Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/04/2024, 16:18

General

  • Target

    577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe

  • Size

    48KB

  • MD5

    01b6d7a32917e448f5030b937210f372

  • SHA1

    9f4645587abb30bbec12f2824ccb3859ecbd852c

  • SHA256

    577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8

  • SHA512

    06b188acd7da4d1af68bfb363f3af32d9c09741b5a2cf0cec1c9fdcd22b698073098e0cd3495b63dfb3616022a1a44513d49f8919b224b4122765dd3558a720d

  • SSDEEP

    1536:2dKFaYzMXqtGNttyeiZnZLYm1pHqaNrFd:2kFaY46tGNttyeQLYm1gaNpd

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1172
      • C:\Users\Admin\AppData\Local\Temp\577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe
        "C:\Users\Admin\AppData\Local\Temp\577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2004
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2228
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a2FD7.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2664
            • C:\Users\Admin\AppData\Local\Temp\577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe
              "C:\Users\Admin\AppData\Local\Temp\577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: GetForegroundWindowSpam
              PID:2928
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2684
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2708
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2412
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2440
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2396

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                  Filesize

                  258KB

                  MD5

                  51ed9ab4efc7af69072f0b0cb33c7d4a

                  SHA1

                  bf7c12afe6f8eb95355d92485debb16a073f8aab

                  SHA256

                  532277e916d51a2e40e8f87b54298b6353873329b42e2d944c47457b1c415df0

                  SHA512

                  01973dcd43cd0f1c1765db75c7c6ea533e2bf47bae1001f43b3f5fb46f6f3d80af6e299d082e46e753c237cd5961d8e67a11f1c056768db75e4c3106c20fe4fc

                • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

                  Filesize

                  478KB

                  MD5

                  0a2f7bc5d2f3b1abbf852f12ac72d39f

                  SHA1

                  3ed5d15e03f4a79247638844b8e938794445bfde

                  SHA256

                  c2eadf7bc1b2c55782d5307c4bfdc59f4c900494b9a624e199c675b582a13d7c

                  SHA512

                  8c47195b5c79359b6e7c5088d1a2c757ce6a1f16dd61c4c4d0bb7baafba4135c7a64541ce7a3af55b65f83af3df2677ff6f63f9c80fdfb1f7696d54c4609d63d

                • C:\Users\Admin\AppData\Local\Temp\$$a2FD7.bat

                  Filesize

                  722B

                  MD5

                  c3dad5fa494fd31ba7813e4554376e4f

                  SHA1

                  8cc311dbaed6d902d63267a031ba4c63613ff8df

                  SHA256

                  fe6490f24e506f55d072c6c7a2c63aa0780b77661fbd56a1f724e7501707f430

                  SHA512

                  0942033f608f1d85f8ba503f48338bb6afe021b9ee841a19c00520dab914b1a61a3d4cdc622b2ba546be9f106396a934b24f75b6536272ed6e3fa0d5302f287b

                • C:\Users\Admin\AppData\Local\Temp\577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe.exe

                  Filesize

                  14KB

                  MD5

                  ad782ffac62e14e2269bf1379bccbaae

                  SHA1

                  9539773b550e902a35764574a2be2d05bc0d8afc

                  SHA256

                  1c8a77db924ebeb952052334dc95add388700c02b073b07973cd8fe0a0a360b8

                  SHA512

                  a1e9d6316ffc55f4751090961733e98c93b2a391666ff50b50e9dea39783746e501d14127e7ee9343926976d7e3cd224f13736530354d8466ea995dab35c8dc2

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  190cfb52ec885264fac6f6fa82efa51e

                  SHA1

                  a2557e755b37d73f39dc8de59ca7ae37e9e7efee

                  SHA256

                  e8c435b1a8b093137bc740c8dbf3cf4c7e2e647d7d5d5b7637700349c74bfc09

                  SHA512

                  df39c740cb59f101d20f6e6b1e50e74345d68a5bc1afe6cb1ff2951559fae570e1ee0926862c8eaf91f92f5e3c32179b19760942c1a39f3df20e9778745f8b8c

                • C:\Windows\system32\drivers\etc\hosts

                  Filesize

                  832B

                  MD5

                  7e3a0edd0c6cd8316f4b6c159d5167a1

                  SHA1

                  753428b4736ffb2c9e3eb50f89255b212768c55a

                  SHA256

                  1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

                  SHA512

                  9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

                • F:\$RECYCLE.BIN\S-1-5-21-1298544033-3225604241-2703760938-1000\_desktop.ini

                  Filesize

                  9B

                  MD5

                  5e45e0c42537212b4bfef35112ec91ba

                  SHA1

                  10c59c091fd35facc82bbc96938f118ce5a60546

                  SHA256

                  9f6b7a83161db36757e96dc40936aec1e5a9a41f9fca089f9cf5a4d695dd5ed5

                  SHA512

                  ee964e08687daa53fdc8e063402791acb104bd59f5d0f8a6d11d3e889db476315641c38032ade4177cd794b060f9fc4e6fd161989e452aae828c875c747e4bfb

                • memory/1172-29-0x0000000002240000-0x0000000002241000-memory.dmp

                  Filesize

                  4KB

                • memory/2156-0-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2156-18-0x00000000002A0000-0x00000000002DE000-memory.dmp

                  Filesize

                  248KB

                • memory/2156-17-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2684-21-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2684-2364-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2684-33-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2684-4102-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB