Analysis

  • max time kernel
    151s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 03:54

General

  • Target

    14482b66be2080c441eb83af76a9672f7bc15a2721a39d7f67fbcc52909f871f.exe

  • Size

    56KB

  • MD5

    4d63ccaed3ecd4bd820452add3e0bb1d

  • SHA1

    41752761a308bb0519054c595d6eb031fbbacb03

  • SHA256

    14482b66be2080c441eb83af76a9672f7bc15a2721a39d7f67fbcc52909f871f

  • SHA512

    23b4dd037077f3e5cc87c088dcefe459fa3b1af418fa946f80006004e5c1816e913db29775aa7650d71ec94cab63e38e09c70ff204ab2f00855a2830f7eac230

  • SSDEEP

    768:FfO5RroZJ76739sBWstDcVgNdb7Vis/LZ+jZ508M7A+eK+OJfZFd/bhifLGWrL0:Ffe+Zk781FNdbk+0Z50deK+UfZ/XWrI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\14482b66be2080c441eb83af76a9672f7bc15a2721a39d7f67fbcc52909f871f.exe
        "C:\Users\Admin\AppData\Local\Temp\14482b66be2080c441eb83af76a9672f7bc15a2721a39d7f67fbcc52909f871f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2612
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2276
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a5BF5.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2664
            • C:\Users\Admin\AppData\Local\Temp\14482b66be2080c441eb83af76a9672f7bc15a2721a39d7f67fbcc52909f871f.exe
              "C:\Users\Admin\AppData\Local\Temp\14482b66be2080c441eb83af76a9672f7bc15a2721a39d7f67fbcc52909f871f.exe"
              4⤵
              • Executes dropped EXE
              PID:2692
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2840
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2272
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2560
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1736
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2540

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            478KB

            MD5

            3eeec7dea3ac1162b9162456af69866a

            SHA1

            16c2834b9be250dc811786852a09b76283db9b91

            SHA256

            ab9c92e5c7ef90f6832d510478e4b6c1fef1e24ab6ca2410068e0d4f806a0f69

            SHA512

            ec4eb8441c1d64b7fde03bb4da57e562553b3db6a70096507b79c4c5be406b97ff8662cd8b14b7faef125b0ecfeda1d7d8b33a723305969ff5005c40987a37ab

          • C:\Users\Admin\AppData\Local\Temp\$$a5BF5.bat

            Filesize

            722B

            MD5

            e7acba3137695be5729f7a3388dae231

            SHA1

            3f69a49d0c3381cf145c96bd479b6658c21b1104

            SHA256

            baecf1738dff855e6c31b0478d0423becdd22e4e6d6670dc2c741dcbc116b168

            SHA512

            b7516455b6152dfa332449164a618225a043b3f900b36747a56a1edb004a26606a032f7431a63fe9ae7fe36bf91eece4dd1d24a65dfb095e264efef300b919f8

          • C:\Users\Admin\AppData\Local\Temp\$$a5BF5.bat

            Filesize

            722B

            MD5

            e7acba3137695be5729f7a3388dae231

            SHA1

            3f69a49d0c3381cf145c96bd479b6658c21b1104

            SHA256

            baecf1738dff855e6c31b0478d0423becdd22e4e6d6670dc2c741dcbc116b168

            SHA512

            b7516455b6152dfa332449164a618225a043b3f900b36747a56a1edb004a26606a032f7431a63fe9ae7fe36bf91eece4dd1d24a65dfb095e264efef300b919f8

          • C:\Users\Admin\AppData\Local\Temp\14482b66be2080c441eb83af76a9672f7bc15a2721a39d7f67fbcc52909f871f.exe

            Filesize

            22KB

            MD5

            b2f7631fe9ac1f6eb4f276bd7259626c

            SHA1

            ca1147287b78e3a15d30654a47b37c9aba2b4767

            SHA256

            23a59a0acd84d07313d6ea78fcf7f629ecdc93ae0c32574c73ef1a467f2831b5

            SHA512

            aa7e3e9ea219d64c1f9dbca0095968087574dea92e466139c2c8a19d03c1341b53191077504fc07366ceb6bd46323b8f95c454b7a0103e27c939622b0e0a0f6e

          • C:\Users\Admin\AppData\Local\Temp\14482b66be2080c441eb83af76a9672f7bc15a2721a39d7f67fbcc52909f871f.exe.exe

            Filesize

            22KB

            MD5

            b2f7631fe9ac1f6eb4f276bd7259626c

            SHA1

            ca1147287b78e3a15d30654a47b37c9aba2b4767

            SHA256

            23a59a0acd84d07313d6ea78fcf7f629ecdc93ae0c32574c73ef1a467f2831b5

            SHA512

            aa7e3e9ea219d64c1f9dbca0095968087574dea92e466139c2c8a19d03c1341b53191077504fc07366ceb6bd46323b8f95c454b7a0103e27c939622b0e0a0f6e

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            ac18cf46cd062dd8834115ffeb3e5711

            SHA1

            116a851b3641bbe862e51bbb8ed4c256f9c25827

            SHA256

            d120864b53f5b38df0175ba505f004222d39f138025411c3481db0d7b48b7b24

            SHA512

            78b93c12df9c562751d95b805257e2fc86a4edf8fc10b0e04f89207d81528c3cb1e29973c38cc1945624e190db24854a645329cd1eb18bd2d24672edab3c0a36

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            ac18cf46cd062dd8834115ffeb3e5711

            SHA1

            116a851b3641bbe862e51bbb8ed4c256f9c25827

            SHA256

            d120864b53f5b38df0175ba505f004222d39f138025411c3481db0d7b48b7b24

            SHA512

            78b93c12df9c562751d95b805257e2fc86a4edf8fc10b0e04f89207d81528c3cb1e29973c38cc1945624e190db24854a645329cd1eb18bd2d24672edab3c0a36

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            ac18cf46cd062dd8834115ffeb3e5711

            SHA1

            116a851b3641bbe862e51bbb8ed4c256f9c25827

            SHA256

            d120864b53f5b38df0175ba505f004222d39f138025411c3481db0d7b48b7b24

            SHA512

            78b93c12df9c562751d95b805257e2fc86a4edf8fc10b0e04f89207d81528c3cb1e29973c38cc1945624e190db24854a645329cd1eb18bd2d24672edab3c0a36

          • C:\Windows\rundl132.exe

            Filesize

            33KB

            MD5

            ac18cf46cd062dd8834115ffeb3e5711

            SHA1

            116a851b3641bbe862e51bbb8ed4c256f9c25827

            SHA256

            d120864b53f5b38df0175ba505f004222d39f138025411c3481db0d7b48b7b24

            SHA512

            78b93c12df9c562751d95b805257e2fc86a4edf8fc10b0e04f89207d81528c3cb1e29973c38cc1945624e190db24854a645329cd1eb18bd2d24672edab3c0a36

          • F:\$RECYCLE.BIN\S-1-5-21-3849525425-30183055-657688904-1000\_desktop.ini

            Filesize

            10B

            MD5

            64a8745f77935c35c66f3aeeddf5d47d

            SHA1

            1214a584f661cb008b494ce6278289f8cf406810

            SHA256

            7841de37b0bf8c995d0b903bef18bd4159f94d9c2a35c91b06dabe8198c6c63a

            SHA512

            807b8f5512f868d0a2b1a10889164f787aa07b4309511326f4755d1121e666ec30dfb444a0565a5a7426cbd45b41d49d6429c9baf63a0bd3948b85b57841af3b

          • \Users\Admin\AppData\Local\Temp\14482b66be2080c441eb83af76a9672f7bc15a2721a39d7f67fbcc52909f871f.exe

            Filesize

            22KB

            MD5

            b2f7631fe9ac1f6eb4f276bd7259626c

            SHA1

            ca1147287b78e3a15d30654a47b37c9aba2b4767

            SHA256

            23a59a0acd84d07313d6ea78fcf7f629ecdc93ae0c32574c73ef1a467f2831b5

            SHA512

            aa7e3e9ea219d64c1f9dbca0095968087574dea92e466139c2c8a19d03c1341b53191077504fc07366ceb6bd46323b8f95c454b7a0103e27c939622b0e0a0f6e

          • memory/1216-28-0x0000000002A50000-0x0000000002A51000-memory.dmp

            Filesize

            4KB

          • memory/2840-32-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2840-17-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2840-1837-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2840-3321-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2840-4089-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2864-0-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2864-12-0x00000000002D0000-0x000000000030F000-memory.dmp

            Filesize

            252KB

          • memory/2864-20-0x00000000002D0000-0x000000000030F000-memory.dmp

            Filesize

            252KB

          • memory/2864-19-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB