Analysis

  • max time kernel
    151s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 09:00

General

  • Target

    50c91762adc926ff140b35a41109b43216d79972722a13595daad0e50fb7a9b8.exe

  • Size

    589KB

  • MD5

    5bfacba4f27258577f3abb48dc8250b6

  • SHA1

    555d901c24571df6423d87b24c21020e187e298e

  • SHA256

    50c91762adc926ff140b35a41109b43216d79972722a13595daad0e50fb7a9b8

  • SHA512

    29be4467025407f5a77bf98212df977d69fd29a7d9b0addeb91b6c96989b6303fa894ea66e7bf50b0700dd2734b508ab6bf147331b7a737b655139bd88b3cce9

  • SSDEEP

    12288:++azbvrpNWz8beHITmTmbA4yrRGsR5A5lcwFhpto/cT9aRzS:+BzbDpC/mbANrr5MiwFhDoET9t

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\50c91762adc926ff140b35a41109b43216d79972722a13595daad0e50fb7a9b8.exe
        "C:\Users\Admin\AppData\Local\Temp\50c91762adc926ff140b35a41109b43216d79972722a13595daad0e50fb7a9b8.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1196
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2420
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:3052
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a9C9D.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:3036
            • C:\Users\Admin\AppData\Local\Temp\50c91762adc926ff140b35a41109b43216d79972722a13595daad0e50fb7a9b8.exe
              "C:\Users\Admin\AppData\Local\Temp\50c91762adc926ff140b35a41109b43216d79972722a13595daad0e50fb7a9b8.exe"
              4⤵
              • Executes dropped EXE
              PID:2656
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2288
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2652
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2776
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2884
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2672

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                  Filesize

                  264KB

                  MD5

                  eec3025e8fba0f60cd2df8bed25bb7cb

                  SHA1

                  b89021d075a25b6b4006cdf3b2c32ef6424c609d

                  SHA256

                  d832dea17882afe6d9ccb23a1462f1e9228ffb25ce148e85a62a6fbc7df5f9ae

                  SHA512

                  08aa80e1570488d02fd412980c2d8c3764240219cefb2aaf03a15b858cecee3b8e74013d12cce98de032ac89c58ad48dde083feed433a9e0c7c6e96f8d0a9058

                • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

                  Filesize

                  484KB

                  MD5

                  e1d44503bd78f76397106dd8751c33da

                  SHA1

                  adb60486590c24d54f43ca6b7ec7fd8d64ff16fe

                  SHA256

                  792791d8023b6fe39fb3f7519f0c31ee22a4accb61f6b824143a2d066ef32c44

                  SHA512

                  a7cf931af36db667493710b50898eed4fa34cafa48686cb2c4ac6f1248d7b4907dacbd6f2df7d699b521d13304d70fb078b80305d8a815c0a566b502c42e739d

                • C:\Users\Admin\AppData\Local\Temp\$$a9C9D.bat

                  Filesize

                  722B

                  MD5

                  49e6a796772a01b0781cbeb926893053

                  SHA1

                  a07f8d61a5e741ca445894ba3442c3eb9380f6b8

                  SHA256

                  ee3d222ddb60784784a099532f578e6314793bce07c6f98da46933e877223b5e

                  SHA512

                  f5f6738381d36ce932cb5b0d42e4437e40c53ce85a987da8a2859dd5ae771f5b79f300a70be519cf51c2d2832f7e2557990e5e49ca2a33b07bb2994640a4d964

                • C:\Users\Admin\AppData\Local\Temp\$$a9C9D.bat

                  Filesize

                  722B

                  MD5

                  49e6a796772a01b0781cbeb926893053

                  SHA1

                  a07f8d61a5e741ca445894ba3442c3eb9380f6b8

                  SHA256

                  ee3d222ddb60784784a099532f578e6314793bce07c6f98da46933e877223b5e

                  SHA512

                  f5f6738381d36ce932cb5b0d42e4437e40c53ce85a987da8a2859dd5ae771f5b79f300a70be519cf51c2d2832f7e2557990e5e49ca2a33b07bb2994640a4d964

                • C:\Users\Admin\AppData\Local\Temp\50c91762adc926ff140b35a41109b43216d79972722a13595daad0e50fb7a9b8.exe

                  Filesize

                  549KB

                  MD5

                  520a6d1cbcc9cf642c625fe814c93c58

                  SHA1

                  fb517abb38e9ccc67de411d4f18a9446c11c0923

                  SHA256

                  08966ce743aa1cbed0874933e104ef7b913188ecd8f0c679f7d8378516c51da2

                  SHA512

                  b92a32b27d6e6187c30d8018d7e0a35bde98dc524eabcd7709420b499778159e2872db04a3f2dfacf016d0e6d97b8175920e83fa28804609786828e52f058ff0

                • C:\Users\Admin\AppData\Local\Temp\50c91762adc926ff140b35a41109b43216d79972722a13595daad0e50fb7a9b8.exe.exe

                  Filesize

                  549KB

                  MD5

                  520a6d1cbcc9cf642c625fe814c93c58

                  SHA1

                  fb517abb38e9ccc67de411d4f18a9446c11c0923

                  SHA256

                  08966ce743aa1cbed0874933e104ef7b913188ecd8f0c679f7d8378516c51da2

                  SHA512

                  b92a32b27d6e6187c30d8018d7e0a35bde98dc524eabcd7709420b499778159e2872db04a3f2dfacf016d0e6d97b8175920e83fa28804609786828e52f058ff0

                • C:\Windows\Logo1_.exe

                  Filesize

                  39KB

                  MD5

                  4ba0d981b9715929915fe6adeea07a0c

                  SHA1

                  3628490237cf809be1570c550a4d39f4a8718653

                  SHA256

                  3c5aa0597f1e6431465c4a2513d459e13947b91a466290dc312fd7f3ee1a0b61

                  SHA512

                  e42c3511f2580f1f9f40d3acd58ac7c0c68498a33707f0c097f0e45cdb3ba05b5932d3662341bc8030f62ed28c68c7dcde7906b09eeb48b108372ab3fd48e13c

                • C:\Windows\Logo1_.exe

                  Filesize

                  39KB

                  MD5

                  4ba0d981b9715929915fe6adeea07a0c

                  SHA1

                  3628490237cf809be1570c550a4d39f4a8718653

                  SHA256

                  3c5aa0597f1e6431465c4a2513d459e13947b91a466290dc312fd7f3ee1a0b61

                  SHA512

                  e42c3511f2580f1f9f40d3acd58ac7c0c68498a33707f0c097f0e45cdb3ba05b5932d3662341bc8030f62ed28c68c7dcde7906b09eeb48b108372ab3fd48e13c

                • C:\Windows\Logo1_.exe

                  Filesize

                  39KB

                  MD5

                  4ba0d981b9715929915fe6adeea07a0c

                  SHA1

                  3628490237cf809be1570c550a4d39f4a8718653

                  SHA256

                  3c5aa0597f1e6431465c4a2513d459e13947b91a466290dc312fd7f3ee1a0b61

                  SHA512

                  e42c3511f2580f1f9f40d3acd58ac7c0c68498a33707f0c097f0e45cdb3ba05b5932d3662341bc8030f62ed28c68c7dcde7906b09eeb48b108372ab3fd48e13c

                • C:\Windows\rundl132.exe

                  Filesize

                  39KB

                  MD5

                  4ba0d981b9715929915fe6adeea07a0c

                  SHA1

                  3628490237cf809be1570c550a4d39f4a8718653

                  SHA256

                  3c5aa0597f1e6431465c4a2513d459e13947b91a466290dc312fd7f3ee1a0b61

                  SHA512

                  e42c3511f2580f1f9f40d3acd58ac7c0c68498a33707f0c097f0e45cdb3ba05b5932d3662341bc8030f62ed28c68c7dcde7906b09eeb48b108372ab3fd48e13c

                • F:\$RECYCLE.BIN\S-1-5-21-86725733-3001458681-3405935542-1000\_desktop.ini

                  Filesize

                  10B

                  MD5

                  81570c50286369016cef7a9f904c4b04

                  SHA1

                  b5758b23667cb35cad0adb23371b830fcee4f4e5

                  SHA256

                  b882f41a5c84d248a75714eaf215a9e363a49361b6a14beedb921ee3dfdb46a1

                  SHA512

                  0e6c479b0252e24635810b7d030cc9b5b17603ee20ccf62812446b8d15884521c6c7be65dfc0090bb1502e859fae27c2a63b3e58be714021f473a88407982162

                • \Users\Admin\AppData\Local\Temp\50c91762adc926ff140b35a41109b43216d79972722a13595daad0e50fb7a9b8.exe

                  Filesize

                  549KB

                  MD5

                  520a6d1cbcc9cf642c625fe814c93c58

                  SHA1

                  fb517abb38e9ccc67de411d4f18a9446c11c0923

                  SHA256

                  08966ce743aa1cbed0874933e104ef7b913188ecd8f0c679f7d8378516c51da2

                  SHA512

                  b92a32b27d6e6187c30d8018d7e0a35bde98dc524eabcd7709420b499778159e2872db04a3f2dfacf016d0e6d97b8175920e83fa28804609786828e52f058ff0

                • memory/1196-0-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/1196-12-0x00000000002C0000-0x00000000002FD000-memory.dmp

                  Filesize

                  244KB

                • memory/1196-17-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/1196-18-0x00000000002C0000-0x00000000002FD000-memory.dmp

                  Filesize

                  244KB

                • memory/1200-27-0x0000000002A40000-0x0000000002A41000-memory.dmp

                  Filesize

                  4KB

                • memory/2288-31-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2288-1377-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2288-3324-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2288-4085-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB