Analysis

  • max time kernel
    152s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2024, 10:18

General

  • Target

    2302d4d189f215b96c37cfe141b2e3130fb63fd060a04910950cff4b1549a047.exe

  • Size

    70KB

  • MD5

    2b5c3664f6e4ce63bf2ad9fc0430ec37

  • SHA1

    72c7d50f70fd2ca23265c042dbefcc382693baaf

  • SHA256

    2302d4d189f215b96c37cfe141b2e3130fb63fd060a04910950cff4b1549a047

  • SHA512

    259d057c352888e6b5135b9015e940ede8911666a93224a891ee98b60c8e905b4bb6cebdb7111883dffd7e36c399b60e9d175d3c2e180e12a6ca824b243d0278

  • SSDEEP

    1536:Qh1oRJbj/e+Zk77RNCLp44x6eriw+d9bHrkT5gUHz7FxtJ:QCe+aX3t4xrBkfkT5xHzD

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3332
      • C:\Users\Admin\AppData\Local\Temp\2302d4d189f215b96c37cfe141b2e3130fb63fd060a04910950cff4b1549a047.exe
        "C:\Users\Admin\AppData\Local\Temp\2302d4d189f215b96c37cfe141b2e3130fb63fd060a04910950cff4b1549a047.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1260
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4672
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2872
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a33CD.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1468
            • C:\Users\Admin\AppData\Local\Temp\2302d4d189f215b96c37cfe141b2e3130fb63fd060a04910950cff4b1549a047.exe
              "C:\Users\Admin\AppData\Local\Temp\2302d4d189f215b96c37cfe141b2e3130fb63fd060a04910950cff4b1549a047.exe"
              4⤵
              • Executes dropped EXE
              PID:3832
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops startup file
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4560
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2540
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:3912
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2980
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:4084
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4472 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:8
            1⤵
              PID:2768

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                    Filesize

                    258KB

                    MD5

                    9ac10f2289f81d00cb5315e30a25967d

                    SHA1

                    43f3ec8b12b8ef26c5e0151a50e708edd8a3e979

                    SHA256

                    a978211529b28a3b66408c32636b82ef4405121d57e90a911c60f3810be3c0cc

                    SHA512

                    211d2c4d98509e4b0df64c0b31331431486886ae40c106ca1af496a2573fcfce3737d3574f6f41e39b02cf35b67859c14e46d58b30cf59062f8b68ec76dc1a77

                  • C:\Program Files\7-Zip\7z.exe

                    Filesize

                    577KB

                    MD5

                    9b73ea744610add358a523c48b536d6d

                    SHA1

                    38d35606d7b18b9f9ec4e4bfac20b523ecc1ed88

                    SHA256

                    02cff7e352a7c94505a1d1c73425ec9968637b9010c8c017dc70f7d6a78a3a45

                    SHA512

                    aa6b8405c175a2cf9be163d8f282894498f2e8ddffde0caa59c0ad2b357582fd21454f1b742d2169e1d326576e08ed8869de861f549cc0fd8c1e4c42fbe6b3eb

                  • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

                    Filesize

                    488KB

                    MD5

                    85b76d0e0da4b34c0acc7abcd83d7150

                    SHA1

                    3c361c827353e87281950c2baef4ed7a24eee844

                    SHA256

                    a2beda607517ea941d193ff76cd746ba01dd55a62725874c59e93776cf3f3f53

                    SHA512

                    407a41a1fd8a4e24dbddbc624a50a94d101c541e9d73e5db4b1fa68fd2915c1cb92f6444fa8416429134b88610de31be620eaacda2b9a96e76182ca2323c3644

                  • C:\Users\Admin\AppData\Local\Temp\$$a33CD.bat

                    Filesize

                    722B

                    MD5

                    edd925e7b3243ebd294efafa1a66da13

                    SHA1

                    e914d4a7394cbf4363f84c6563d59d3b4518c2dd

                    SHA256

                    af017f6031e24feb8430bcbd07200ce52548123b56c068714aac7ca7b451714f

                    SHA512

                    d45199cdeac9c99f8b97ec2d4094682a48d85a74c978b08fdd96a24a7a905338a7fd80c34ed911bbc64b4473d9b58ec8b33ee2af31c6804268f6038a48aa833b

                  • C:\Users\Admin\AppData\Local\Temp\2302d4d189f215b96c37cfe141b2e3130fb63fd060a04910950cff4b1549a047.exe.exe

                    Filesize

                    36KB

                    MD5

                    9f498971cbe636662f3d210747d619e1

                    SHA1

                    44b8e2732fa1e2f204fc70eaa1cb406616250085

                    SHA256

                    8adf6748981c3e7b62f5dbca992be6675574fffbce7673743f2d7fe787d56a41

                    SHA512

                    b73083c2f7b028d2946cb8f7b4fe2289fedaa4175364a2aac37db0aeff4602aede772ccc9eba7e6dcfcb7276e52604ca45d8021952201b5834485b48bca3dc93

                  • C:\Windows\Logo1_.exe

                    Filesize

                    33KB

                    MD5

                    beaa56a0e4764dd95329202a0a92e326

                    SHA1

                    1e18f4051244e4aa8eabbddc7001ffcdc2adc055

                    SHA256

                    02424a4ca6ac65d66c89b79493d30a0c54c46da6ec225ef5ae1c724913451a08

                    SHA512

                    fc65d6da1e1f112abbb37c5227823980d644b6436cec5d44a75de9e97ba9e709010fc6edb064c592ce931412612010c7254bc5eb6c4aec004510786525276e25

                  • F:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\_desktop.ini

                    Filesize

                    9B

                    MD5

                    31874817e0fb055be8d2c971c0e3bbde

                    SHA1

                    ee8a35d6a86cb6d13f354d67d912e194bb09c74b

                    SHA256

                    94de8b492bc2db9a9592f7c9433547eb7f80826ed67f48d2bb7e22db9d49f544

                    SHA512

                    55747c69ae50fa212576d095f60cf33b42e26789cf8c34fc5120a45b1988aae95f91d9e37cb17298c5ac5243b2e4c40e1d0e084ce7fe14bceb4ebb318c65c944

                  • memory/1260-0-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1260-11-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4560-1723-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4560-325-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4560-2726-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4560-8-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4560-5506-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4560-18-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4560-7651-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4560-8818-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB