Resubmissions

20/02/2024, 22:41

240220-2l5n4sge24 8

20/02/2024, 22:35

240220-2hwxssgd77 8

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20/02/2024, 22:35

General

  • Target

    a8c5fe8f772d8934eebc826afab76e61c2db32d6a3ff7717fe0fb8751912bb5b.exe

  • Size

    491KB

  • MD5

    a9bc0281eb8a405233bd7342ec7604fb

  • SHA1

    2935995a3f63c85577ea7eeea237fed5a6142259

  • SHA256

    a8c5fe8f772d8934eebc826afab76e61c2db32d6a3ff7717fe0fb8751912bb5b

  • SHA512

    1a095bbde13ef762dd0dd1d7cd6dd7dfbd228878c9a6f11a952203e03274065be0501ac2c03de627a8ed445cbf298b2f0f853348d55100530785477d3c0ea7dc

  • SSDEEP

    6144:T46tGdyr6Mz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1L:T3N2i1gL5pRTcAkS/3hzN8qE43fm78V

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\a8c5fe8f772d8934eebc826afab76e61c2db32d6a3ff7717fe0fb8751912bb5b.exe
        "C:\Users\Admin\AppData\Local\Temp\a8c5fe8f772d8934eebc826afab76e61c2db32d6a3ff7717fe0fb8751912bb5b.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1032
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2888
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2712
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a9109.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2768
            • C:\Users\Admin\AppData\Local\Temp\a8c5fe8f772d8934eebc826afab76e61c2db32d6a3ff7717fe0fb8751912bb5b.exe
              "C:\Users\Admin\AppData\Local\Temp\a8c5fe8f772d8934eebc826afab76e61c2db32d6a3ff7717fe0fb8751912bb5b.exe"
              4⤵
              • Executes dropped EXE
              PID:2692
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2808
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2780
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2804
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2552
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2700

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            6429787036874847c8923496db474f1b

            SHA1

            a7b83486920c04ea717e42624560abd460e104fa

            SHA256

            3f8df71e3ccf50be5e965784efe4109d0769031b427cb4450836a7bbd98f61d8

            SHA512

            64449e6a2fde0db667849d0ebfce868b2506d558f335224b55cadd0108b37408c7e705ddeb68a5b421a78e4716a40e2e1ad72666401a4fc7786107013c1ccd83

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            478KB

            MD5

            d37b83e0e94ae7c62e4d019b8e85c274

            SHA1

            66e27b9e0c429735cd0e9c76f2987c61c624822d

            SHA256

            a6f518c48415af161e11b2a2a1503cce2dc6922c78d48f70744e5446380793bd

            SHA512

            1125386345fc7229dbf06609e27276d0dbf1515f316a2d8352fa95df2911ad82410431044f5fe4fff347188d3b78a0d79d231648150f7695296961f4e55a4285

          • C:\Users\Admin\AppData\Local\Temp\$$a9109.bat

            Filesize

            722B

            MD5

            68711d7c135993caf8725139a4f6a053

            SHA1

            28c7935fb3134045251f645165c44745c992b8fc

            SHA256

            114b91ee0bcd92d165569899e27d69e7e6df26c963d3ba95648db9321d588809

            SHA512

            e3347a01c72e92b18f0c029f2f725d24e57604dbbd59b7874422c6765fba62ef2c64fa8a58b2f996b8c4db51f6c544d62f643be71248358198d90746f71213d5

          • C:\Users\Admin\AppData\Local\Temp\a8c5fe8f772d8934eebc826afab76e61c2db32d6a3ff7717fe0fb8751912bb5b.exe.exe

            Filesize

            458KB

            MD5

            619f7135621b50fd1900ff24aade1524

            SHA1

            6c7ea8bbd435163ae3945cbef30ef6b9872a4591

            SHA256

            344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

            SHA512

            2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            efc6891a9a27c338c2b043d06387dd51

            SHA1

            6c38d0b892125ac7ea50bce76a281b53c56c3338

            SHA256

            56be573a8ed50a142da98c71ff3f6aa6dee2f6ba566c357ddb6dc4fc36db66ff

            SHA512

            2591b563dc154bf5bee1541239d0efbdb066b402a5da188741379ead9f8d0e5a1ebee04a728b0edde70d937a3aacd3d80463c4cc78fa7ab8c9767995b2a1b2bf

          • C:\Windows\system32\drivers\etc\hosts

            Filesize

            832B

            MD5

            7e3a0edd0c6cd8316f4b6c159d5167a1

            SHA1

            753428b4736ffb2c9e3eb50f89255b212768c55a

            SHA256

            1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

            SHA512

            9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

          • F:\$RECYCLE.BIN\S-1-5-21-3427588347-1492276948-3422228430-1000\_desktop.ini

            Filesize

            9B

            MD5

            b347a774e254ac3f0d6aaea35544ac50

            SHA1

            7f332d15a7648f7a698b3068a428811361f4e9ab

            SHA256

            1ebd1b85bb264260df3d9fb0a2062b29199c7b6137dcc98486874c1d257c73cd

            SHA512

            ce8615c90c8794f0aefeb0c6ce5da126732695e6be36b5e625f3a073d55c6f8cd88ca465b07e2c0e87355b5baad887a3f0b26c4eb262484a83d35565e72ba138

          • memory/1032-17-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1032-18-0x0000000000270000-0x00000000002AE000-memory.dmp

            Filesize

            248KB

          • memory/1032-36-0x0000000000270000-0x00000000002AE000-memory.dmp

            Filesize

            248KB

          • memory/1032-0-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1032-21-0x0000000000270000-0x00000000002AE000-memory.dmp

            Filesize

            248KB

          • memory/1216-30-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

            Filesize

            4KB

          • memory/2808-34-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2808-2133-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2808-22-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2808-4045-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB