Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-05-2024 18:14

General

  • Target

    d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe

  • Size

    66KB

  • MD5

    3f9c2a945b4cc81d677874066edc4ef5

  • SHA1

    2944b7ae1df1e60a83dc148b577647fbf6c20987

  • SHA256

    d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6

  • SHA512

    9a4d19be4755145b8efdea55a8439126abd9b96fa78d9892b7099655ab087d278871ee2e66b906e3c8282535754898593dfe7ff83a97b43f2203470f61f953d9

  • SSDEEP

    1536:Ig8Ze+Zk77RNzLiTOwiS4qz0XSW3iG47fy:Igae+aX3zvZS4qz3G47a

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe
        "C:\Users\Admin\AppData\Local\Temp\d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1612
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2084
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a864F.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Users\Admin\AppData\Local\Temp\d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe
              "C:\Users\Admin\AppData\Local\Temp\d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe"
              4⤵
              • Executes dropped EXE
              PID:2732
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:840
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2592
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2744
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2884
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2664

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            81a0e302bbfd88e0fa1e7a21dec03386

            SHA1

            423f9191a497994c2fb959806c9ad0ef5b678d0c

            SHA256

            8f8b833c8ee99eb2bdcf44ae370ed5505681331b52adc56815d96a263e60cbe7

            SHA512

            b4b05481f1026a2aff43ae42416c943902f87ddab8941fab5c8f4875956fcc67e8ce66acb4a7e98d705769b75c01beb0a9be279b29c8a2e9dfe5ae96bb742d00

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            478KB

            MD5

            58e981aa689693f5695bae5cb00cfa39

            SHA1

            d8d4575dd3f2aaed503388aae63b3a947f7a7e82

            SHA256

            0947128e04349f2829e54dad392e85b448539782dfcc666e382b361e9489a488

            SHA512

            e41d12ba89eac143445597ddbc7bab2945b273acc26a49ea7982864be31ae3c3ec6838b3f237b6285e8c1ba6cd15161736bcb88a75dde093f9a1916e7c938661

          • C:\Users\Admin\AppData\Local\Temp\$$a864F.bat

            Filesize

            722B

            MD5

            e7bb0bd7f55ceb604e8c94e120f8b901

            SHA1

            fb926f4310e9c1b19de49a86fd0c733fea987660

            SHA256

            5ec91b2ca8ea283537a80a6bfe6de2179adc7080c4f32d1a9d720e179f1f98c8

            SHA512

            d3e7025a4cb23e3872130dde8083aea64b2572676f458100d0286192c1e1ebe6a09b930a8f02714832ed76f1fb9a9c3c7fb6879fdbf6c1ce046d4dcdcca85073

          • C:\Users\Admin\AppData\Local\Temp\d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe

            Filesize

            33KB

            MD5

            8d8e70465b638a0fbef479bb1f9a50be

            SHA1

            c39e2a1b7712f6edb3ab8da7add41102bbc2646a

            SHA256

            7152bd71bfdf164229ec3664980fd0f5389790fb2fb852c770ffa901a3087ff6

            SHA512

            11ad37a481f65d48e522d035ffa7cd0ac0a4c4258dff97de738ad4dccec025c4e408af9917f807313ee98169387661f0e0446df187180d36ea8cbfcd1f21ddac

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            420f125d677f0bf19d6130ea59dfb694

            SHA1

            c26ae0c439982374d7ed6db90761cdb1d4f2f617

            SHA256

            4784cbb5bf5947b0729e72958deb0c4f12222523aee7f3c19856e16f9e2068d2

            SHA512

            23cc499e39b347ecd15b6ba5eafd3455295bcf0508b14e65c24928cb9e6d90d5c324ae3687186b954d4549dccce2087f08fda10bbf1205b19df74ef6b1a773ee

          • F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\_desktop.ini

            Filesize

            8B

            MD5

            0282826728a8bfe9c3f290391e4f323c

            SHA1

            ab69946ecc2824015e04a669b8434e8eb2a658aa

            SHA256

            0c3ddb95f5308286721e2d55c16a3170674b54fc8d17c1f02bee1b6850ce2ee9

            SHA512

            fde2cb3a9b14fa79fdb7615c094a85aee3baf100511872c0b3986349edefe5a2dc4513929587852c1672e9632c8a6c95284fab82397133dec597bb8fe618fb0e

          • memory/840-19-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/840-32-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/840-1928-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/840-4081-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/1192-28-0x00000000021E0000-0x00000000021E1000-memory.dmp

            Filesize

            4KB

          • memory/1612-0-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/1612-17-0x0000000000230000-0x000000000026F000-memory.dmp

            Filesize

            252KB

          • memory/1612-16-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB