Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2024, 14:25

General

  • Target

    3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1.exe

  • Size

    252KB

  • MD5

    9a7004ab65403d61950a20c8725258ea

  • SHA1

    7fd1636ea11873720c5943b8e683e1b63e65bdd3

  • SHA256

    3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1

  • SHA512

    37dc13acaac7909cc52d747818b13c8dd2b83f2a36c5d9bbf1004ea04d279e0c0cfe4dad0ebb769c95986733a32d29647e5e234ba95de8498a822e0ef6db6d9e

  • SSDEEP

    6144:C846tGdyKQZbO5JCSZT0wwla4G13CmdxLzI9LTB5xnmT:C83NlbuJcfcXbz0Tfxo

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3424
      • C:\Users\Admin\AppData\Local\Temp\3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1.exe
        "C:\Users\Admin\AppData\Local\Temp\3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1880
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3912
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1896
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3AC7.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2280
            • C:\Users\Admin\AppData\Local\Temp\3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1.exe
              "C:\Users\Admin\AppData\Local\Temp\3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1.exe"
              4⤵
              • Executes dropped EXE
              PID:2964
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Drops startup file
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3196
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4692
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:1068
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:532
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2008

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

                  Filesize

                  251KB

                  MD5

                  27df0d40429e33df59e61fced7de1435

                  SHA1

                  e9b8fcd2042eda40526474ee7b207adf5bf903a8

                  SHA256

                  9e252c3d026541314681db1a8038865cda886902eb57a149b5613dc252ddcac7

                  SHA512

                  7965301ca8af9e640822a96c77c8a909c56119d319522e0a6cda00d7c4e6c5375b67fe6f6715924b998d74d080b6242343e43fb39642c1f285462a764312832d

                • C:\Program Files\7-Zip\7z.exe

                  Filesize

                  577KB

                  MD5

                  458e6757b39072b70ca4f3b6908a3002

                  SHA1

                  1161df6f747a578654c9d04667561a59d64fdfaf

                  SHA256

                  d86fb9fe76c22133e2f323bce1810f55d545f30ebacdf692e7ce6c45a17bab44

                  SHA512

                  24e048cd183174d98b2358378669b9e5344c01f3f2991508bb1c8f56dddf0879fdd75e3bfbe5fd33c73d3ef9c20f9fa749b7df1c3a5558a61f7c455d20622daf

                • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

                  Filesize

                  643KB

                  MD5

                  635e9422a0a86f5c7ac989802b0ac448

                  SHA1

                  3ea9cc1462b063639526a8d278b571f38b846d1d

                  SHA256

                  a97d8545a6204abf1a179f2098ca8780e92f4448c7a03e62f6c32e8e5e5cb17f

                  SHA512

                  857c6d683fe1f7a6757420c84efc4f7f48f58e586e601c969ce27e4ded8cad6ca774ef367a1a1e075081c4e2d41f8cdda558fddf5622e062975cfeff5a929133

                • C:\Users\Admin\AppData\Local\Temp\$$a3AC7.bat

                  Filesize

                  722B

                  MD5

                  9ed2bbe7e1b15f4ad982725a22df9b40

                  SHA1

                  529945ee52e2eaf8472511adab2613747105c81b

                  SHA256

                  34d9ca5daf39b4f5f22e7a0739bfb285aba423f2ea3ef479d4cca1dcfb0c3496

                  SHA512

                  87022282a7efc3cc7927c99923b274f10378373bc001b7c690de8005e88d86cd097d3d56bbda94b272efc06ee65895075faf35823e9d13beaa3580ca8cc7db3a

                • C:\Users\Admin\AppData\Local\Temp\3d1e31ed4a39813d9628531fba843d42a172469bbac226e4a51899c2365fe2b1.exe.exe

                  Filesize

                  218KB

                  MD5

                  5f1707646575d375c50155832477a437

                  SHA1

                  9bcba378189c2f1cb00f82c0539e0e9b8ff0b6c1

                  SHA256

                  75d348a3330bc527b2b2ff8a0789f711bd51461126f8df0c0aa1647e9d976809

                  SHA512

                  2f55dd13abfeb5af133ac5afb43c90fd10618e8fb241f50529241cff7987fff382cf151146855c37ad8ae0401b34f6d9aa32cbec03cdd67a224dfe247bad6c99

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  548b59c56dea702c153092f3c9befd52

                  SHA1

                  77d37ef5a746ee53d8b7c3ae82c4d2eca3e05d08

                  SHA256

                  e67be4ca1372399b73443f6f60c634806266796a0c84a22a55fa0080eca30b3f

                  SHA512

                  0ada1c693a1a40ff9d5407b633a4571268830bfd7edfa7bea370c96675a73269c4861c1c19a7ed478b42e95a91bceb386ce90bd7601cee4ca1076976d00e2e7c

                • C:\Windows\system32\drivers\etc\hosts

                  Filesize

                  842B

                  MD5

                  6f4adf207ef402d9ef40c6aa52ffd245

                  SHA1

                  4b05b495619c643f02e278dede8f5b1392555a57

                  SHA256

                  d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e

                  SHA512

                  a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

                • F:\$RECYCLE.BIN\S-1-5-21-2860750803-256193626-1801997576-1000\_desktop.ini

                  Filesize

                  8B

                  MD5

                  1b16d2dbd4281ce4e4e5729c608dcb0b

                  SHA1

                  851e624080ba5598edb808d4b30fe2d74999ce18

                  SHA256

                  c9e46fb51d0588ca1e48ca66731e11992770b9b74a982f9bdbb6ce5b5b75d549

                  SHA512

                  cd1c4cf7c7871cb48ce735226b25f689b340037e6c992441e566161de7fca7410762d1a0c2670ee4b6546f7ee854d3219e0e2315c3e0387d9bbe3f08076b5a59

                • memory/1880-0-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/1880-11-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/3196-13-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/3196-20-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/3196-5182-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/3196-8734-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB