Analysis

  • max time kernel
    171s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 21:14

General

  • Target

    e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe

  • Size

    42KB

  • MD5

    e6318e595a46b716c48b7b3f84739ae4

  • SHA1

    90f6ea97ee3387e48dc842007aea419a316361f7

  • SHA256

    e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3

  • SHA512

    65fb03ae6cb1490c3dffbea2ad474ee716dc3de57e3ca2a3e071f2fad1314adbf3a5dcb781f35ae0bc081f97ffc2105270771d10d21c3472b2600574f0525d74

  • SSDEEP

    768:2HE8nWWCO5RroZJ767395uINbaNslPX4S8bKvN1dvcapv:2gWCe+Zk77RN++t4SMKvLJcapv

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe
    "C:\Users\Admin\AppData\Local\Temp\e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
        3⤵
          PID:2652
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\$$aCF31.bat
        2⤵
        • Deletes itself
        PID:2788
        • C:\Users\Admin\AppData\Local\Temp\e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe
          "C:\Users\Admin\AppData\Local\Temp\e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe"
          3⤵
          • Executes dropped EXE
          PID:2572
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2552
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2692
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2528
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              4⤵
                PID:2584
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          1⤵
            PID:1208

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            9167909746eae54d5868f53c6631d51a

            SHA1

            55e3ac9c374df3988e4fb729a8e39333d3076170

            SHA256

            afc121a3782b3a7d195338db3fe0fbec67d7da2535848c00d422bc57ca3d30c6

            SHA512

            a3f0426f4e861ce6cea77fc285be08ffd6a2b4e94cb0127ee9b9da84a1c98851e682b09f39c143ce135e720127399bf4d509eff0a2e63afb0ce6f99cbeee66f0

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            478KB

            MD5

            0103e4e667ef6e0730fbb6b6818bf26d

            SHA1

            ae943838d127feddda83878c288c3f1e5b93788a

            SHA256

            39d7092d9c989aabd788973439c8d020c8133ee4b8f2aecbb9140538944e48f0

            SHA512

            3a20644a94baaf11b55a91e61847b8c98a7bd6b120057273b2795c10f03528a2dff07d72deeecedb4d2ab6ddec793350a3c257928c63474179c1675360b93fc0

          • C:\Users\Admin\AppData\Local\Temp\$$aCF31.bat

            Filesize

            722B

            MD5

            7f5cdd663a3392756794a88c4bcc1a07

            SHA1

            bb2f50b211963a395cad68625095be99e289f91d

            SHA256

            cda28e05bc8101e18a9aa7e9e43c78418fc78e78c3d68899f3c62af8cb499590

            SHA512

            8bfa1f83ffb1548dd4306efd03da9ed5dc21591c24319bb9acb676198922f280ac5bc36a17ced727ffe184a0605454b7ab47e59cfafa6995a9d0355f355a9f75

          • C:\Users\Admin\AppData\Local\Temp\$$aCF31.bat

            Filesize

            722B

            MD5

            7f5cdd663a3392756794a88c4bcc1a07

            SHA1

            bb2f50b211963a395cad68625095be99e289f91d

            SHA256

            cda28e05bc8101e18a9aa7e9e43c78418fc78e78c3d68899f3c62af8cb499590

            SHA512

            8bfa1f83ffb1548dd4306efd03da9ed5dc21591c24319bb9acb676198922f280ac5bc36a17ced727ffe184a0605454b7ab47e59cfafa6995a9d0355f355a9f75

          • C:\Users\Admin\AppData\Local\Temp\e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe

            Filesize

            9KB

            MD5

            a41e142c613abccee18813a278e5d5d6

            SHA1

            c3dea82585853aae09925a2f7f0ce5b1cf04a8cb

            SHA256

            95fffc884b262d4018f2a40f5b4501aacc0597835c5a08ce0ef5a6dcab8ead83

            SHA512

            7fb6f62d1a8fc9da9721a7634456c62c56c29f1b10c6c0ad9d674a897617a5d260285336d472b9ccaf93af1628cfce9b1a1f1608a9361b10ba2500f2625550d7

          • C:\Users\Admin\AppData\Local\Temp\e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe.exe

            Filesize

            9KB

            MD5

            a41e142c613abccee18813a278e5d5d6

            SHA1

            c3dea82585853aae09925a2f7f0ce5b1cf04a8cb

            SHA256

            95fffc884b262d4018f2a40f5b4501aacc0597835c5a08ce0ef5a6dcab8ead83

            SHA512

            7fb6f62d1a8fc9da9721a7634456c62c56c29f1b10c6c0ad9d674a897617a5d260285336d472b9ccaf93af1628cfce9b1a1f1608a9361b10ba2500f2625550d7

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            b2511b7b7c8b4fc7d7bac2c9b9ace13c

            SHA1

            c0d005699ef04c5c00ae266b10e62de260095366

            SHA256

            c1588d8f94eb13025204edd948fd62b803c4412a7da246bb232cb6bc4d8640c2

            SHA512

            669eeb4db8252baae0cfbd59a5175b33e236bcdab232d8379877ebf4bba7dc99e9b0fa18a64b9bb2b71dacbf9beee297890081ce89f4ad35071b2983ebe39e68

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            b2511b7b7c8b4fc7d7bac2c9b9ace13c

            SHA1

            c0d005699ef04c5c00ae266b10e62de260095366

            SHA256

            c1588d8f94eb13025204edd948fd62b803c4412a7da246bb232cb6bc4d8640c2

            SHA512

            669eeb4db8252baae0cfbd59a5175b33e236bcdab232d8379877ebf4bba7dc99e9b0fa18a64b9bb2b71dacbf9beee297890081ce89f4ad35071b2983ebe39e68

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            b2511b7b7c8b4fc7d7bac2c9b9ace13c

            SHA1

            c0d005699ef04c5c00ae266b10e62de260095366

            SHA256

            c1588d8f94eb13025204edd948fd62b803c4412a7da246bb232cb6bc4d8640c2

            SHA512

            669eeb4db8252baae0cfbd59a5175b33e236bcdab232d8379877ebf4bba7dc99e9b0fa18a64b9bb2b71dacbf9beee297890081ce89f4ad35071b2983ebe39e68

          • C:\Windows\rundl132.exe

            Filesize

            33KB

            MD5

            b2511b7b7c8b4fc7d7bac2c9b9ace13c

            SHA1

            c0d005699ef04c5c00ae266b10e62de260095366

            SHA256

            c1588d8f94eb13025204edd948fd62b803c4412a7da246bb232cb6bc4d8640c2

            SHA512

            669eeb4db8252baae0cfbd59a5175b33e236bcdab232d8379877ebf4bba7dc99e9b0fa18a64b9bb2b71dacbf9beee297890081ce89f4ad35071b2983ebe39e68

          • F:\$RECYCLE.BIN\S-1-5-21-3750544865-3773649541-1858556521-1000\_desktop.ini

            Filesize

            10B

            MD5

            f72d794bbb322d5865b8074038cb8900

            SHA1

            9e6e5d1e3714686f86670ef6b5a8810d9bb04e44

            SHA256

            0a4ac5e7118bf826da89694e99e1334547e87fa7608a0e7c83df379d8cd04aa6

            SHA512

            12992cc499ce1dbb2641a279ce148111e4da49be595af37fb58bdb3870effa7bb81b720df0faf420500ab9ea52a791b425ba77fd1a4547ef3e0665a199ba4cea

          • memory/1208-27-0x0000000002D40000-0x0000000002D41000-memory.dmp

            Filesize

            4KB

          • memory/2308-1403-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2308-20-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2308-31-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2308-44-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2308-1354-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2308-1434-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2308-2982-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2308-3020-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2308-4093-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/3060-12-0x0000000000230000-0x000000000026F000-memory.dmp

            Filesize

            252KB

          • memory/3060-0-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/3060-16-0x0000000000230000-0x000000000026F000-memory.dmp

            Filesize

            252KB

          • memory/3060-19-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB