Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/04/2024, 21:07

General

  • Target

    53e09db4381338931ced58f706360dd7f8b004bbd5fe3db1861447aa79d98b84.exe

  • Size

    964KB

  • MD5

    4e6fa3d48f7806ecaaafc20ca8ed25be

  • SHA1

    ea53c5ff0ae8b5238525e6c0f61e656a22bc1820

  • SHA256

    53e09db4381338931ced58f706360dd7f8b004bbd5fe3db1861447aa79d98b84

  • SHA512

    fb7d62afef42084790f2436d1c107549097facd1085cac7026e736ce6cee508a457de981c0d0d7782704c81a3c317ddda0e5372f5dfc2308fb70008bf36053dc

  • SSDEEP

    12288:MP2RKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:MPvBpDRmi78gkPXlyo0G/jr

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\53e09db4381338931ced58f706360dd7f8b004bbd5fe3db1861447aa79d98b84.exe
        "C:\Users\Admin\AppData\Local\Temp\53e09db4381338931ced58f706360dd7f8b004bbd5fe3db1861447aa79d98b84.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2468
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2568
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1C86.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2524
            • C:\Users\Admin\AppData\Local\Temp\53e09db4381338931ced58f706360dd7f8b004bbd5fe3db1861447aa79d98b84.exe
              "C:\Users\Admin\AppData\Local\Temp\53e09db4381338931ced58f706360dd7f8b004bbd5fe3db1861447aa79d98b84.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:2544
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2584
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2536
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2620
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2604
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2400

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            616f8c1916ec81484c8aefe8899f7c35

            SHA1

            4e5fc08bd9b2994582dd4f7fc33f544a89bc5fd5

            SHA256

            d00dd083b9e7d238419f3f6d4c9c67489b752d8a44911a7ab4d8e9758ca63919

            SHA512

            f2fc79f30a6eb798d2b8916341014849cf2375d011b14577ef40f13906f44c1bf512203979b3ca8ac544e84e503d2cce93b0c4408f50b05a862996dd49d90fca

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            478KB

            MD5

            fa1ca34b203e8244b1102d8ad38035c2

            SHA1

            d3ec13ced225363368a77396e000538a66d0fd37

            SHA256

            a48bfd2e24c826fbabe3adbc037da84fb2ab5dc4942ed22ca31fad3ef8e657cb

            SHA512

            68943886e5f7c6f7f0b52a6b10232dc3a12db86a3246e12a0da9c827ca0ee115d35e1182b56ef8a9c824e01daa1c5e147bc349ab8e41703a9807e93926b7a165

          • C:\Users\Admin\AppData\Local\Temp\$$a1C86.bat

            Filesize

            722B

            MD5

            8a153532e589b8c114856bab69f6b994

            SHA1

            ca518419e7dfe4cb4f19d0b7e7b6fe06774c8851

            SHA256

            652ef07479e0b221c76b9e59b7042da625a997139ed5d95d0f0922a0eb629374

            SHA512

            cadaab2d8923b57643619fd4bbf1008f57a248cfaa7fd157269dc5e687edf8d584097e6f6187b4ab7cec1e972420dc11d9ff1e77309b86c0c99ea370186bd440

          • C:\Users\Admin\AppData\Local\Temp\53e09db4381338931ced58f706360dd7f8b004bbd5fe3db1861447aa79d98b84.exe.exe

            Filesize

            930KB

            MD5

            30ac0b832d75598fb3ec37b6f2a8c86a

            SHA1

            6f47dbfd6ff36df7ba581a4cef024da527dc3046

            SHA256

            1ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74

            SHA512

            505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            5f4b64deb280c001783cf744b06bef33

            SHA1

            e3962fe8ed4214be0cf4605b5ec6114320949eed

            SHA256

            53f7b777df32f27c60853a9b5d65a8e6f99cddd820daaead05f938239d6bdb35

            SHA512

            ad10ff2e3837acc133e0945e58f1fd3748242506d47694ad4efed6ac22325c7383ced5bc57dec390b3fd09952f5ffaef6946982972d67a969f333573492ed3cd

          • F:\$RECYCLE.BIN\S-1-5-21-3452737119-3959686427-228443150-1000\_desktop.ini

            Filesize

            9B

            MD5

            137c71ab33d39f41d1d0f506748620c6

            SHA1

            615708c800cedc2541589174e6e677e1563367b5

            SHA256

            f1a3a71540f6e454bf800af51e8e8085c233f7281852519bd8b0ae36071f13e0

            SHA512

            cb8e0ffac4c5606dec5cc9ccdb6ac981ed120efc64a4f4750ac59149280da5fb379c2af737bde3d9e23ca21c3ee3fa9e6c252dee9ef22102886e2390c9d504fc

          • memory/1200-28-0x0000000003D00000-0x0000000003D01000-memory.dmp

            Filesize

            4KB

          • memory/1968-0-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1968-18-0x0000000000440000-0x0000000000480000-memory.dmp

            Filesize

            256KB

          • memory/1968-16-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2584-19-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2584-31-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2584-3318-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2584-4132-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB