Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 23:39

General

  • Target

    8455ba4d9cad9da5214405e8f4273e496f1906a62e865af4d94b2ebc3e424d66.exe

  • Size

    139KB

  • MD5

    bce6ea7ee92b235897a8973f78d8a1b9

  • SHA1

    56760532e7d95bd89a5cc6349626d82d2fff8c87

  • SHA256

    8455ba4d9cad9da5214405e8f4273e496f1906a62e865af4d94b2ebc3e424d66

  • SHA512

    cd2168ac7ae4bbe7d66aa31bacd70644cf94a07e088e3f7eaee23767bcab7876d7840c28e47edf27efc32d7ea83391016718c71da0bd8d1d48e8c773c41c6ecb

  • SSDEEP

    3072:nCSjGoLpWM6bblmjxaEjZ5itklrllnCrhY8fxJ:9XmRmJ4kB7nIhf

Malware Config

Signatures

  • Renames multiple (175) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1268
      • C:\Users\Admin\AppData\Local\Temp\8455ba4d9cad9da5214405e8f4273e496f1906a62e865af4d94b2ebc3e424d66.exe
        "C:\Users\Admin\AppData\Local\Temp\8455ba4d9cad9da5214405e8f4273e496f1906a62e865af4d94b2ebc3e424d66.exe"
        2⤵
        • Drops file in Drivers directory
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1612
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2272
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2504
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a975F.bat
            3⤵
            • Deletes itself
            PID:2572
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Adds Run key to start application
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2636
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2528
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2156
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2540
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2720

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Persistence

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Privilege Escalation

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Defense Evasion

          Modify Registry

          1
          T1112

          Credential Access

          Unsecured Credentials

          1
          T1552

          Credentials In Files

          1
          T1552.001

          Discovery

          Query Registry

          1
          T1012

          Peripheral Device Discovery

          1
          T1120

          System Information Discovery

          1
          T1082

          Collection

          Data from Local System

          1
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe.Exe
            Filesize

            323KB

            MD5

            70e0adaf74a179379751116e36cb6092

            SHA1

            1fe2600e908ad82a18fd2c0dbb7af438c5b50232

            SHA256

            9f6f5bf3971e6164f0bcd84c63811c85acb1d48e116bfcbd52d83c47fef4172e

            SHA512

            40a60e97605c44a31e2eb78cd974b86b1eadcbe4c4cba6a533451484ba973eba7051bbb16d626a0bdf959beeac6f37ce95e047b582ec76f27941a485e2bf2a24

          • C:\Program Files (x86)\Google\Update\1.3.36.151\RCX3A79.tmp
            Filesize

            75KB

            MD5

            901b76d4571321887a5e32504bac4d10

            SHA1

            a7d8038edd19ab9b236e948145893e9fce27d98e

            SHA256

            3dbd73e07364d824d1aba6cb2dc4fb60b7ce8850a9f31df12d288b206010d47e

            SHA512

            915a50a891cf3d543c123d5f5e48bec676030293c77abf5ccf22dd55ef6c26704c12ae9a789647b717b5e800511b0905fac76f87ff7fe9a41eaa4c9e35430f75

          • C:\Program Files (x86)\Mozilla Maintenance Service\RCX3BE6.tmp
            Filesize

            84KB

            MD5

            7414b4be39ac4f6c308f743318602287

            SHA1

            1621d34b36bc570f490556641fac8fa7d6bd4423

            SHA256

            ddd12e30a891d16bd5a461fd29e66c3abcc210ba16c0f221246f00da2685d7ab

            SHA512

            ee2420891a2d64ef906554f54fe7fb6b93324c73fd4a488cdbe578cb41dcef03929fc36ae5c8a21aed8f9575ddae2083b533bf89d450cf9dedbe0c964937a81c

          • C:\Program Files\7-Zip\RCX2973.tmp
            Filesize

            75KB

            MD5

            874f1f6620f40be990d01f13d7107c05

            SHA1

            bbd2bc27382a8993258c8b46323f5bbe5db6f608

            SHA256

            d169216dea3ddec2099c18679a5fa0f3767f953cce08780c2ccc2ade361e16c7

            SHA512

            5733d52e4008a84045b4ef621a13da3a8109231ec720208aae5f6f291b15d6a8504f426aca6fec233d63a280f88d97476f8abf10f5d39e311f256bb39cbb7c7a

          • C:\Program Files\Java\jdk1.7.0_80\bin\RCX2AEF.tmp
            Filesize

            76KB

            MD5

            ac8ccb00db9735fe6867ccd30f4d8b3e

            SHA1

            5ff6afcc6b2cb21d7f0a93e0b29141b7887d22f8

            SHA256

            0e8f1dd46f58bcbb99e8d28ada67fa2406c91b6730eed097115e3d660ee96e08

            SHA512

            4d5b8f221a3bdcb1c54ea221c19bbf2b90b35c30fe05e01eedc8d68c8c92f1a54353cab37d6255d89f53cabbaa4540f8c99d2b900cc0dd1180da1c809ac885d8

          • C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\RCX4134.tmp
            Filesize

            77KB

            MD5

            c18f9902179ae9863ebcc3b8187fc202

            SHA1

            da9f39fdf14a640d86054828c004718c1bcd690e

            SHA256

            0383977199089b7d29e68b18aa003d312db3405936c3e3a840a282c5c1b53d1c

            SHA512

            48480079a9e5eac9d653d56d6ba7bef19cd4f63c9dd8a0c5b4eff943bd22873ca53ce8a5e259e6d2fa1b3ed0e254a46a796d9ffec5aae4dfc81d0f7715fd3a6e

          • C:\Users\Admin\AppData\Local\Temp\$$a975F.bat
            Filesize

            722B

            MD5

            d57b702a5a7e8386cc61398ce9919746

            SHA1

            83df2ecaac2678b3be1d7574fe953aa9fb65018c

            SHA256

            8fadc9bd51a2401a82e637233dd01d2bc0233fac8ecc002f185c517757bc5b7d

            SHA512

            a4fa5ffa1d4bb002778495f75ff87f4a0c02c4da1ac0d88539628bc9cfd3a14b758cc49144d8c6f11d9e2b19ee5a23fe63feca6b70024ac4e7ec9a3c45d4d767

          • C:\Users\Admin\AppData\Local\Temp\8455ba4d9cad9da5214405e8f4273e496f1906a62e865af4d94b2ebc3e424d66.exe.exe
            Filesize

            49KB

            MD5

            42835b9041c7572234d9426a828c8818

            SHA1

            7cf221f4e025538a2a18f82ab5a4a2fbca17ed8a

            SHA256

            2674d3f388a34edef793580ac1e3b85a0ab7323d079c66c86aec2c5029b7f687

            SHA512

            cb42b82d1f8767dc866532b8a30be4ce397f846a4da57a9ad626b666b29aeaec93a1fffc93aa3072fc0f10ad45ab8153b5f3be1af252ad3d24bf1fbd02317ad0

          • C:\Windows\Logo1_.exe
            Filesize

            89KB

            MD5

            e0cb6eb94186a5f81bb4cc9ec08d381f

            SHA1

            e60be33ad729424e449d2a749e323e5cf0d15c76

            SHA256

            190c3d61f10cd11c3934b2dfb997999e6245288ee70c1d09f3094bb6b15021ca

            SHA512

            4659b2642c24b465d8b3582f5ae1946bddce1628b4725bccfae2cbc0ccbe758c870017bf3dcb95f61c9c5e939f2354eea3e939b1e60510fc69666ea3c627a347

          • C:\Windows\system32\drivers\etc\hosts
            Filesize

            832B

            MD5

            7e3a0edd0c6cd8316f4b6c159d5167a1

            SHA1

            753428b4736ffb2c9e3eb50f89255b212768c55a

            SHA256

            1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

            SHA512

            9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

          • memory/1268-23-0x0000000002200000-0x0000000002201000-memory.dmp
            Filesize

            4KB

          • memory/1612-16-0x0000000000400000-0x0000000000425000-memory.dmp
            Filesize

            148KB

          • memory/2636-27-0x0000000000400000-0x0000000000425000-memory.dmp
            Filesize

            148KB

          • memory/2636-649-0x0000000000400000-0x0000000000425000-memory.dmp
            Filesize

            148KB

          • memory/2636-972-0x0000000000400000-0x0000000000425000-memory.dmp
            Filesize

            148KB