Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 03:16

General

  • Target

    e41fba9bd3a1fd51df82b24fbb90831877e373f177256d7a2b7c4e8c76e915e5.exe

  • Size

    6.5MB

  • MD5

    701d0e0c9d2ff5afd46062d441629e31

  • SHA1

    b3c6ca84ae058c7a27695d36e3715f7268129671

  • SHA256

    e41fba9bd3a1fd51df82b24fbb90831877e373f177256d7a2b7c4e8c76e915e5

  • SHA512

    cfc09be40c82568f56464bc6a0054a743b31532eefe419dfd2cb2378752d3f4368dccb907057a3e7e42a52f51eed1d91ec20584808e10df43018e8283e5eaa9c

  • SSDEEP

    196608:mBCzNA7rlvRz1rrFBV6tpjuj6gYPKHCKsg:8jUtYj6gYPYp

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1144
      • C:\Users\Admin\AppData\Local\Temp\e41fba9bd3a1fd51df82b24fbb90831877e373f177256d7a2b7c4e8c76e915e5.exe
        "C:\Users\Admin\AppData\Local\Temp\e41fba9bd3a1fd51df82b24fbb90831877e373f177256d7a2b7c4e8c76e915e5.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2804
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2076
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1E69.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2820
            • C:\Users\Admin\AppData\Local\Temp\e41fba9bd3a1fd51df82b24fbb90831877e373f177256d7a2b7c4e8c76e915e5.exe
              "C:\Users\Admin\AppData\Local\Temp\e41fba9bd3a1fd51df82b24fbb90831877e373f177256d7a2b7c4e8c76e915e5.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2476
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2600
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2612
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2744
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2564
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2464

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            4c15a1329088ff77b5479df438370ffd

            SHA1

            591de2b5b117bd70cefebc1b13a1ea595a63495c

            SHA256

            c6268df7f49f01b090ac4c8c1b50335d45d826f41d8d2bbb0979472f02eaa20b

            SHA512

            ad29663a5ec1f50dd06d9eb9a2a372e0cd4026dbdc63a315dcc0729c0d11666de703c3410eebe195bd25043b7bb5542734f58726a320f26c384ce34600b687ad

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            478KB

            MD5

            9839a77e8d0dfaa2934c1da0f37c2f36

            SHA1

            7e7645f023b99febe0e83e7c54addb275baede8f

            SHA256

            4f0aae7a5e86e4647ef8c1a5a285445c1b72c969b08fc108b1b3cfd645d04d13

            SHA512

            51f29b449a7e34dba2791bc6e01a62653194a0a85cfe8de45cef5bfecffadccbc00d9347bbcac738efd1b84cc6bc0826f67a931e168a79ed6c5f565036fdc1fd

          • C:\Users\Admin\AppData\Local\Temp\$$a1E69.bat

            Filesize

            722B

            MD5

            e4b15dd51d42065aef1e37abaf475dd4

            SHA1

            9a91c2c43675e793677399a75090d566b2f011b5

            SHA256

            1c84bb626e2db7448fb768ca235160b92f00efc914f8ba822e79cdfd7834ad26

            SHA512

            beafa84e788e22e3594a90b11ce47a0271a27abb31ee907a881ea7f5edaea15ae8ceb03dbf2b6b004ac063c081a96e52139ea349ae00f0d0fb08a75a977820d4

          • C:\Users\Admin\AppData\Local\Temp\e41fba9bd3a1fd51df82b24fbb90831877e373f177256d7a2b7c4e8c76e915e5.exe.exe

            Filesize

            6.4MB

            MD5

            f24affc10132405930282aaeb206b7b7

            SHA1

            462d7a447a7d6f06bf3083c2af2f00b615c6a1a0

            SHA256

            abcca6f158b94303d92197bf8e6db545fe4929161e3767619176c4574ccb70fc

            SHA512

            c7729e3a050797b7d2c6ee07cc432c6dca56ffdb6b7e2662b1a70c90e287bbb2480a3752f262a896110f60f9ce18f884452f3cae3a06c80bef5eec476fba8cfe

          • C:\Users\Admin\AppData\Local\Temp\redirects\choco.exe

            Filesize

            133KB

            MD5

            d90e7a1e7632f8e5cc8cf6edf61a02e5

            SHA1

            72004beb61176285bff65f9ea36170f8347a706e

            SHA256

            535689598ec06875df0d5e3a60b37d4a7f25d97904c13c6c22156e5e79f1f395

            SHA512

            b6b51b01aa204ff7cd6b51b98bad4dcecb78f8b32ba871616039297787764b8f852c16d17da9b0aae28e7c686332c7d818fdf6762d80e915fb80001558cd468a

          • C:\Users\Admin\AppData\Local\Temp\redirects\chocolatey.exe

            Filesize

            133KB

            MD5

            abb84b310fd7f8f17ed9b14497002846

            SHA1

            9c695bcb5d776b7513f2361c8664d69fb29fc1a3

            SHA256

            1341c98f2f1ede3688f5a8363a519e36a749e2562265b46b15264a1323e29f0b

            SHA512

            86983f86b2346436c1c0036b2ffe49d9fc4f49542d17daf0e5bbff6dcd70f830a37a917f946e5ca1b14afb3e7c17a6aa8f07f25ba8db20fe79c57490efd0a63e

          • C:\Users\Admin\AppData\Local\Temp\redirects\cinst.exe

            Filesize

            133KB

            MD5

            ea8d0e64949e4a1dd268e213bffedb3b

            SHA1

            eae7f2b6c518b4c2809a0eaf144c32f666a9a229

            SHA256

            f1e39da521eb88abf30cc85979068acfbd4fd1a8e7666d0f0d8bf8a1a8b17d55

            SHA512

            8c049ce10dc11da1cfe0bcfe5d003fce822e7574abb606ca35a5edf8b2192152383fc8b59b9552e6fc6bf6633fee7191523db95182107986b7e5cc69c0600a9d

          • C:\Users\Admin\AppData\Local\Temp\redirects\clist.exe

            Filesize

            133KB

            MD5

            24599e1a44d180a90b892f310be34cf0

            SHA1

            cbe1160ce1a59117e8a13072ed990c09a2ec3898

            SHA256

            4eae23e60e21119933e885f14c6af7bffd146169124449ac0dae4163fae9310a

            SHA512

            5daa1be4e2a2070d0a4dc257db20180a33f9f0ed4d1fa47057ba588298fc3c5d3226b4ee57508a2b78ef81a036ead17f0eae6f4060cd36812f7bba2d96618f93

          • C:\Users\Admin\AppData\Local\Temp\redirects\cpack.exe

            Filesize

            133KB

            MD5

            c349a3e32a452c01b8bed008650c1ace

            SHA1

            00f5a6b3437f174996fde344dee7e8b35017fc38

            SHA256

            621175c3353570c949e3b26fb69adb944ae15712a9e0e6dd6daa4c8b33175f1f

            SHA512

            8784f25a0c065d884518b4a7d31d62b1c55de16c34612761358807ad997bba856739715af2386ac057f8a4004867eb87dc16d7fc90df892ac66d5c261da20b82

          • C:\Users\Admin\AppData\Local\Temp\redirects\cpush.exe

            Filesize

            133KB

            MD5

            b66f5076f26f85adcc6afabe79d4767b

            SHA1

            19c4b73a67fe31d405c61fbcd3104c1aa0b6c527

            SHA256

            4079acd4abde598ad8bf0e2368eae4bf6de59855480142534079e7087cf4e91c

            SHA512

            bd7a416a683aac32717a77eb575fde5d7173d51a4ebf6d6034de6c051eb17a578a1fd8f7264f5a178b6b1f3f03a36af4968d2751b3b7857ab258ad807a819afc

          • C:\Users\Admin\AppData\Local\Temp\redirects\cuninst.exe

            Filesize

            133KB

            MD5

            e5397e206e78ef51164db58a5e495b67

            SHA1

            3de44bc3acda3d144e0bbb872704d101c85aeb46

            SHA256

            55dbd872a103aad97ab68fc22bb273f889fa3310d05e93d9d127e0f9e69b9e8e

            SHA512

            f18c089432f3234c6817bfea79e7fc6bf350604badf1d099f2454fbf23c7ae2cc2432ab3cfdb8b93cb2b9ba1b23a0b72102486517aac7eca768511f85ea206c9

          • C:\Users\Admin\AppData\Local\Temp\redirects\cup.exe

            Filesize

            133KB

            MD5

            116367c60d1eba40e826cdfaa63f41e9

            SHA1

            8853cff09987e4348d5f856ef5ce53835de838ee

            SHA256

            a7e90590008877cac0c1ae81eea8f26dc6c5e0243838a05268802428f0f247b0

            SHA512

            a38f77093c65d62c61bb61b1005fa10ed9fb39e0280a846ae34cf561215d4e32c431782405047004aab1b2cd8591702ea3d70d3850e8fceb6104469f635c5b76

          • C:\Users\Admin\AppData\Local\Temp\redirects\cver.exe

            Filesize

            133KB

            MD5

            dc527f62005d5bac38a7f754d989f930

            SHA1

            6fa79cd7e09e614bfececf4115c19c2f2bbff256

            SHA256

            8921fe554dcf21ef7a43732853f9dadc79b27bd63ab900e3578768036ba28880

            SHA512

            6e1dd73c86dd92b7393afad9539704e908c179345f5d8926f97bef5829c2cdffb78b3f5fd4097fce40a6e270341487cc3d6e87b1e8cd3a582b34fd69f27116ae

          • C:\Users\Admin\AppData\Local\Temp\tools\7z.exe

            Filesize

            284KB

            MD5

            a42b35f975d88c1370a7aff084ee57a7

            SHA1

            bee1408fe0b15f6f719f003e46aee5ec424cf608

            SHA256

            56cc9e7e3767c0cffae8161bf0ad13457487c1b422e2879b897dbd4bab115776

            SHA512

            b92d05515e18277db660118934e70678ee2a3bb66005bad19bb417ffaedb22a63727a5a697ca3ac0f6c48f6f5593ba45ab80f4ebdc0eaed10d80b7af04d45b23

          • C:\Users\Admin\AppData\Local\Temp\tools\shimgen.exe

            Filesize

            195KB

            MD5

            26e2c04f68479a4114cfbd9a77fbf22e

            SHA1

            0a8f5303c8e1864aa2391a2dd54d48a31a44588b

            SHA256

            1f32b3c49712a278c385676676b272c758440a6d5969b430bc53c5ed6acff81e

            SHA512

            b81c34d1144a5e9e9a2a486d717f40d5d2d0a9ba94a37222e432c998c2fc104b8f48f9bf2040ede3927bfeaa22f8ef9fab48cd88abfbf78fe291440fe5bae057

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            9b7334d808b965b2b0dfd26f684a4632

            SHA1

            0bba0aa953c9e68f0d4bd4a33fd6fb52bc32866d

            SHA256

            6daa784e747e00acbba8d08b4f0b58c98b6d784b5c210ecaa6e7c2c130f14598

            SHA512

            860646ec685aeb185e3bd308e103408f6f95327282463d36d00b7c6abf0a87fe82fa7e78c6e488dcda5b8023534084b40d21c9767646aef91826f436fa8f967f

          • F:\$RECYCLE.BIN\S-1-5-21-481678230-3773327859-3495911762-1000\_desktop.ini

            Filesize

            9B

            MD5

            4d28283e4d415600ffc2f8fda6d8c91e

            SHA1

            053dcb8d5d84b75459bc82d8740ee4684d680016

            SHA256

            b855effeaf01610130d3f38de35bc7f98bfc6643d98d4198af18534f048e8df7

            SHA512

            73a758cd5e5ac48d62dd89719be604214895e0cc9a10ff7464a6cf9161a37fd27d15dd2d2565f18198b381ac6442bcb36f38614df7b1176061a83616517a7edb

          • memory/1144-137-0x0000000002500000-0x0000000002501000-memory.dmp

            Filesize

            4KB

          • memory/2476-26-0x0000000001370000-0x00000000019E4000-memory.dmp

            Filesize

            6.5MB

          • memory/2476-135-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

            Filesize

            9.9MB

          • memory/2476-29-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

            Filesize

            9.9MB

          • memory/2476-25-0x000007FEF5433000-0x000007FEF5434000-memory.dmp

            Filesize

            4KB

          • memory/2600-3110-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2600-140-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2600-18-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2600-4323-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2940-0-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2940-17-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB