Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2024, 14:25

General

  • Target

    3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1.exe

  • Size

    252KB

  • MD5

    9a7004ab65403d61950a20c8725258ea

  • SHA1

    7fd1636ea11873720c5943b8e683e1b63e65bdd3

  • SHA256

    3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1

  • SHA512

    37dc13acaac7909cc52d747818b13c8dd2b83f2a36c5d9bbf1004ea04d279e0c0cfe4dad0ebb769c95986733a32d29647e5e234ba95de8498a822e0ef6db6d9e

  • SSDEEP

    6144:C846tGdyKQZbO5JCSZT0wwla4G13CmdxLzI9LTB5xnmT:C83NlbuJcfcXbz0Tfxo

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1.exe
      "C:\Users\Admin\AppData\Local\Temp\3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1.exe"
      2⤵
      • Drops file in Drivers directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:1284
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a2118.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2860
          • C:\Users\Admin\AppData\Local\Temp\3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1.exe
            "C:\Users\Admin\AppData\Local\Temp\3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1.exe"
            4⤵
            • Executes dropped EXE
            PID:1100
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2112
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2588
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2556
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2592
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2456

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                Filesize

                258KB

                MD5

                b9ce17b2ca80fc031580509d0fdf5449

                SHA1

                487898f96ee8542ab8486ebae3d98e3369c44e22

                SHA256

                3ee112a1f71030e3d330f5e4f89417d250aa7dfbf1ee4cf08e1f1923a7b3ef44

                SHA512

                9e3fdf38c71c9acf54b30abbaa9ca4db5931be1f911e2ea786ab1d1ccdae0fc123b24a6fd12e6eb773b3cae9af7a6d53751172de207c43e180c87456af154e6e

              • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

                Filesize

                478KB

                MD5

                e93193856beaecee9905e2a6f36be17f

                SHA1

                d4c267ea34f28f048e29461656984aad70912eda

                SHA256

                1d345f4e09acdbc12e63ce90d0bd373b56d50a378f4603d8425f6df815e44a7b

                SHA512

                1fbe9c0e86ad98d6a2a7924badec0fffc69a7d0a4839e8af45d0aedf1e4e24a4a798df0ec5b8d0aa6e0e566c0c83a4030549bd32b9ac27406fc772d4a2ff5fc3

              • C:\Users\Admin\AppData\Local\Temp\$$a2118.bat

                Filesize

                722B

                MD5

                6e90150b918faa69266206712d8bbefa

                SHA1

                b223700b70b281e380b1f060c12e6915132c1a46

                SHA256

                f8bee8e15c4422bdeff81ff2088ee6893a02d60e3f2fab9fe3910bf52adb5bf5

                SHA512

                fb8e71c6262aa553c9a7594f4476531bad330d82e2a30ad70dc39f14d39366aa1942b3108b8432a115262d37e8f79f6504629844d96c84789c7a9e97488762c5

              • C:\Users\Admin\AppData\Local\Temp\3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1.exe.exe

                Filesize

                218KB

                MD5

                5f1707646575d375c50155832477a437

                SHA1

                9bcba378189c2f1cb00f82c0539e0e9b8ff0b6c1

                SHA256

                75d348a3330bc527b2b2ff8a0789f711bd51461126f8df0c0aa1647e9d976809

                SHA512

                2f55dd13abfeb5af133ac5afb43c90fd10618e8fb241f50529241cff7987fff382cf151146855c37ad8ae0401b34f6d9aa32cbec03cdd67a224dfe247bad6c99

              • C:\Windows\Logo1_.exe

                Filesize

                33KB

                MD5

                548b59c56dea702c153092f3c9befd52

                SHA1

                77d37ef5a746ee53d8b7c3ae82c4d2eca3e05d08

                SHA256

                e67be4ca1372399b73443f6f60c634806266796a0c84a22a55fa0080eca30b3f

                SHA512

                0ada1c693a1a40ff9d5407b633a4571268830bfd7edfa7bea370c96675a73269c4861c1c19a7ed478b42e95a91bceb386ce90bd7601cee4ca1076976d00e2e7c

              • C:\Windows\system32\drivers\etc\hosts

                Filesize

                832B

                MD5

                7e3a0edd0c6cd8316f4b6c159d5167a1

                SHA1

                753428b4736ffb2c9e3eb50f89255b212768c55a

                SHA256

                1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

                SHA512

                9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

              • F:\$RECYCLE.BIN\S-1-5-21-1298544033-3225604241-2703760938-1000\_desktop.ini

                Filesize

                8B

                MD5

                1b16d2dbd4281ce4e4e5729c608dcb0b

                SHA1

                851e624080ba5598edb808d4b30fe2d74999ce18

                SHA256

                c9e46fb51d0588ca1e48ca66731e11992770b9b74a982f9bdbb6ce5b5b75d549

                SHA512

                cd1c4cf7c7871cb48ce735226b25f689b340037e6c992441e566161de7fca7410762d1a0c2670ee4b6546f7ee854d3219e0e2315c3e0387d9bbe3f08076b5a59

              • memory/1204-30-0x0000000002EA0000-0x0000000002EA1000-memory.dmp

                Filesize

                4KB

              • memory/2112-34-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/2112-21-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/2112-3281-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/2112-4106-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/2352-0-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/2352-18-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB