
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              4⤵
                PID:3844

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                Filesize

                258KB

                MD5

                419ead08a10027f035ab653b2dacce47

                SHA1

                1cd50843a833017b63b7076b4024d5bcbe1574d8

                SHA256

                7759ff95821dde9a5b9871b0383a1474680b5ae8a37d5628e6772b023df7674f

                SHA512

                4f22deb3300c9e0ea9a72ce180383f46fe20eab20b6bbeb72c636bf9fea9bb4eb34a624d0270b28fc86c0a9c93d3b51f252f5c62c1e879ab0392354345e50f96

              • C:\Program Files\Google\Chrome\Application\chrome.exe

                Filesize

                2.8MB

                MD5

                1cf714582f27e0446d1a47fa81da6466

                SHA1

                83b01c2a98a6045ac2b78db2988e7c916068d90c

                SHA256

                f649cb845384ab7acb9b2d093fd52d836a680435703bfc856c96f386eb569ca9

                SHA512

                f6c2eb9bb0742e53bc8f2f7c8ee59799148dabf723fe4dfb1aa3f41dec1abe4a8bf247e0484ea973bad3338448ae32d2d7c86a4670fdf62d326d47e5562ca291

              • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

                Filesize

                478KB

                MD5

                c9e32c9ce2e82d3261fc69d079b70f7d

                SHA1

                1a5b1a64276c510a3ed7c7066ac1a116a39e7eb2

                SHA256

                aeb095c00a46b38559c56d837ed087f191abd2934afc305621f673bb89a12dbe

                SHA512

                8c6ff588d6d85e9b664e57486f8c0211a0c2727a02f40e9cd80adde178ca30e7a2b3377c4c1d9aab630fcb7aac8cf6466a9f4a8ca515149856f7849b88944806

              • F:\$RECYCLE.BIN\S-1-5-21-618519468-4027732583-1827558364-1000\_desktop.ini

                Filesize

                9B

                MD5

                2326d479b287193a70f520700dc8d23e

                SHA1

                afea66d3788a50debd6f5d4c9dd51f68a4477e64

                SHA256

                95d41561a1467d20977f59108e85da181e0b4dfd3db9e40182ae7378c4a927f8

                SHA512

                cb971c406ddf7147536a6a1569d4ff49d7219aa52cde5d110be1109874d66daace832d423d7969af9e6bbc9738a65734c7e68e994591b7677aad51fa0f52cf37

              • memory/1720-0-0x0000000000400000-0x000000000043F000-memory.dmp

                Filesize

                252KB

              • memory/1720-3-0x0000000000400000-0x000000000043F000-memory.dmp

                Filesize

                252KB

              • memory/1720-45-0x0000000000400000-0x000000000043F000-memory.dmp

                Filesize

                252KB

              • memory/1720-2633-0x0000000000400000-0x000000000043F000-memory.dmp

                Filesize

                252KB

              • memory/1720-5877-0x0000000000400000-0x000000000043F000-memory.dmp

                Filesize

                252KB

              • memory/1720-8696-0x0000000000400000-0x000000000043F000-memory.dmp

                Filesize

                252KB