Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/04/2024, 13:23

General

  • Target

    6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe

  • Size

    577KB

  • MD5

    08c40dde032cfcc3eb7e939668d2dc81

  • SHA1

    e24fcb6d53c54a747d4b06eb01f5a93ea1667e5a

  • SHA256

    6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f

  • SHA512

    90b7d5269180146c90b2328a61e65ec140bfdd0935294f662e86f0ba66cbce45718beb2968d214dec42e931e835560800487b55982fbf399a4815b8d0cb4372a

  • SSDEEP

    12288:kI1quIh7a3iwbihym2g7XO3LWUQfh4Co:kI1qa+gkE2fh4Co

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1284
      • C:\Users\Admin\AppData\Local\Temp\6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe
        "C:\Users\Admin\AppData\Local\Temp\6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2164
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a91B5.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2620
            • C:\Users\Admin\AppData\Local\Temp\6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe
              "C:\Users\Admin\AppData\Local\Temp\6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe"
              4⤵
              • Executes dropped EXE
              PID:2756
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2772
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2596
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2528
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2732
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2872

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            478KB

            MD5

            22f843576d7f955e6adfc871b32f1c4e

            SHA1

            0f619c169809e25776e5662048ef43b75105c749

            SHA256

            4743495c4403ccae771b3e2b4f9bca13336c3df8a7adda3b912f06b5e509f88a

            SHA512

            dc3f8688869ab9f35ad02f8b7c217fa93fc6dbe00a13a4a81e7b725b6dcaa8080c4731ffb165f070889f08b43e0a365e58955682c46623b85a0b4aca644b9fbf

          • C:\Users\Admin\AppData\Local\Temp\$$a91B5.bat

            Filesize

            722B

            MD5

            91e674937fdbbc330e418bd8fed384b1

            SHA1

            63405fff5d54a555b6597c908d8cc89feff2f489

            SHA256

            771f263f34cd34122cab812403402a8bafe4d9e6336b475d21bebf1bf41d8958

            SHA512

            ade84f8dee13c4689f8169d456a567e3e81556f6f4564aa78b8f40ac84c9058d25708b58297c2314f5a8b637df35e1571147b39bd3231620398fa0a22246bb9a

          • C:\Users\Admin\AppData\Local\Temp\6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe.exe

            Filesize

            544KB

            MD5

            9a1dd1d96481d61934dcc2d568971d06

            SHA1

            f136ef9bf8bd2fc753292fb5b7cf173a22675fb3

            SHA256

            8cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525

            SHA512

            7ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            79ddd31ec12dcac372128d6324c29631

            SHA1

            d4629a5ff6608ffe5e6732e39508b26d9b8291cd

            SHA256

            fbe0b835b3c535dc32227041810d143b2976303c3a46d926aca38537e2520404

            SHA512

            231338271e15166c55e203cd6aa3369a2220e5e01d74cb7c4729b4f4fd36a27a9e3a2a8d7deaac2559a5226bb6695ad9946e2a6e2c3500e089c47376a251d601

          • F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\_desktop.ini

            Filesize

            9B

            MD5

            5e45e0c42537212b4bfef35112ec91ba

            SHA1

            10c59c091fd35facc82bbc96938f118ce5a60546

            SHA256

            9f6b7a83161db36757e96dc40936aec1e5a9a41f9fca089f9cf5a4d695dd5ed5

            SHA512

            ee964e08687daa53fdc8e063402791acb104bd59f5d0f8a6d11d3e889db476315641c38032ade4177cd794b060f9fc4e6fd161989e452aae828c875c747e4bfb

          • memory/1284-28-0x00000000025E0000-0x00000000025E1000-memory.dmp

            Filesize

            4KB

          • memory/1532-0-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/1532-17-0x0000000000230000-0x000000000026D000-memory.dmp

            Filesize

            244KB

          • memory/1532-16-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/1532-12-0x0000000000230000-0x000000000026D000-memory.dmp

            Filesize

            244KB

          • memory/2772-20-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2772-1088-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2772-32-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2772-4040-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB