Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 21:14

General

  • Target

    e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe

  • Size

    42KB

  • MD5

    e6318e595a46b716c48b7b3f84739ae4

  • SHA1

    90f6ea97ee3387e48dc842007aea419a316361f7

  • SHA256

    e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3

  • SHA512

    65fb03ae6cb1490c3dffbea2ad474ee716dc3de57e3ca2a3e071f2fad1314adbf3a5dcb781f35ae0bc081f97ffc2105270771d10d21c3472b2600574f0525d74

  • SSDEEP

    768:2HE8nWWCO5RroZJ767395uINbaNslPX4S8bKvN1dvcapv:2gWCe+Zk77RN++t4SMKvLJcapv

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe
    "C:\Users\Admin\AppData\Local\Temp\e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\SysWOW64\net.exe
      net stop "Kingsoft AntiVirus Service"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
        3⤵
          PID:4612
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a72CE.bat
        2⤵
          PID:4972
          • C:\Users\Admin\AppData\Local\Temp\e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe
            "C:\Users\Admin\AppData\Local\Temp\e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe"
            3⤵
            • Executes dropped EXE
            PID:4996
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          2⤵
          • Drops startup file
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2032
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2796
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              4⤵
                PID:3420
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1284
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                4⤵
                  PID:4928
          • C:\Windows\Explorer.EXE
            C:\Windows\Explorer.EXE
            1⤵
              PID:776

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              258KB

              MD5

              9167909746eae54d5868f53c6631d51a

              SHA1

              55e3ac9c374df3988e4fb729a8e39333d3076170

              SHA256

              afc121a3782b3a7d195338db3fe0fbec67d7da2535848c00d422bc57ca3d30c6

              SHA512

              a3f0426f4e861ce6cea77fc285be08ffd6a2b4e94cb0127ee9b9da84a1c98851e682b09f39c143ce135e720127399bf4d509eff0a2e63afb0ce6f99cbeee66f0

            • C:\Program Files\SearchRestart.exe

              Filesize

              578KB

              MD5

              8745478869246ea3e31cac95b35b62bf

              SHA1

              5f4eaf6cc2c92f392be656a8d2b1c4b7b10a4c33

              SHA256

              759710b8a2f26e7378e20927b2d676bb6fe8b72b5e687b6db3f0dc94a5ef4e0e

              SHA512

              2b3a23d9952af464eece105b9c1f42d48e59732a4669598da34c0835804051fa3e16654b325508ca1e01f8646d9922fe4546375bec506f6198c68d9e98c1ac78

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              478KB

              MD5

              0103e4e667ef6e0730fbb6b6818bf26d

              SHA1

              ae943838d127feddda83878c288c3f1e5b93788a

              SHA256

              39d7092d9c989aabd788973439c8d020c8133ee4b8f2aecbb9140538944e48f0

              SHA512

              3a20644a94baaf11b55a91e61847b8c98a7bd6b120057273b2795c10f03528a2dff07d72deeecedb4d2ab6ddec793350a3c257928c63474179c1675360b93fc0

            • C:\Users\Admin\AppData\Local\Temp\$$a72CE.bat

              Filesize

              722B

              MD5

              df66f59ddcea0367af7b8d45835654e5

              SHA1

              b0cd336068ec62768f5e0aae3d380f15d47a4501

              SHA256

              7fc1489ae0dc92396230951e9e8957a81eb6a0642215830bb43fd8ba601eff3a

              SHA512

              affac9945277096483b0e85d70a1088f49f6bc4898fda9347666b4814e2e47eb5e14bbcd0d88411be7470aa4b79611deea0ba94f5bf5ddc6e620b135a8cb3a48

            • C:\Users\Admin\AppData\Local\Temp\e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe

              Filesize

              9KB

              MD5

              a41e142c613abccee18813a278e5d5d6

              SHA1

              c3dea82585853aae09925a2f7f0ce5b1cf04a8cb

              SHA256

              95fffc884b262d4018f2a40f5b4501aacc0597835c5a08ce0ef5a6dcab8ead83

              SHA512

              7fb6f62d1a8fc9da9721a7634456c62c56c29f1b10c6c0ad9d674a897617a5d260285336d472b9ccaf93af1628cfce9b1a1f1608a9361b10ba2500f2625550d7

            • C:\Users\Admin\AppData\Local\Temp\e2b52929d758b8ea0310d63ef826f0593326662817e531e2b4470c5a022e4ac3.exe.exe

              Filesize

              9KB

              MD5

              a41e142c613abccee18813a278e5d5d6

              SHA1

              c3dea82585853aae09925a2f7f0ce5b1cf04a8cb

              SHA256

              95fffc884b262d4018f2a40f5b4501aacc0597835c5a08ce0ef5a6dcab8ead83

              SHA512

              7fb6f62d1a8fc9da9721a7634456c62c56c29f1b10c6c0ad9d674a897617a5d260285336d472b9ccaf93af1628cfce9b1a1f1608a9361b10ba2500f2625550d7

            • C:\Windows\Logo1_.exe

              Filesize

              33KB

              MD5

              b2511b7b7c8b4fc7d7bac2c9b9ace13c

              SHA1

              c0d005699ef04c5c00ae266b10e62de260095366

              SHA256

              c1588d8f94eb13025204edd948fd62b803c4412a7da246bb232cb6bc4d8640c2

              SHA512

              669eeb4db8252baae0cfbd59a5175b33e236bcdab232d8379877ebf4bba7dc99e9b0fa18a64b9bb2b71dacbf9beee297890081ce89f4ad35071b2983ebe39e68

            • C:\Windows\Logo1_.exe

              Filesize

              33KB

              MD5

              b2511b7b7c8b4fc7d7bac2c9b9ace13c

              SHA1

              c0d005699ef04c5c00ae266b10e62de260095366

              SHA256

              c1588d8f94eb13025204edd948fd62b803c4412a7da246bb232cb6bc4d8640c2

              SHA512

              669eeb4db8252baae0cfbd59a5175b33e236bcdab232d8379877ebf4bba7dc99e9b0fa18a64b9bb2b71dacbf9beee297890081ce89f4ad35071b2983ebe39e68

            • C:\Windows\rundl132.exe

              Filesize

              33KB

              MD5

              b2511b7b7c8b4fc7d7bac2c9b9ace13c

              SHA1

              c0d005699ef04c5c00ae266b10e62de260095366

              SHA256

              c1588d8f94eb13025204edd948fd62b803c4412a7da246bb232cb6bc4d8640c2

              SHA512

              669eeb4db8252baae0cfbd59a5175b33e236bcdab232d8379877ebf4bba7dc99e9b0fa18a64b9bb2b71dacbf9beee297890081ce89f4ad35071b2983ebe39e68

            • F:\$RECYCLE.BIN\S-1-5-21-2890696111-2332180956-3312704074-1000\_desktop.ini

              Filesize

              10B

              MD5

              f72d794bbb322d5865b8074038cb8900

              SHA1

              9e6e5d1e3714686f86670ef6b5a8810d9bb04e44

              SHA256

              0a4ac5e7118bf826da89694e99e1334547e87fa7608a0e7c83df379d8cd04aa6

              SHA512

              12992cc499ce1dbb2641a279ce148111e4da49be595af37fb58bdb3870effa7bb81b720df0faf420500ab9ea52a791b425ba77fd1a4547ef3e0665a199ba4cea

            • memory/2032-5673-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2032-10-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2032-342-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2032-2628-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2032-3956-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2032-5660-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2032-17-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2032-6156-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2032-6652-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2032-6656-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2860-9-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2860-0-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB