Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 06:15

General

  • Target

    1c24af34de95be7460daa1f9b675c35a.exe

  • Size

    940KB

  • MD5

    1c24af34de95be7460daa1f9b675c35a

  • SHA1

    b7c19a25874210adbfe8ecb44984abe12aab1129

  • SHA256

    2d7d6537479e176d58e438642b00b73ee938a19e8eb9296a400e4b1741582702

  • SHA512

    241167eafb00a79497bea745089060a81cc3b1076f06927bc659f3eacc63c1bb3baa5ff0f14599d2d40fedcdcb97a35ecd3cb35b077a53cb9ad3cb20bf6bdffd

  • SSDEEP

    12288:9OKpnF6Ee+Rp4tqkWjQ+iOklku0/04gNphgBBO75nONT3vx2zVP:9OqZe0p4Ek4niOkl/A04szE87JKTvm

Malware Config

Signatures

  • Renames multiple (219) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\1c24af34de95be7460daa1f9b675c35a.exe
        "C:\Users\Admin\AppData\Local\Temp\1c24af34de95be7460daa1f9b675c35a.exe"
        2⤵
        • Drops file in Drivers directory
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2608
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5036
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:3540
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aD37C.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:468
            • C:\Users\Admin\AppData\Local\Temp\1c24af34de95be7460daa1f9b675c35a.exe
              "C:\Users\Admin\AppData\Local\Temp\1c24af34de95be7460daa1f9b675c35a.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:3352
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Adds Run key to start application
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4848
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3680
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:4476
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:968
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:4944

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\RCX6EBD.tmp

            Filesize

            94KB

            MD5

            0c2c5acb33be13be1fa5be60ff922c93

            SHA1

            9b865693eb3bdf0a047ccb27a7bd495f2995af8e

            SHA256

            1ba0580d121415805c04a3167e603787b6b456e7316da629dea934ad5fb27aff

            SHA512

            82b64d0e929c0c7c52e36b5d88ccc1dee10192e60979a07fdace2fb325adb6b384f73d84b0b3038015316f370a4f68349d8d5bb12af6db4aaaf2b3b3072a5078

          • C:\Program Files (x86)\Google\Update\RCX6F02.tmp

            Filesize

            91KB

            MD5

            e13326ecef7c9675da8e8b963ddb0225

            SHA1

            a942b2d13f6457b95c227228136b53c5c1e24a6e

            SHA256

            2f251c129bc807ad89bea7e541b637120d0a3382ac1a22c5bbf098efabdb2885

            SHA512

            eff9696ca24d4980f498c98de1d1e01863af906d5ff22ae6842c0ec431e9613b54d6b7190e2b762431d3de5dec7dacc1f6641cd01b79a210e458b1f73b98e35a

          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\RCX6F77.tmp

            Filesize

            118KB

            MD5

            c564ceac6900f7b74cd795c4115993ea

            SHA1

            4d03acfd5470b3db6e781133c91cda7ede3d41b0

            SHA256

            14d69663df065212e24f63027a51336963daaa80e5d2e81d680e20b7833a8fdc

            SHA512

            464062f6045a8bfdbb6449ef719606fd3bdb73236e9d5d0d75801e7208de60e90c5ea25d2aab23719052a360ce9bf1b7c2f8be70290f083411aafa2fcb1cb7e5

          • C:\Program Files\7-Zip\RCX6117.tmp

            Filesize

            91KB

            MD5

            0cd8d6cfe7900d3783f975d45dbdbadb

            SHA1

            a4a1619e809968f1852acddf32aa11c39b2eb7df

            SHA256

            8543b81987109e3d990b6c23aff585d5079873484d06d23d797b0a80c40acc14

            SHA512

            414862c633f8a311461ca601943abd0145ae34fe849d04de8ecffad3f6c61fe33e86cc6713aec998a6f801c8029cce4dfb63060979a5ea87842a2481c41d6526

          • C:\Program Files\Java\jdk-1.8\bin\RCX61FA.tmp

            Filesize

            92KB

            MD5

            f927d998b5aef64fa0996971cd3fa86f

            SHA1

            a8a7d8532847087376509b5e641023a675c96678

            SHA256

            b0b2f258f1eea70f9b4a0a08849f677c1db41bbd52412c9eacd6ddf3f4149e21

            SHA512

            25144369a7226748eac3989cf0d3304f04e15984d2b4417b6270817d8350b82a510bad4602f92f18569dbadb8cf71cfc31ac8bc26ded21a1bfdfcb10d32c18c0

          • C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe.Exe

            Filesize

            4.3MB

            MD5

            d7bdb550a06aa2026192cf449cbce2eb

            SHA1

            8034333b482a3d9795e5dcdad8b3c59aa2bfa7a2

            SHA256

            0f4914c28893782124a73d2a349164702b190a682d24b9c50a0ac8d8f1eb525b

            SHA512

            e8872317672afe03bfb15ee388730feb50bcab04f29f8735fd6230581c81dcb6b705752d37d76dca09509a8b993d1c79de9e92f130603622af03cd5b524e8e38

          • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\RCX63EE.tmp

            Filesize

            91KB

            MD5

            d3d8d0611a1a727335d27bf5c44695fe

            SHA1

            10b79ad4945b18396aaa54b5b0f92493d743637a

            SHA256

            322921bb42798d427ff4aed3ae1d6aa169e56239c9c80857d0edaf8fd647c1d9

            SHA512

            c55cbcef2352a566ef35924105ef8d2bb89c49b008d9a1abb89270f2a3b7b21ddfe530f36ba9c05647165e8fdbe3da4fc2bed3c1baeeecaff4e4b2423c9271f3

          • C:\Program Files\Mozilla Firefox\uninstall\RCX6492.tmp

            Filesize

            100KB

            MD5

            a28fec5ca0c0b515e6df5f90744cd1c0

            SHA1

            ada6dd9803098afb4c15dd1200b131ade0d21a9c

            SHA256

            295f806ef3055356b0845438f63e2d1a616cde3e9695f1a1c6d0ced8a677f9c2

            SHA512

            05c8ee7a3c4396d5a40c82db5f6bb787e1083e5516ca44564d84bd45aeff5b10657d20c6927f5a571e1b064a168506954ba73935e37b3edbef26964f0a0c4b13

          • C:\Program Files\VideoLAN\VLC\vlc.exe.Exe

            Filesize

            1.0MB

            MD5

            3a381b628ac0bb8da52d08cf97f9d32a

            SHA1

            ae605761f0a9f3648bb6b9562d705b00fa7e5fd3

            SHA256

            e7bf7f9aa7d7a7da634075ed5713b9121ff78ecd774e5a0c1c64e88b924e5a7c

            SHA512

            71a789f71df3ebca8af2b0fbf9a3112d6279c843784ddf7f892bad02ccc3b3937b31422864a32972cc568447c9ced6559b0e2347f3795ba0d25dfd1300eb816e

          • C:\Users\Admin\AppData\Local\Temp\$$aD37C.bat

            Filesize

            530B

            MD5

            49fba7f13db31aa8ab7664c0a6b9deba

            SHA1

            e90dba3ac71ad7064d5d3e347e84a43cd8298a2f

            SHA256

            c5afb47bc1ade3f24085e2337e59e58c6fc67d42523aa51ba43c5e8d2cc6fe13

            SHA512

            08d6e60b490690f6db90f8bdeba99d92ee03d2676fc48edd26c6c6520459e9ad8fc4250e8e0a7a8b8715f7cb855072e4cb7b15295083b26adf07c5132047e01d

          • C:\Users\Admin\AppData\Local\Temp\1c24af34de95be7460daa1f9b675c35a.exe.exe

            Filesize

            847KB

            MD5

            c8f40f25f783a52262bdaedeb5555427

            SHA1

            e45e198607c8d7398745baa71780e3e7a2f6deca

            SHA256

            e81b44ee7381ae3b630488b6fb7e3d9ffbdd9ac3032181d4ccaaff3409b57316

            SHA512

            f5944743f54028eb1dd0f2d68468726b177d33185324da0da96cdd20768bab4ca2e507ae9157b2733fd6240c920b7e15a5f5b9f284ee09d0fd385fc895b97191

          • C:\Windows\Logo1_.exe

            Filesize

            93KB

            MD5

            00d5b234cc6206e5c8f51a1786c54197

            SHA1

            9ec40410e00acc436136945cf2c1fc956fdb3362

            SHA256

            c858c709ecfd1779991256c0803786c768bd769d94424ba5e607a36faaabcd45

            SHA512

            32551d560529fd1c0a79bec91c7a79e8dce2af26d9547162baa3dea8d1e6619c17e531f54b20a85a690a47561748dd80ab10522c12e1d9b92b1dbc0bc70bb363

          • C:\Windows\system32\drivers\etc\hosts

            Filesize

            842B

            MD5

            6f4adf207ef402d9ef40c6aa52ffd245

            SHA1

            4b05b495619c643f02e278dede8f5b1392555a57

            SHA256

            d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e

            SHA512

            a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

          • memory/2608-8-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4848-17-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4848-1030-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4848-1150-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB