Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2023, 21:52

General

  • Target

    736edb16db13681f70d047c063aa518480379be5d6a15c2d55bbe9594c3766cb.exe

  • Size

    33KB

  • MD5

    1053288a404474323acb4b767b58f30e

  • SHA1

    63c2260f2d15f80bd785b0e94553e19266e0c74e

  • SHA256

    736edb16db13681f70d047c063aa518480379be5d6a15c2d55bbe9594c3766cb

  • SHA512

    b1043e1829350ee61c45ceeeb3713381e974ed6cb25eacd3d1fe5fc8ac431f459eefddb5a90ee142dd8abfc0683eb342bd9fa1e234470eefdd42f1ec6992cd87

  • SSDEEP

    768:FdO5RroZJ76739sBWstDcVgNdb7Vis/LZ+jZ5:Fde+Zk781FNdbk+0Z5

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\736edb16db13681f70d047c063aa518480379be5d6a15c2d55bbe9594c3766cb.exe
        "C:\Users\Admin\AppData\Local\Temp\736edb16db13681f70d047c063aa518480379be5d6a15c2d55bbe9594c3766cb.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1840
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1516
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2352
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              4⤵
                PID:2672

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                Filesize

                258KB

                MD5

                702734b3bd3f28d91e1e1d5d49c3ffb9

                SHA1

                50d9c620da2e7f619b1abfda4c3f186ff2c565e0

                SHA256

                f29fbb0c4c7cc68db579d22a0dff18305c0861379540ba9576636f684e672530

                SHA512

                5640d616dfff3d39ea38498cd8b52f0f077fecb2a7263c288532ce1c9dd4fa6a3c40aba7a4458486f1914a4cde137c118c0e2ebb881f9ab32095800ba024bbff

              • C:\Program Files\7-Zip\7zG.exe

                Filesize

                601KB

                MD5

                b153ab91dec9b48f2afcb6673d593c59

                SHA1

                25c1888b3f029ab9e4703129a8a897fe60ca152b

                SHA256

                73402c55586940d2a8016c514c93aff4d737390d41eca320de713ac64f8e4ed4

                SHA512

                3d0477d4dc91f86da4e3ceeeb3122d8a14f5b74bf3a94bc34339f947f00c98948645ce7d9aff80b26ce4877ea2293a576c7b1136bb2e2f80dc20b213864469dd

              • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

                Filesize

                478KB

                MD5

                3eeec7dea3ac1162b9162456af69866a

                SHA1

                16c2834b9be250dc811786852a09b76283db9b91

                SHA256

                ab9c92e5c7ef90f6832d510478e4b6c1fef1e24ab6ca2410068e0d4f806a0f69

                SHA512

                ec4eb8441c1d64b7fde03bb4da57e562553b3db6a70096507b79c4c5be406b97ff8662cd8b14b7faef125b0ecfeda1d7d8b33a723305969ff5005c40987a37ab

              • F:\$RECYCLE.BIN\S-1-5-21-3849525425-30183055-657688904-1000\_desktop.ini

                Filesize

                8B

                MD5

                621383aab05ec88688f5cce893e26550

                SHA1

                03967cdd69bd47cd2ccede557778546ef7c015eb

                SHA256

                0992c9b2d0872dece2ee570393745ccb6fbeadc2ded371a1f5406447aa872360

                SHA512

                085e0e3da3ad9ebb7b05ad58803f979ad4873337f91e4e0f209756ecf02b5050e33c3ad4a38212308e8beaf1f81625003f28bdc52d41cb2853e8f5a7eeb7a18b

              • memory/1228-3-0x00000000029F0000-0x00000000029F1000-memory.dmp

                Filesize

                4KB

              • memory/2016-0-0x0000000000400000-0x000000000043F000-memory.dmp

                Filesize

                252KB

              • memory/2016-7-0x0000000000400000-0x000000000043F000-memory.dmp

                Filesize

                252KB

              • memory/2016-1811-0x0000000000400000-0x000000000043F000-memory.dmp

                Filesize

                252KB

              • memory/2016-4060-0x0000000000400000-0x000000000043F000-memory.dmp

                Filesize

                252KB