Analysis

  • max time kernel
    151s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 21:23

General

  • Target

    662b4f7e55dc49967f819a68f803cbe56757fd7a74eec8dc02a1c0f8d94a8d42.exe

  • Size

    33KB

  • MD5

    adfb2896768b260bb58be742e5898c08

  • SHA1

    798c1ab25bfbe4374ef1cf0b2f016ea292be51d6

  • SHA256

    662b4f7e55dc49967f819a68f803cbe56757fd7a74eec8dc02a1c0f8d94a8d42

  • SHA512

    291486334fc702ecfb300688544d2063f615de93a4b9e368a1a1b36cfe307118842e2d967a5e99d0c847e66a0fc4e50ec667c4efe37e769093b72aef8de2c534

  • SSDEEP

    768:zjk8aGFO5RroZJ76739sBWsUx0iGZa8x6f+:zjXNe+Zk78MHG76f

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\662b4f7e55dc49967f819a68f803cbe56757fd7a74eec8dc02a1c0f8d94a8d42.exe
        "C:\Users\Admin\AppData\Local\Temp\662b4f7e55dc49967f819a68f803cbe56757fd7a74eec8dc02a1c0f8d94a8d42.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2964
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2024
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2224
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              4⤵
                PID:2040

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\7-Zip\7zG.exe

          Filesize

          601KB

          MD5

          591646abc341847aa6042581dbfa8160

          SHA1

          017337cad3ef14c7b4ed9266eb2113c0e5dd056d

          SHA256

          c4e60605eb109a937d90b8183c9292125dc5475cccb7a655372924c02c63b9d6

          SHA512

          f619463af33b7f2bfb91d59fe6d87596ed9ad38c9af904e939d60cac2c3dbd3c2ef37f517afd9b303bb72d295e3ca93df9630e2711b06c24da9537ebe0cbf285

        • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

          Filesize

          478KB

          MD5

          3c4e379d66eccfbb03a1e544b34e67bb

          SHA1

          50e7e23a3c9dca8dcaffb07e3b887c709c8028f8

          SHA256

          11b20f2f73989bae710405c1d740ac3de82ec715b985836e2452a0ceb1562255

          SHA512

          e4aa10b35242333e183cf8043d43fe1ed65acdfc600e9d7b20644d678c13b910abfca13acb88e456397868b6c7b7bace040447ea116413364f7ed06013bd1229

        • F:\$RECYCLE.BIN\S-1-5-21-86725733-3001458681-3405935542-1000\_desktop.ini

          Filesize

          10B

          MD5

          dbf19ca54500e964528b156763234c1d

          SHA1

          05376f86423aec8badf0adbc47887234ac83ef5a

          SHA256

          bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae

          SHA512

          fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0

        • memory/1232-3-0x0000000002990000-0x0000000002991000-memory.dmp

          Filesize

          4KB

        • memory/2900-0-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2900-7-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2900-1263-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2900-3740-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2900-4059-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB