Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 11:18

General

  • Target

    a475a028012948e78ee5e16c3fc3971ec5f8b47f281a0f2f49c1ce4b8126f491.exe

  • Size

    322KB

  • MD5

    166bb278dde1983d4232bf94579c2bfc

  • SHA1

    c4a32c97c6ad523a9d45f5e1bedbe384cd9680b2

  • SHA256

    a475a028012948e78ee5e16c3fc3971ec5f8b47f281a0f2f49c1ce4b8126f491

  • SHA512

    a33c3b0888bdae4cc0ead6e5e56aa0f7fd99cacc2c2a43100537cd953beb6f1356a56b43a77dac91bce7c7f65eca36ea7167942ad9701d8d2ff3274050a5869e

  • SSDEEP

    1536:rGFaYzMXqtGNtty1yVumRTTi9aJfXgY1zUTyr5hVM:rGFaY46tGNtty17+XgTTSje

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3456
      • C:\Users\Admin\AppData\Local\Temp\a475a028012948e78ee5e16c3fc3971ec5f8b47f281a0f2f49c1ce4b8126f491.exe
        "C:\Users\Admin\AppData\Local\Temp\a475a028012948e78ee5e16c3fc3971ec5f8b47f281a0f2f49c1ce4b8126f491.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5104
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3520
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:3232
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7CC1.bat
            3⤵
              PID:1748
            • C:\Windows\Logo1_.exe
              C:\Windows\Logo1_.exe
              3⤵
              • Drops file in Drivers directory
              • Drops startup file
              • Executes dropped EXE
              • Enumerates connected drives
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3016
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:896
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2152
                • C:\Windows\SysWOW64\net.exe
                  net stop "Kingsoft AntiVirus Service"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4068
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                    5⤵
                      PID:4892

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              258KB

              MD5

              e194e3f599f585b521b00ba7d99c03a5

              SHA1

              2ade918605a7a60bcc840819b52c6fb5f470921b

              SHA256

              b70334eb15d0c19fcb70b2d250e32a01f1a17bd230401155d3c4fe3065242aa9

              SHA512

              b7e3c0741cc3ac540da389b2fa66501e1a6c433ab0b22c99b38f40dc57d940d81979b08859d8daa67cd002b02ead5daac4ad9cafce5186bf35b536f6de4b7957

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              577KB

              MD5

              cac99ad0161a99e0d6fd07e1843524b7

              SHA1

              c3d87148ecc623592a8061ce4ad6c88584e115ad

              SHA256

              62d5cd98103b1dc5452f455a26f2b566812386597eb9cfee2ca3b5e01f0a0f27

              SHA512

              f479dc0ea615699d832539642d4bd63325e1b47e147fe3e94cc6584fc205fa4a1e454375ea5da87238b8210d3565ab742136c3ce850842b76a1335e626041081

            • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

              Filesize

              644KB

              MD5

              d9b62e4240dd99918ec39a90574fcc1e

              SHA1

              aca7b6d133487779dad04399979342285ac7ac74

              SHA256

              3c9be9eeff4911ecb235ec57a0c90c6db74b371d45c7a6fae2afac78a1bf1391

              SHA512

              8980894349e1d3708f8176fcfc23675061d402126a77af27e6eb61d4d67d41bb2b1e743865f1626a77cca89aff29aa24d21c8cf3f879aba9bd8c0b9a035b8026

            • C:\Users\Admin\AppData\Local\Temp\$$a7CC1.bat

              Filesize

              722B

              MD5

              9605ce66a94010f694953e728884febb

              SHA1

              77c33489bf082f58b2be4f294380210c114a6698

              SHA256

              1ac46d7d788c5d1524d49e4df8e8d5ddeba557127580e5b75d261244de9f6086

              SHA512

              205c398cfd51fbe8805f84a1f6701234d9b30797c378923e6a289830006936e8a532efcadcae661b6f43848797aac837e7d997e6c5d7bdd66a27f91318b528f1

            • C:\Users\Admin\AppData\Local\Temp\a475a028012948e78ee5e16c3fc3971ec5f8b47f281a0f2f49c1ce4b8126f491.exe.exe

              Filesize

              288KB

              MD5

              01bbe782a1da233c59881ed2d18f4f06

              SHA1

              723d4dfdab2b477633455d4775e32bd52f081c7b

              SHA256

              7ded5e3c9c066789a50305a048639afeab4dffcc9673ae7f1092e5af7c6a91b1

              SHA512

              492b202ab850c4f120c4ac7854bf7e7acc865505679d8973736ed3ea28f4b77b645c8a15d806805064ebc81ebd1b4bf07e1fd4023307673d3ce4b81d49c7d175

            • C:\Windows\Logo1_.exe

              Filesize

              33KB

              MD5

              0c024d12adef144def06e6f299357485

              SHA1

              896f33f1c0bc5c6644094f07d44e2bcc377958bb

              SHA256

              df70e984201f34822e49a6da9037e738e596a51d3e190cf4b76b8c64ebd3c30d

              SHA512

              072a920b5fd0373d40947b9410becd9df1bfdff8913bb0650272a3e4c46b29b826b42998b61426b7eb6fa8d081066d0b0aa183dbf0044e9119b10f9a3faae09d

            • C:\Windows\system32\drivers\etc\hosts

              Filesize

              842B

              MD5

              6f4adf207ef402d9ef40c6aa52ffd245

              SHA1

              4b05b495619c643f02e278dede8f5b1392555a57

              SHA256

              d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e

              SHA512

              a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

            • F:\$RECYCLE.BIN\S-1-5-21-3906287020-2915474608-1755617787-1000\_desktop.ini

              Filesize

              9B

              MD5

              31874817e0fb055be8d2c971c0e3bbde

              SHA1

              ee8a35d6a86cb6d13f354d67d912e194bb09c74b

              SHA256

              94de8b492bc2db9a9592f7c9433547eb7f80826ed67f48d2bb7e22db9d49f544

              SHA512

              55747c69ae50fa212576d095f60cf33b42e26789cf8c34fc5120a45b1988aae95f91d9e37cb17298c5ac5243b2e4c40e1d0e084ce7fe14bceb4ebb318c65c944

            • memory/3016-13-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/3016-19-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/3016-3011-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/3016-8687-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/5104-0-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/5104-10-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB