Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 10:08

General

  • Target

    c764b532fe0ec439306cfc1f9d9b9e8a8fd98c16fe44808290660eab63975746.exe

  • Size

    131KB

  • MD5

    9ebb6422ed10fb799b45e4c9bd7eb41f

  • SHA1

    1f8925ddffbf932d421bc1bfd7b45f46c154bb02

  • SHA256

    c764b532fe0ec439306cfc1f9d9b9e8a8fd98c16fe44808290660eab63975746

  • SHA512

    c294a9d363dc9dd360d7838bb9662c560990bbd08e5b9166d099ff4ad5323c0d673472d092727909f046c118810841be79d42875bd4dc6a024f9e2276d41f684

  • SSDEEP

    1536:/BFsrz8VuJlMXaDuiNbR8Bftg+9t/p4QAILJuCOPdvX/ZWOtnGWxlP:/Bo8ulMXaKvvgmJAIlwPxX/ZWOFrb

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3520
      • C:\Users\Admin\AppData\Local\Temp\c764b532fe0ec439306cfc1f9d9b9e8a8fd98c16fe44808290660eab63975746.exe
        "C:\Users\Admin\AppData\Local\Temp\c764b532fe0ec439306cfc1f9d9b9e8a8fd98c16fe44808290660eab63975746.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3000
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:220
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:3212
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aED9C.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1060
            • C:\Users\Admin\AppData\Local\Temp\c764b532fe0ec439306cfc1f9d9b9e8a8fd98c16fe44808290660eab63975746.exe
              "C:\Users\Admin\AppData\Local\Temp\c764b532fe0ec439306cfc1f9d9b9e8a8fd98c16fe44808290660eab63975746.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4672
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops startup file
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1288
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3812
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:396
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3236
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:556
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4244,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=3760 /prefetch:8
            1⤵
              PID:4272

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              258KB

              MD5

              02569885e9369db7f7e10caf1b50ba83

              SHA1

              10a6f75e80a9f81aa4c6143a31eb419ff252c667

              SHA256

              f9fbd769b3a8bcc2a77241fa76adb574009dd443f0ebe5913450e2e9f21d87da

              SHA512

              d18ea18d470cde35ac5f775b8f51d9d0bbaeea64312a30ea4ed7261174cdc3c8ac60e8f205004bcac90c937fa732851d3f5bdf5dde3417b624f1ee24e87640c3

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              577KB

              MD5

              9cbfb2d8b810369151a70b6dafc00e6c

              SHA1

              a2bf7f5855a85a1695ec368dbf3df646e56830a4

              SHA256

              7e6e527caead164cd59d42d0efd2ef46f1b4836cc1eee682ce73a996cf086619

              SHA512

              761e3dd7f8b80a0ccf0380a9f875b8334249ad7fec9d44930079bce193c489dee7f8130d578f987eeb98c3ab38757d12f0e61c532c7d83af1e60981f88e4b018

            • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

              Filesize

              644KB

              MD5

              11e0853d537d2721ecc655c1fc527e91

              SHA1

              c8e23d103e93073ba7c93374878ae9a9f926c944

              SHA256

              f168cda7cfa0f4f1d8dc26f615772410afe41b43fbc3da3cfe2c249b1eadca30

              SHA512

              3e5af85789e480d355053e9ded02108ae53136aec795d5d37faf1d5426275f7f3729e5583b0a95b3434d5b4452c7382405c0f8bc94e8a65275335c62268e0ee2

            • C:\Users\Admin\AppData\Local\Temp\$$aED9C.bat

              Filesize

              722B

              MD5

              bf0e8bd1e4305858caec244db11e65d4

              SHA1

              fd3f59e06bc019672761a08c7a24e374698fea63

              SHA256

              53592dd68c271cc73f53fe6e20160e14d2b411f71109a5dbc76484bffca5d124

              SHA512

              57121e0dd9857358c56a459c3e07638868a289ab289eddc7e5fb87626950bf07e90a328771e3cc6b3680af3ba01100ead8899568ecf957a689e144d1a2965a05

            • C:\Users\Admin\AppData\Local\Temp\c764b532fe0ec439306cfc1f9d9b9e8a8fd98c16fe44808290660eab63975746.exe.exe

              Filesize

              97KB

              MD5

              713a30695b671b6e3b19b7d09f9d8409

              SHA1

              83916537c86d7dc1043c752f195f04fa42813afe

              SHA256

              6b42e2e9822b99f5f13a6d1f639fa64cc93001266ceb7a7d342da1bce84d5c08

              SHA512

              a450c691e0c8d16519b418b366a260360a57e8511c6975f2e3029c41f30a68d83448126c3d57c9fb36b3a44e839d4bbcaa73e0adfe305a71e04def2fd990cbf7

            • C:\Windows\Logo1_.exe

              Filesize

              33KB

              MD5

              e88b528305eba2eaa41bd67d5be2f3e9

              SHA1

              46ab8f327b9ad592d6b6e2786ff0c5a5735acbfb

              SHA256

              8549f3ecbe5d5d917c87472123a8ffc41b19b52c94b1fbc7089a971436dfe5ae

              SHA512

              8437f856ced59ed9edb400139bcc5bb083164c52fd843d058d94bd40243b3314af75e3fd18380708561a00a80c7160153a40e768c493f08ea4afc102357252e7

            • F:\$RECYCLE.BIN\S-1-5-21-1181767204-2009306918-3718769404-1000\_desktop.ini

              Filesize

              9B

              MD5

              e850d9ceb7ebcc619d731dc2f1377b2b

              SHA1

              a45553c9057075c02e28f90d5e8ea57a0dddbacc

              SHA256

              b682a6e85069777ca22f84b99607acd09640eaa80029d74363c0a5aabddead4c

              SHA512

              be92bd8393d0fe69559ec55e1068fcd77ccc699361a9cb98d467bd51a029c371852b7a1196ad53fa8865e956582e6a4d35f6ac6fea3832058b7a427133b0048c

            • memory/1288-11-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/1288-19-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/1288-2638-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/1288-9092-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/3000-0-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/3000-10-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/4672-21-0x0000000000600000-0x0000000000601000-memory.dmp

              Filesize

              4KB

            • memory/4672-15-0x0000000000600000-0x0000000000601000-memory.dmp

              Filesize

              4KB