Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2024 06:15

General

  • Target

    1c24af34de95be7460daa1f9b675c35a.exe

  • Size

    940KB

  • MD5

    1c24af34de95be7460daa1f9b675c35a

  • SHA1

    b7c19a25874210adbfe8ecb44984abe12aab1129

  • SHA256

    2d7d6537479e176d58e438642b00b73ee938a19e8eb9296a400e4b1741582702

  • SHA512

    241167eafb00a79497bea745089060a81cc3b1076f06927bc659f3eacc63c1bb3baa5ff0f14599d2d40fedcdcb97a35ecd3cb35b077a53cb9ad3cb20bf6bdffd

  • SSDEEP

    12288:9OKpnF6Ee+Rp4tqkWjQ+iOklku0/04gNphgBBO75nONT3vx2zVP:9OqZe0p4Ek4niOkl/A04szE87JKTvm

Malware Config

Signatures

  • Renames multiple (176) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\1c24af34de95be7460daa1f9b675c35a.exe
        "C:\Users\Admin\AppData\Local\Temp\1c24af34de95be7460daa1f9b675c35a.exe"
        2⤵
        • Drops file in Drivers directory
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3036
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2468
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a29DE.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2628
            • C:\Users\Admin\AppData\Local\Temp\1c24af34de95be7460daa1f9b675c35a.exe
              "C:\Users\Admin\AppData\Local\Temp\1c24af34de95be7460daa1f9b675c35a.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:2692
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Adds Run key to start application
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2568
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2384
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:1972
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2640
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2392

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\RCXC108.tmp

            Filesize

            91KB

            MD5

            fc3f8c6c79f0ed3742e481a820108b21

            SHA1

            bed572c122b018f546348930443eb4e7ec9ddbe0

            SHA256

            186d9703335cd639f8d9cb28ecc49d78e01030d072b17ea25c6f11ea50e0e4dc

            SHA512

            a45300117d870a458ea20a6c46bd4682ffb2afa98f742dc1c0553eb4382e100e4474411f35e2119bc2f78bf749a0d928de97bf08062bcad07dd7df8748425cad

          • C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\RCXC12A.tmp

            Filesize

            94KB

            MD5

            ca9b0e56c1b5fb561def59b71454d82d

            SHA1

            65829e4367fbea0c511f0aedf6136332eae60a0d

            SHA256

            5f79f1e7af3a07ebccd616f18e9a7547e81122b7975f9ac27d218c7ada337c83

            SHA512

            8d2043dff562f283f6e290988f9a517ca05615f17990c22526eda94c1d1cb37d412125a1b57b14216443bf4f9c4f713f3cb1415efb4a728a0ec78de144bc3c98

          • C:\Program Files (x86)\Google\Update\1.3.36.151\RCXC1D1.tmp

            Filesize

            91KB

            MD5

            e13326ecef7c9675da8e8b963ddb0225

            SHA1

            a942b2d13f6457b95c227228136b53c5c1e24a6e

            SHA256

            2f251c129bc807ad89bea7e541b637120d0a3382ac1a22c5bbf098efabdb2885

            SHA512

            eff9696ca24d4980f498c98de1d1e01863af906d5ff22ae6842c0ec431e9613b54d6b7190e2b762431d3de5dec7dacc1f6641cd01b79a210e458b1f73b98e35a

          • C:\Program Files (x86)\Mozilla Maintenance Service\RCXC225.tmp

            Filesize

            100KB

            MD5

            a28fec5ca0c0b515e6df5f90744cd1c0

            SHA1

            ada6dd9803098afb4c15dd1200b131ade0d21a9c

            SHA256

            295f806ef3055356b0845438f63e2d1a616cde3e9695f1a1c6d0ced8a677f9c2

            SHA512

            05c8ee7a3c4396d5a40c82db5f6bb787e1083e5516ca44564d84bd45aeff5b10657d20c6927f5a571e1b064a168506954ba73935e37b3edbef26964f0a0c4b13

          • C:\Program Files\7-Zip\RCXBAE8.tmp

            Filesize

            91KB

            MD5

            4971d54e4bba7117ec9805e595d3aece

            SHA1

            d63620cd18b9af5a9c24d6378d56e17f7e0742ea

            SHA256

            02dc1c450e44089d197ea8ea4723b0f6776bcab47cc3c8d5ad120994c518c74f

            SHA512

            60cc340863ce309588a74f835dc2f7dbf5b0d85a03761f0b8262a5fdf41d70571c28c3d5d09efc1ce163faf71510b6c2c6cfb54db4ac18c4d650e9432b0b5471

          • C:\Program Files\Java\jdk1.7.0_80\bin\RCXBB3C.tmp

            Filesize

            92KB

            MD5

            f927d998b5aef64fa0996971cd3fa86f

            SHA1

            a8a7d8532847087376509b5e641023a675c96678

            SHA256

            b0b2f258f1eea70f9b4a0a08849f677c1db41bbd52412c9eacd6ddf3f4149e21

            SHA512

            25144369a7226748eac3989cf0d3304f04e15984d2b4417b6270817d8350b82a510bad4602f92f18569dbadb8cf71cfc31ac8bc26ded21a1bfdfcb10d32c18c0

          • C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\RCXC65B.tmp

            Filesize

            92KB

            MD5

            58c965de942795a2df953f4929234fd5

            SHA1

            7e12ae7087a9e472470362629d6f01f54ec230de

            SHA256

            98c76b1552c150095fc7c798ab1d575d999391430621a95c3e43b557be3a6714

            SHA512

            5674c7c03ffcc899df44298f3be833dcd4e4c22b21b679804b18aac4e529c8b0a0e477b9fe2e7bd98a849edf3e0e8431d637a0090973d2dd4f5757251148cfa8

          • C:\Users\Admin\AppData\Local\Temp\$$a29DE.bat

            Filesize

            530B

            MD5

            458c4ca39e29d8ae4efa1a7427669f70

            SHA1

            db14e1a93ad010c5b3cab90e4023c35cb1e6d40f

            SHA256

            9495b4e1d0cdbf5ede846c5844f0469bf7fe9d448f11b595c6dc890c431213cb

            SHA512

            e172db3ce6626d9f6d2f719b75c10b3b62e4a3ce3e2307c00b81fb92107786fc1c2443c341eb407ffde4b6e7144d6f893ea0e0d8402525a8037399f9e7f6c1aa

          • C:\Users\Admin\AppData\Local\Temp\1c24af34de95be7460daa1f9b675c35a.exe.exe

            Filesize

            847KB

            MD5

            c8f40f25f783a52262bdaedeb5555427

            SHA1

            e45e198607c8d7398745baa71780e3e7a2f6deca

            SHA256

            e81b44ee7381ae3b630488b6fb7e3d9ffbdd9ac3032181d4ccaaff3409b57316

            SHA512

            f5944743f54028eb1dd0f2d68468726b177d33185324da0da96cdd20768bab4ca2e507ae9157b2733fd6240c920b7e15a5f5b9f284ee09d0fd385fc895b97191

          • C:\Windows\Logo1_.exe

            Filesize

            93KB

            MD5

            00d5b234cc6206e5c8f51a1786c54197

            SHA1

            9ec40410e00acc436136945cf2c1fc956fdb3362

            SHA256

            c858c709ecfd1779991256c0803786c768bd769d94424ba5e607a36faaabcd45

            SHA512

            32551d560529fd1c0a79bec91c7a79e8dce2af26d9547162baa3dea8d1e6619c17e531f54b20a85a690a47561748dd80ab10522c12e1d9b92b1dbc0bc70bb363

          • C:\Windows\system32\drivers\etc\hosts

            Filesize

            832B

            MD5

            7e3a0edd0c6cd8316f4b6c159d5167a1

            SHA1

            753428b4736ffb2c9e3eb50f89255b212768c55a

            SHA256

            1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

            SHA512

            9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

          • memory/1192-27-0x00000000025C0000-0x00000000025C1000-memory.dmp

            Filesize

            4KB

          • memory/2568-31-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2568-964-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2568-977-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3036-18-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB