Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2023 10:32

General

  • Target

    d422609dee17ec0fb58cbb7109cb4f338a5a2d5acc7d06664315eac33dfffc87.exe

  • Size

    2.8MB

  • MD5

    d9bb77f8a6cd3477703344632dbe0e6e

  • SHA1

    1d0d00ed215e37ff4990a1e2367ed91c5480dbb6

  • SHA256

    d422609dee17ec0fb58cbb7109cb4f338a5a2d5acc7d06664315eac33dfffc87

  • SHA512

    b94896ac7674e0c9286a4572e244225658444f422eced07fb0ce6c4415b4511897781ffafdfdc34bd27b21556acb5eaa9c8210cfaa53a6c30c95f5ff65e77c6f

  • SSDEEP

    49152:RbBH6gLKJuMarhVnMFwTH8/giBiBcbk4ZxZ2DqFeVMhuxcPh:RbUd1XdhBiiMa7

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1236
      • C:\Users\Admin\AppData\Local\Temp\d422609dee17ec0fb58cbb7109cb4f338a5a2d5acc7d06664315eac33dfffc87.exe
        "C:\Users\Admin\AppData\Local\Temp\d422609dee17ec0fb58cbb7109cb4f338a5a2d5acc7d06664315eac33dfffc87.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2364
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2592
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a34F5.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            PID:1732
            • C:\Users\Admin\AppData\Local\Temp\d422609dee17ec0fb58cbb7109cb4f338a5a2d5acc7d06664315eac33dfffc87.exe
              "C:\Users\Admin\AppData\Local\Temp\d422609dee17ec0fb58cbb7109cb4f338a5a2d5acc7d06664315eac33dfffc87.exe"
              4⤵
              • Executes dropped EXE
              PID:2124
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2620
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2796
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:3004
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2804
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:1500

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            f6251b0a0f4704a240e3ca31482b5e56

            SHA1

            5844f7ee2cbdd585109e3e3cda401c82799a2452

            SHA256

            2ebcace74869b9a079d900a619ae9f0b0730fe8c41dacd1dfc8e9a8154bc06e9

            SHA512

            538be5fc772c9394884595b78a84e300581832691ee17116196622b83df1907d6a396afbda070560061e5a389f5224fecae6bfef7a7b35c44502249e6a0ad0c7

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            478KB

            MD5

            f5cd7b35ea5f0009cdb5355dbc356066

            SHA1

            c06af0b31cdebdc4e31d57f448acb174e5be44b7

            SHA256

            472ce6c84e17f672782a003fa17f8d412c85a25675f83d16b1a1fb7bfc085f6d

            SHA512

            89573e495959ad60f4a4079248f3cfb6991b8c700223538a269d7553baaacd6de837f26cfe1a4f6a6c0940b8d758406ae2d9e85f2e5738371c9025ea699a7d28

          • C:\Users\Admin\AppData\Local\Temp\$$a34F5.bat

            Filesize

            722B

            MD5

            541d94ec20fecc858e52239c6ca9b9e2

            SHA1

            c8c3ab1df3fc2d538f37d45c19e25cebdc31edc0

            SHA256

            4ca9c8ae72eadf9108de5021c1bac528711da3b05466cf5cb1c8384fac5e7556

            SHA512

            2601d0b99bb2d0df6920e3d929df7a1891012e5dddee1e2a9b232cfb6507701c8c8553f53308c5b6b4f4e9f8da11a3308c360599d571133b77ee50a0b48417e3

          • C:\Users\Admin\AppData\Local\Temp\$$a34F5.bat

            Filesize

            722B

            MD5

            541d94ec20fecc858e52239c6ca9b9e2

            SHA1

            c8c3ab1df3fc2d538f37d45c19e25cebdc31edc0

            SHA256

            4ca9c8ae72eadf9108de5021c1bac528711da3b05466cf5cb1c8384fac5e7556

            SHA512

            2601d0b99bb2d0df6920e3d929df7a1891012e5dddee1e2a9b232cfb6507701c8c8553f53308c5b6b4f4e9f8da11a3308c360599d571133b77ee50a0b48417e3

          • C:\Users\Admin\AppData\Local\Temp\d422609dee17ec0fb58cbb7109cb4f338a5a2d5acc7d06664315eac33dfffc87.exe

            Filesize

            2.8MB

            MD5

            095092f4e746810c5829038d48afd55a

            SHA1

            246eb3d41194dddc826049bbafeb6fc522ec044a

            SHA256

            2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

            SHA512

            7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

          • C:\Users\Admin\AppData\Local\Temp\d422609dee17ec0fb58cbb7109cb4f338a5a2d5acc7d06664315eac33dfffc87.exe.exe

            Filesize

            2.8MB

            MD5

            095092f4e746810c5829038d48afd55a

            SHA1

            246eb3d41194dddc826049bbafeb6fc522ec044a

            SHA256

            2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

            SHA512

            7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            72c95d17b62634c3b72ac389402be128

            SHA1

            7037f3eff3f040bd479df8d6a8fb584d5620a530

            SHA256

            567831ee160efa95e8869919e6d26fa9443d9fcdde2348dad4bf31d2d393c8e6

            SHA512

            da52d17c8dfc7b681e3111ff1322e9c8be8867d8cfea1f560014e72f4eccae3bbdfdf8a92e307dc487fe406c14e73c5869254e2c1e03d3acdcb15d646abbb8e4

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            72c95d17b62634c3b72ac389402be128

            SHA1

            7037f3eff3f040bd479df8d6a8fb584d5620a530

            SHA256

            567831ee160efa95e8869919e6d26fa9443d9fcdde2348dad4bf31d2d393c8e6

            SHA512

            da52d17c8dfc7b681e3111ff1322e9c8be8867d8cfea1f560014e72f4eccae3bbdfdf8a92e307dc487fe406c14e73c5869254e2c1e03d3acdcb15d646abbb8e4

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            72c95d17b62634c3b72ac389402be128

            SHA1

            7037f3eff3f040bd479df8d6a8fb584d5620a530

            SHA256

            567831ee160efa95e8869919e6d26fa9443d9fcdde2348dad4bf31d2d393c8e6

            SHA512

            da52d17c8dfc7b681e3111ff1322e9c8be8867d8cfea1f560014e72f4eccae3bbdfdf8a92e307dc487fe406c14e73c5869254e2c1e03d3acdcb15d646abbb8e4

          • C:\Windows\rundl132.exe

            Filesize

            33KB

            MD5

            72c95d17b62634c3b72ac389402be128

            SHA1

            7037f3eff3f040bd479df8d6a8fb584d5620a530

            SHA256

            567831ee160efa95e8869919e6d26fa9443d9fcdde2348dad4bf31d2d393c8e6

            SHA512

            da52d17c8dfc7b681e3111ff1322e9c8be8867d8cfea1f560014e72f4eccae3bbdfdf8a92e307dc487fe406c14e73c5869254e2c1e03d3acdcb15d646abbb8e4

          • F:\$RECYCLE.BIN\S-1-5-21-3849525425-30183055-657688904-1000\_desktop.ini

            Filesize

            9B

            MD5

            9871758f1c8c7fb518b6793d4aa66294

            SHA1

            2808f61dd22a0bf12c85bbc65326e0bfe2f7f627

            SHA256

            1f836ee8dbd13a9f1fa0f2de0976570138232addb74f0a354ed9b499191dc80d

            SHA512

            a261ec877b3ccc43db77712359d10c360a50f420fed5cf6a65fd6894d2cd5055f5b72f85edb823a1da22121955aaaa6da34550da9f825c12982602c579a6bb3d

          • \Users\Admin\AppData\Local\Temp\d422609dee17ec0fb58cbb7109cb4f338a5a2d5acc7d06664315eac33dfffc87.exe

            Filesize

            2.8MB

            MD5

            095092f4e746810c5829038d48afd55a

            SHA1

            246eb3d41194dddc826049bbafeb6fc522ec044a

            SHA256

            2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

            SHA512

            7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

          • memory/1236-28-0x0000000002A10000-0x0000000002A11000-memory.dmp

            Filesize

            4KB

          • memory/2404-16-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2404-17-0x00000000001C0000-0x00000000001FF000-memory.dmp

            Filesize

            252KB

          • memory/2404-0-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2404-12-0x00000000001C0000-0x00000000001FF000-memory.dmp

            Filesize

            252KB

          • memory/2620-32-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2620-1626-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2620-20-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2620-3800-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2620-4087-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB