Analysis

  • max time kernel
    166s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2023, 22:46

General

  • Target

    bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35.exe

  • Size

    147KB

  • MD5

    3b3c01a9c6caf4ff6e924aa6ad719414

  • SHA1

    0345490e5a5559af8ebef29a11bd993f17f829d5

  • SHA256

    bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35

  • SHA512

    aca357df482db81998c9250bc149bca23cf7c6bce1f58b41b8f7505e4e4ea7caf2d878d36ac0eea09970942206cc44040748f54b1791ba4916d895a8fa51b37d

  • SSDEEP

    3072:2AaY46tGNttyeQLYm13rFob8LjUbb5d6u6:346tGdye413Cb8vU76r

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35.exe
        "C:\Users\Admin\AppData\Local\Temp\bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3020
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:3040
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a8A26.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2672
            • C:\Users\Admin\AppData\Local\Temp\bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35.exe
              "C:\Users\Admin\AppData\Local\Temp\bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35.exe"
              4⤵
              • Executes dropped EXE
              PID:2700
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2760
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2644
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2552
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2540
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2604

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                  Filesize

                  258KB

                  MD5

                  6051ad7cfe909b3caf4dd6bc14298229

                  SHA1

                  55c07603b44d401f662bfc534a016377b0372345

                  SHA256

                  4ccd27f53aab87e078cec3572592f31a39405c34c705b7c2704bb7157494994f

                  SHA512

                  64df8721376b20aa3711ce9c9eb2e80c473fd69fedfc5e27660c089fdab5b3f09629b302b91f9b93ce32aaa92f62e0ff4c3a872c581325f592c8c851c48164a1

                • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

                  Filesize

                  478KB

                  MD5

                  88ad7d8fda8f28f4158674f703593beb

                  SHA1

                  0d46d32eaa5443394fc3ed2d7b9fa9bdb741f638

                  SHA256

                  b36756dce5da5d35e9a1b9dda1ccd8022a20a80db95c0e6674685bdf5725b5b4

                  SHA512

                  968b4beae8303f103d16cf1d74e4f4837c3351b8633d71947a9d0735d74677cf52d72a573887d4dce99c680b63f8d8a7c6eec90f2cd1a35e884eaa0943e24b03

                • C:\Users\Admin\AppData\Local\Temp\$$a8A26.bat

                  Filesize

                  722B

                  MD5

                  adf29a16fdbe08262a5b5e943ff96715

                  SHA1

                  bb4ac28d6f1479b3014c6314442bd23b6d66fcbf

                  SHA256

                  1ac5143979115d3992f69df84fdd7e3248f80e912e0a1549132f4cd4cbeca0d4

                  SHA512

                  7327fdcbb6960afb440003b48ec16dd6bc97753372716444ce43bc29487cc586849017f3c4db43c6ad2f31640285e71fe50e76a5378550ebcdc608694b0cb82d

                • C:\Users\Admin\AppData\Local\Temp\$$a8A26.bat

                  Filesize

                  722B

                  MD5

                  adf29a16fdbe08262a5b5e943ff96715

                  SHA1

                  bb4ac28d6f1479b3014c6314442bd23b6d66fcbf

                  SHA256

                  1ac5143979115d3992f69df84fdd7e3248f80e912e0a1549132f4cd4cbeca0d4

                  SHA512

                  7327fdcbb6960afb440003b48ec16dd6bc97753372716444ce43bc29487cc586849017f3c4db43c6ad2f31640285e71fe50e76a5378550ebcdc608694b0cb82d

                • C:\Users\Admin\AppData\Local\Temp\bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35.exe

                  Filesize

                  113KB

                  MD5

                  095dabb90bb0953800131fbcc6f6df5e

                  SHA1

                  9166e25e1fe27c3f92e642ec2fcc36e7c3b19216

                  SHA256

                  72f1979b588357e1b0dc3e6e9f9a368d2742f18bf1daab0ee94f26d6811f8a33

                  SHA512

                  041a008d96140a46aa89776fd11e64064b9cda9bd551747f59ae98ccfdff07af010061338655d4d07925f4e2a6c9fc3c79159cec2c9e055445f4b2ab1275152f

                • C:\Users\Admin\AppData\Local\Temp\bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35.exe.exe

                  Filesize

                  113KB

                  MD5

                  095dabb90bb0953800131fbcc6f6df5e

                  SHA1

                  9166e25e1fe27c3f92e642ec2fcc36e7c3b19216

                  SHA256

                  72f1979b588357e1b0dc3e6e9f9a368d2742f18bf1daab0ee94f26d6811f8a33

                  SHA512

                  041a008d96140a46aa89776fd11e64064b9cda9bd551747f59ae98ccfdff07af010061338655d4d07925f4e2a6c9fc3c79159cec2c9e055445f4b2ab1275152f

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  faec997a71a18fa56b2c68b504f5fe10

                  SHA1

                  c33a7c730cb80fa56881933da56b9f1cc97278b8

                  SHA256

                  f3ab08bf7cd5f5df866e12a46e63579c9ec55d7ffacf744a5255fe7143652b66

                  SHA512

                  6f3614baf9da48a582ba274b2d0f356f09babd81a96274178cdbd6a9362aa522bf38a2a7ac5f81d414383f9b1d9a1f72320e1aaeb569a2647bcdd05775a4f23a

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  faec997a71a18fa56b2c68b504f5fe10

                  SHA1

                  c33a7c730cb80fa56881933da56b9f1cc97278b8

                  SHA256

                  f3ab08bf7cd5f5df866e12a46e63579c9ec55d7ffacf744a5255fe7143652b66

                  SHA512

                  6f3614baf9da48a582ba274b2d0f356f09babd81a96274178cdbd6a9362aa522bf38a2a7ac5f81d414383f9b1d9a1f72320e1aaeb569a2647bcdd05775a4f23a

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  faec997a71a18fa56b2c68b504f5fe10

                  SHA1

                  c33a7c730cb80fa56881933da56b9f1cc97278b8

                  SHA256

                  f3ab08bf7cd5f5df866e12a46e63579c9ec55d7ffacf744a5255fe7143652b66

                  SHA512

                  6f3614baf9da48a582ba274b2d0f356f09babd81a96274178cdbd6a9362aa522bf38a2a7ac5f81d414383f9b1d9a1f72320e1aaeb569a2647bcdd05775a4f23a

                • C:\Windows\rundl132.exe

                  Filesize

                  33KB

                  MD5

                  faec997a71a18fa56b2c68b504f5fe10

                  SHA1

                  c33a7c730cb80fa56881933da56b9f1cc97278b8

                  SHA256

                  f3ab08bf7cd5f5df866e12a46e63579c9ec55d7ffacf744a5255fe7143652b66

                  SHA512

                  6f3614baf9da48a582ba274b2d0f356f09babd81a96274178cdbd6a9362aa522bf38a2a7ac5f81d414383f9b1d9a1f72320e1aaeb569a2647bcdd05775a4f23a

                • C:\Windows\system32\drivers\etc\hosts

                  Filesize

                  832B

                  MD5

                  7e3a0edd0c6cd8316f4b6c159d5167a1

                  SHA1

                  753428b4736ffb2c9e3eb50f89255b212768c55a

                  SHA256

                  1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

                  SHA512

                  9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

                • F:\$RECYCLE.BIN\S-1-5-21-3425689832-2386927309-2650718742-1000\_desktop.ini

                  Filesize

                  10B

                  MD5

                  734c24ba21ebede54bb1c40eeb9fcb73

                  SHA1

                  43c71dba230d77c3bce10ff615476f15f5bfd9ca

                  SHA256

                  d3ed9267247657beddf3f0d6c5ba713025abcef32135c4b86e8ef312f0b0f65b

                  SHA512

                  cbbf132c72d14ea792f650256899433d31b4a8383fc89054b0e05b921930d55f117214ea102a5a9445cd2e2d4443e0f27ff4dc92aedd82b275f84108f604f3ca

                • \Users\Admin\AppData\Local\Temp\bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35.exe

                  Filesize

                  113KB

                  MD5

                  095dabb90bb0953800131fbcc6f6df5e

                  SHA1

                  9166e25e1fe27c3f92e642ec2fcc36e7c3b19216

                  SHA256

                  72f1979b588357e1b0dc3e6e9f9a368d2742f18bf1daab0ee94f26d6811f8a33

                  SHA512

                  041a008d96140a46aa89776fd11e64064b9cda9bd551747f59ae98ccfdff07af010061338655d4d07925f4e2a6c9fc3c79159cec2c9e055445f4b2ab1275152f

                • \Users\Admin\AppData\Local\Temp\bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35.exe

                  Filesize

                  113KB

                  MD5

                  095dabb90bb0953800131fbcc6f6df5e

                  SHA1

                  9166e25e1fe27c3f92e642ec2fcc36e7c3b19216

                  SHA256

                  72f1979b588357e1b0dc3e6e9f9a368d2742f18bf1daab0ee94f26d6811f8a33

                  SHA512

                  041a008d96140a46aa89776fd11e64064b9cda9bd551747f59ae98ccfdff07af010061338655d4d07925f4e2a6c9fc3c79159cec2c9e055445f4b2ab1275152f

                • memory/1208-31-0x00000000029A0000-0x00000000029A1000-memory.dmp

                  Filesize

                  4KB

                • memory/1652-0-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/1652-13-0x0000000000260000-0x000000000029E000-memory.dmp

                  Filesize

                  248KB

                • memory/1652-21-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/1652-17-0x0000000000260000-0x000000000029E000-memory.dmp

                  Filesize

                  248KB

                • memory/2760-22-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2760-35-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2760-1799-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2760-2761-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2760-4049-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB