Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2023, 06:29

General

  • Target

    9ce761bc2e96d0905e74779ff922b8bcd5dab9ced3dec1b87cd007edf45e5b74.exe

  • Size

    2.8MB

  • MD5

    005a27bd5ce50371dbd5d14ee5c6a1eb

  • SHA1

    37589c7c4dc92100294c11e0d55c5f2be9968843

  • SHA256

    9ce761bc2e96d0905e74779ff922b8bcd5dab9ced3dec1b87cd007edf45e5b74

  • SHA512

    0cbb66b956554e7550b5202b7af7508217302602ce6b42c75bfeee36ab084c189186c63876520f64a9273530d0190d88c81bd9d597d50ed408581186d208bc79

  • SSDEEP

    49152:xBc6gLKJuMarhVnMFwTH8/giBiBcbk4ZxZ2DqFeVMhuxcPh:x/d1XdhBiiMa7

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\9ce761bc2e96d0905e74779ff922b8bcd5dab9ced3dec1b87cd007edf45e5b74.exe
        "C:\Users\Admin\AppData\Local\Temp\9ce761bc2e96d0905e74779ff922b8bcd5dab9ced3dec1b87cd007edf45e5b74.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2700
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2000
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a39E5.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            PID:2908
            • C:\Users\Admin\AppData\Local\Temp\9ce761bc2e96d0905e74779ff922b8bcd5dab9ced3dec1b87cd007edf45e5b74.exe
              "C:\Users\Admin\AppData\Local\Temp\9ce761bc2e96d0905e74779ff922b8bcd5dab9ced3dec1b87cd007edf45e5b74.exe"
              4⤵
              • Executes dropped EXE
              PID:2856
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2624
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2892
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2540
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2672
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2500

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                  Filesize

                  258KB

                  MD5

                  9ed9144a231b9f2f3d0025239e861e1b

                  SHA1

                  a24884d540210da1f10e13d6b23065d1ec46fbd4

                  SHA256

                  0d83ed96ccffac5845e3be2cdcd076cdce2aa65f96f7c61d53fb8f9135947a68

                  SHA512

                  3da555c45d7f2c3c3d01c5fccfb6ac2a95b691f78721f5faf16c788f20e02c859fc5d68f02c7f239a11157ffa214326faa891ead1628657a5053a6921da3b9e8

                • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

                  Filesize

                  478KB

                  MD5

                  3cf6baf3fb3290ce7ddf53d5b84de7d3

                  SHA1

                  a76b920a92d231ebc74b28b4eee8d089de240687

                  SHA256

                  6b1d406e4f06b5d9d8b9fd912970d6fed4a6a497eec84cc1ec6a018c3dc45aab

                  SHA512

                  7d8d3d4c9d4029d7a01e2bd8f0d03419f78c84679eaf4b7b02f02b3496dbd84406faf4c19b7bd4b546e1701f829ae7af9f8b26feaed5794be60a46eb9da9f3f5

                • C:\Users\Admin\AppData\Local\Temp\$$a39E5.bat

                  Filesize

                  722B

                  MD5

                  8a7e33f3dff539f2479a7fea1856095c

                  SHA1

                  2c4944086301427c48ddb871dcff336c7882c7c2

                  SHA256

                  c5800bf784ffa80eff4ddfc03dc663596fe57c744e5fe794c1aebfa1bb031cc1

                  SHA512

                  facc1523bc9a05dcec89faf0eea8b74e313120d96df76b2d85d4ba6e7d8f8536ab1cfa4a6d2786f603c7ece4a4201d2f9b61ed7a955cc36d8720367e6fc6ac09

                • C:\Users\Admin\AppData\Local\Temp\$$a39E5.bat

                  Filesize

                  722B

                  MD5

                  8a7e33f3dff539f2479a7fea1856095c

                  SHA1

                  2c4944086301427c48ddb871dcff336c7882c7c2

                  SHA256

                  c5800bf784ffa80eff4ddfc03dc663596fe57c744e5fe794c1aebfa1bb031cc1

                  SHA512

                  facc1523bc9a05dcec89faf0eea8b74e313120d96df76b2d85d4ba6e7d8f8536ab1cfa4a6d2786f603c7ece4a4201d2f9b61ed7a955cc36d8720367e6fc6ac09

                • C:\Users\Admin\AppData\Local\Temp\9ce761bc2e96d0905e74779ff922b8bcd5dab9ced3dec1b87cd007edf45e5b74.exe

                  Filesize

                  2.8MB

                  MD5

                  095092f4e746810c5829038d48afd55a

                  SHA1

                  246eb3d41194dddc826049bbafeb6fc522ec044a

                  SHA256

                  2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

                  SHA512

                  7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

                • C:\Users\Admin\AppData\Local\Temp\9ce761bc2e96d0905e74779ff922b8bcd5dab9ced3dec1b87cd007edf45e5b74.exe.exe

                  Filesize

                  2.8MB

                  MD5

                  095092f4e746810c5829038d48afd55a

                  SHA1

                  246eb3d41194dddc826049bbafeb6fc522ec044a

                  SHA256

                  2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

                  SHA512

                  7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  667d6ac5f996c012706645d8d5cd7630

                  SHA1

                  bcef6a10572d9536ebed0ee13d9c9ec21a1ac642

                  SHA256

                  cc5c59753bcc07b1a1a42aa0800c9b78a8fc33eb5cf51915c02e8211b58afaf3

                  SHA512

                  160e5ac38e78a8d7dcaaac148e6042e004cf66fdbfeeafb5eabc5742903e0259d6b87c8bf7f39481f9964ebfce8fe4c80a7e3c4f5108480bfc44c137d6560ac9

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  667d6ac5f996c012706645d8d5cd7630

                  SHA1

                  bcef6a10572d9536ebed0ee13d9c9ec21a1ac642

                  SHA256

                  cc5c59753bcc07b1a1a42aa0800c9b78a8fc33eb5cf51915c02e8211b58afaf3

                  SHA512

                  160e5ac38e78a8d7dcaaac148e6042e004cf66fdbfeeafb5eabc5742903e0259d6b87c8bf7f39481f9964ebfce8fe4c80a7e3c4f5108480bfc44c137d6560ac9

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  667d6ac5f996c012706645d8d5cd7630

                  SHA1

                  bcef6a10572d9536ebed0ee13d9c9ec21a1ac642

                  SHA256

                  cc5c59753bcc07b1a1a42aa0800c9b78a8fc33eb5cf51915c02e8211b58afaf3

                  SHA512

                  160e5ac38e78a8d7dcaaac148e6042e004cf66fdbfeeafb5eabc5742903e0259d6b87c8bf7f39481f9964ebfce8fe4c80a7e3c4f5108480bfc44c137d6560ac9

                • C:\Windows\rundl132.exe

                  Filesize

                  33KB

                  MD5

                  667d6ac5f996c012706645d8d5cd7630

                  SHA1

                  bcef6a10572d9536ebed0ee13d9c9ec21a1ac642

                  SHA256

                  cc5c59753bcc07b1a1a42aa0800c9b78a8fc33eb5cf51915c02e8211b58afaf3

                  SHA512

                  160e5ac38e78a8d7dcaaac148e6042e004cf66fdbfeeafb5eabc5742903e0259d6b87c8bf7f39481f9964ebfce8fe4c80a7e3c4f5108480bfc44c137d6560ac9

                • F:\$RECYCLE.BIN\S-1-5-21-2180306848-1874213455-4093218721-1000\_desktop.ini

                  Filesize

                  9B

                  MD5

                  e31f26ace63b9ef3f174ef105e914ab9

                  SHA1

                  fd184b0b2c4bf79603dacd3a8bf67765067fb504

                  SHA256

                  c9570eeb8b3428f1e92641d2a8ac6b227bbd6700b9ef1e9caad6b57f14b12a24

                  SHA512

                  4f6169e89d74f0273f07c5b484490ae64321ea1f5ff7112d24aba1628fddc3a308d8443501b957e6f49270408623598604f08c99f2411b94210093a4c01e7a64

                • \Users\Admin\AppData\Local\Temp\9ce761bc2e96d0905e74779ff922b8bcd5dab9ced3dec1b87cd007edf45e5b74.exe

                  Filesize

                  2.8MB

                  MD5

                  095092f4e746810c5829038d48afd55a

                  SHA1

                  246eb3d41194dddc826049bbafeb6fc522ec044a

                  SHA256

                  2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

                  SHA512

                  7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

                • memory/1260-28-0x0000000002AD0000-0x0000000002AD1000-memory.dmp

                  Filesize

                  4KB

                • memory/2156-16-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/2156-0-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/2156-17-0x0000000000250000-0x000000000028F000-memory.dmp

                  Filesize

                  252KB

                • memory/2156-12-0x0000000000250000-0x000000000028F000-memory.dmp

                  Filesize

                  252KB

                • memory/2624-20-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/2624-32-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/2624-1334-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/2624-3920-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB

                • memory/2624-4087-0x0000000000400000-0x000000000043F000-memory.dmp

                  Filesize

                  252KB