Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2023, 21:32

General

  • Target

    f471793ab6fe448751cd749a59a876107e6acadd8177e39550724a2de7d63610.exe

  • Size

    6.5MB

  • MD5

    77ed604858741f26749c73bb7a8d743d

  • SHA1

    dc4ef9aa00934e555b3ff2e337af30e65b8b90ba

  • SHA256

    f471793ab6fe448751cd749a59a876107e6acadd8177e39550724a2de7d63610

  • SHA512

    189d9e6f5d597aebcd8e6a7776b449e798ac4bb21256dafe2d400f57aa1ca5945327621bcf7cbbbda331da1220dbb908974cf05dcb64dbeaee522501a19d8630

  • SSDEEP

    196608:loCzNA7rlvRz1rrFBV6tpjuj6gYPKHCKsg:WjUtYj6gYPYp

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3140
      • C:\Users\Admin\AppData\Local\Temp\f471793ab6fe448751cd749a59a876107e6acadd8177e39550724a2de7d63610.exe
        "C:\Users\Admin\AppData\Local\Temp\f471793ab6fe448751cd749a59a876107e6acadd8177e39550724a2de7d63610.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4192
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3796
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1280
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6CB4.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4104
            • C:\Users\Admin\AppData\Local\Temp\f471793ab6fe448751cd749a59a876107e6acadd8177e39550724a2de7d63610.exe
              "C:\Users\Admin\AppData\Local\Temp\f471793ab6fe448751cd749a59a876107e6acadd8177e39550724a2de7d63610.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:4760
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops startup file
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4900
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:676
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:5048
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:436
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2932

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                  Filesize

                  258KB

                  MD5

                  9b42d2515f141ba72133781a76736bb4

                  SHA1

                  65d1df162ae4fa96151e45b327a302679e0ac69e

                  SHA256

                  9c2141e6127498e0d147e6a21813e538b56e4e37b10331a48325dcf5125d7385

                  SHA512

                  21598e1d26a36e05bea270588af62b0c2c9ba5de7c993af502b6565fb43aa8b9a2d02f5891c1d14a13c114c0d79517d864f6df008f9c4b4b6cd0d0a3d6b6518f

                • C:\Program Files\7-Zip\7z.exe

                  Filesize

                  491KB

                  MD5

                  0e855462452e2a8fb595c3b9fdaccf81

                  SHA1

                  c9fa88a45a97d4c3ca56715c8d932fa034023924

                  SHA256

                  eb484d151da686a9baaac7602faad10e1ea4801d31ec35ced62102c409f4dccf

                  SHA512

                  87a263501b199cdc70dc4a1dd6c1646d8e033a014ade9f72ef767ea539d3df86ae0122785903ee982bff68b0a5f0ca321f9e3b8ce7a7bc2bdaec524b9ab1bca3

                • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

                  Filesize

                  478KB

                  MD5

                  3eeec7dea3ac1162b9162456af69866a

                  SHA1

                  16c2834b9be250dc811786852a09b76283db9b91

                  SHA256

                  ab9c92e5c7ef90f6832d510478e4b6c1fef1e24ab6ca2410068e0d4f806a0f69

                  SHA512

                  ec4eb8441c1d64b7fde03bb4da57e562553b3db6a70096507b79c4c5be406b97ff8662cd8b14b7faef125b0ecfeda1d7d8b33a723305969ff5005c40987a37ab

                • C:\Users\Admin\AppData\Local\Temp\$$a6CB4.bat

                  Filesize

                  722B

                  MD5

                  c8cf5c47397657b801631651c0bbbf4a

                  SHA1

                  3ef6b0dc8fd183145c8b2a312647b43807f0570e

                  SHA256

                  5e9eae72958ceebb854407e931c61d2cea9f06c8460e868dc683e4ca638a9dd2

                  SHA512

                  335d9bb4d132e5066dcf3c8868f578616d5a1abf5eb154b34e2a612199f081b53e9deb8ea3e1861d6f46a97c0f91e13e69cc73994ecea039b07f30af939535e6

                • C:\Users\Admin\AppData\Local\Temp\config\chocolatey.config.4760.update

                  Filesize

                  9KB

                  MD5

                  78e591860832608ebc49dddd9fc0e1db

                  SHA1

                  d927f135f15190f95805dd8bfe6df0de20dfff53

                  SHA256

                  ccb5f71ce184e151412a8f04144011ba4da50371c20ef12778d276577f691f9a

                  SHA512

                  57f334f57f0aaba4238e7ce834784dece8e81cceae248999f1a45aa8fed0b86fe20f3d6ac6fb3649cf653e9f65f3b35695e203f1d6ed1e54e073df10fe008fc0

                • C:\Users\Admin\AppData\Local\Temp\f471793ab6fe448751cd749a59a876107e6acadd8177e39550724a2de7d63610.exe

                  Filesize

                  6.4MB

                  MD5

                  f24affc10132405930282aaeb206b7b7

                  SHA1

                  462d7a447a7d6f06bf3083c2af2f00b615c6a1a0

                  SHA256

                  abcca6f158b94303d92197bf8e6db545fe4929161e3767619176c4574ccb70fc

                  SHA512

                  c7729e3a050797b7d2c6ee07cc432c6dca56ffdb6b7e2662b1a70c90e287bbb2480a3752f262a896110f60f9ce18f884452f3cae3a06c80bef5eec476fba8cfe

                • C:\Users\Admin\AppData\Local\Temp\f471793ab6fe448751cd749a59a876107e6acadd8177e39550724a2de7d63610.exe.exe

                  Filesize

                  6.4MB

                  MD5

                  f24affc10132405930282aaeb206b7b7

                  SHA1

                  462d7a447a7d6f06bf3083c2af2f00b615c6a1a0

                  SHA256

                  abcca6f158b94303d92197bf8e6db545fe4929161e3767619176c4574ccb70fc

                  SHA512

                  c7729e3a050797b7d2c6ee07cc432c6dca56ffdb6b7e2662b1a70c90e287bbb2480a3752f262a896110f60f9ce18f884452f3cae3a06c80bef5eec476fba8cfe

                • C:\Users\Admin\AppData\Local\Temp\redirects\choco.exe

                  Filesize

                  166KB

                  MD5

                  37aa138ce5eea2786824f928cf30f170

                  SHA1

                  064e511839ab2c12afcf986e7918b742b5a88cad

                  SHA256

                  79a69cdb4fc12b1cec4916ff765eca7f6d47a7748c8c02ea997ec973ac7bed82

                  SHA512

                  26aa27f496149cd6e8140a42212cd601345565dca8830e085389a98ee2aef35f55188f8492fc9ce6fce34e5d1ba424ed2046a52bc22d864678703229f7d08341

                • C:\Users\Admin\AppData\Local\Temp\redirects\chocolatey.exe

                  Filesize

                  166KB

                  MD5

                  49f24f5e641ffabf1d93894f04e4e98a

                  SHA1

                  729af7f4bd086c2c76818e9da7d07e3576376944

                  SHA256

                  858cb349f862263f680c994b887d538cf8fa62c5cacecd279aac53a5758c277d

                  SHA512

                  aa0536661e7568affa653f64ed15ae3ef61cc83155ed9a5393817356be09eae73eca803b38d40901ba0ac7ca7531c8296870ed35e541243f8ff669ff1a022671

                • C:\Users\Admin\AppData\Local\Temp\redirects\cinst.exe

                  Filesize

                  166KB

                  MD5

                  cb731a861f60f22fdb77e414146f5c52

                  SHA1

                  3f4f2880f57b67a328f1a24a8dbf64beaff4271d

                  SHA256

                  8eedc3d8d1821b5096c7d2adc808817c7f27e4b4c19a1e7d901b024d4ccfa0fd

                  SHA512

                  4568cc8db933fd8554e991f42405b9f406c627a431eefa2db84f11a53ebfcc6fc3d421f0dfa3f6b341d99e451eb18f30610cc40ac77d2abe88f22b915aa4e038

                • C:\Users\Admin\AppData\Local\Temp\redirects\clist.exe

                  Filesize

                  166KB

                  MD5

                  5646753f4a5473cdf2aabed19402b0f4

                  SHA1

                  28a911b74c23bce09bffdce27e79237ef4a0ee47

                  SHA256

                  43de6d4435a6466c56472495c2b4cfdc85d15c7814c169a15c4b72b19e02c0c1

                  SHA512

                  a1187cf5a6af08463d44fab624d310ee321c19d4a60cd0bdbbdf86429e5a4738cdd9fae76589c900311ee5c4fba50d5ad33e67b977d02d898ace07a331f6ebbf

                • C:\Users\Admin\AppData\Local\Temp\redirects\cpack.exe

                  Filesize

                  166KB

                  MD5

                  c8a3587e6376aaa01dd70e5b09876bc7

                  SHA1

                  7c0c4327233f39bcd25fb192472261b54e29303a

                  SHA256

                  558b490507b13b46942a3a7b5f8c9835e1615a4a99759a00f1b80f7c27f54c73

                  SHA512

                  8ce91a797b136cdada480e5deaeea3e1a976417252554d232fd0594ac63a77fec984f376ef77e9da054ed03990c4e7ec877ebc0c43af716c2dadabbf77beea38

                • C:\Users\Admin\AppData\Local\Temp\redirects\cpush.exe

                  Filesize

                  166KB

                  MD5

                  67b8052122ab4e94bd482f452a922e3b

                  SHA1

                  66be9f586ee1808dd016606e0cddcc6fa632683b

                  SHA256

                  e0ee8208dfa90c459fc00589d56c196719c4662c2993505da93ce1360dce1d5e

                  SHA512

                  835077405ff0a3ec3dbddddacf91f4a4fae2ee098b1e787be46740fcfa75e4c34a42483ecbd9d7b1ce8539f86ab2d5db9f73402826a4f3dd9abde17686096932

                • C:\Users\Admin\AppData\Local\Temp\redirects\cuninst.exe

                  Filesize

                  166KB

                  MD5

                  c296c1e9bed61207b0280c844c4e1a81

                  SHA1

                  a2117864bafc20afaf405ffe5230536a4ef0dd42

                  SHA256

                  43372c8fffda574021c6f4ab1d66e6f052ccfe4e5c69cc4dba26d5d3e62e609c

                  SHA512

                  09b78848b32d65e346021c61aab27d5056a5274285eed722bec64920289151dd38264e8cbca2280e3fe3ae53cbf7524f35cbad934a346758c8e5a8a4326be917

                • C:\Users\Admin\AppData\Local\Temp\redirects\cup.exe

                  Filesize

                  166KB

                  MD5

                  c58271c43366331fb4ab55ca028bde64

                  SHA1

                  978f20d233fa83ba8384c71b81d74b12c577680f

                  SHA256

                  5ec818e3305a9ded032d400ed45cd6a955b1ae898d43d417d9d13038699338d3

                  SHA512

                  4fe6727c08da2dbf172ca5253b65281d020497c4cb28611b3468fa89a4d1d3d158b9e30490036032fb2c68dfde8bfee0d08d1eb6468491b41c46c236f4e4c5df

                • C:\Users\Admin\AppData\Local\Temp\redirects\cver.exe

                  Filesize

                  166KB

                  MD5

                  000b2829736cab26fa0298e71d82054d

                  SHA1

                  08388b1b589a33761a7fe9b248764284654a218a

                  SHA256

                  0fe143770b15607ba5bc36a447bf2f462883d3ae87fb02337741ced4adbee46c

                  SHA512

                  a9dac5c79e7825dc21e8eb385009c14230b128dfc010bbc0514406b54fa2a6a822102d83e6719ecac15ae27eb45e3d5fb15d9849c3d4e4fa16f9a1b7c94d2f31

                • C:\Users\Admin\AppData\Local\Temp\tools\7z.exe

                  Filesize

                  317KB

                  MD5

                  8a49a92e3939293445f911602492d907

                  SHA1

                  7e427565daf9496220dbe6ff5bc25ad32a266b2d

                  SHA256

                  a6389755cfa450927930aef5c04531efcfe56e7b3717f40d1de17459d3b768ba

                  SHA512

                  5431e81c1f41310ce59dde2eac3fa1cd059dd8740ff8042c3219cd1a5e2503a43dc14f94489079b7fb3ebf0e853e602a8de7ce9d3076b970b41023aa5124f25c

                • C:\Users\Admin\AppData\Local\Temp\tools\checksum.exe

                  Filesize

                  61KB

                  MD5

                  75f3c39414ff6750521933e6068fe3cc

                  SHA1

                  abe179ef760e9e68bb394a0882cb1f19b1224528

                  SHA256

                  0f8267a895f0602ad85180d9fe56e549e384a95ac9caaba076139ef38119f1a2

                  SHA512

                  e27a44691c53cb54d6cde4c9d6cb85051f1b801e2c7f11ec83910db4a361be11ecc0f4dfb77f4482807c63dab39615034df1b13c0fb1e8fd4539962e388513f8

                • C:\Users\Admin\AppData\Local\Temp\tools\shimgen.exe

                  Filesize

                  228KB

                  MD5

                  d300b63493c004813b45d8b21dd27535

                  SHA1

                  4c2abc215848fb27b3a18c5829a4b79bf5731107

                  SHA256

                  05b9e11ac705bebf06ecf46cd8863e60bcd5933650c947a1c01399b52fbe7288

                  SHA512

                  f38180852c9b94c29ed9343d984bf4ffcd40a2409ef3e44fdf6bad6d3230c52ac15b530e93ac1794c145c90d04989f89d471500ab9b07d7aa4cf9686c626a6ff

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  14c6ac5740ac8df6d17331d09112610b

                  SHA1

                  198c3fc3e017770cd1a63cd0d819815b0e37ae5c

                  SHA256

                  053a2e6929f5fb5df8628b63b6aca40394ddeda49b5cde05d7b4c3e851726c8e

                  SHA512

                  b8a629c25255b4088f523d516b56bc4bd2330630c5529336a545f2d1f5e14b1ca27a67d95729120f4c947f722861cea64891e93c00c1b47c7af1db8101e126e6

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  14c6ac5740ac8df6d17331d09112610b

                  SHA1

                  198c3fc3e017770cd1a63cd0d819815b0e37ae5c

                  SHA256

                  053a2e6929f5fb5df8628b63b6aca40394ddeda49b5cde05d7b4c3e851726c8e

                  SHA512

                  b8a629c25255b4088f523d516b56bc4bd2330630c5529336a545f2d1f5e14b1ca27a67d95729120f4c947f722861cea64891e93c00c1b47c7af1db8101e126e6

                • C:\Windows\rundl132.exe

                  Filesize

                  33KB

                  MD5

                  14c6ac5740ac8df6d17331d09112610b

                  SHA1

                  198c3fc3e017770cd1a63cd0d819815b0e37ae5c

                  SHA256

                  053a2e6929f5fb5df8628b63b6aca40394ddeda49b5cde05d7b4c3e851726c8e

                  SHA512

                  b8a629c25255b4088f523d516b56bc4bd2330630c5529336a545f2d1f5e14b1ca27a67d95729120f4c947f722861cea64891e93c00c1b47c7af1db8101e126e6

                • F:\$RECYCLE.BIN\S-1-5-21-2415528079-3794552930-4264847036-1000\_desktop.ini

                  Filesize

                  8B

                  MD5

                  621383aab05ec88688f5cce893e26550

                  SHA1

                  03967cdd69bd47cd2ccede557778546ef7c015eb

                  SHA256

                  0992c9b2d0872dece2ee570393745ccb6fbeadc2ded371a1f5406447aa872360

                  SHA512

                  085e0e3da3ad9ebb7b05ad58803f979ad4873337f91e4e0f209756ecf02b5050e33c3ad4a38212308e8beaf1f81625003f28bdc52d41cb2853e8f5a7eeb7a18b

                • memory/4192-0-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/4192-10-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/4760-20-0x000000001B8D0000-0x000000001B920000-memory.dmp

                  Filesize

                  320KB

                • memory/4760-129-0x00007FFE8C620000-0x00007FFE8D0E1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4760-26-0x000000001B950000-0x000000001B960000-memory.dmp

                  Filesize

                  64KB

                • memory/4760-25-0x00007FFE8C620000-0x00007FFE8D0E1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4760-22-0x0000000002D80000-0x0000000002D9E000-memory.dmp

                  Filesize

                  120KB

                • memory/4760-21-0x000000001B9E0000-0x000000001BA56000-memory.dmp

                  Filesize

                  472KB

                • memory/4760-14-0x00000000005F0000-0x0000000000C64000-memory.dmp

                  Filesize

                  6.5MB

                • memory/4900-131-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/4900-5352-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/4900-1804-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/4900-8-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/4900-8916-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB