Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 14:59

General

  • Target

    ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60.exe

  • Size

    3.1MB

  • MD5

    934653db91427eb38c5ae7d1fab765b1

  • SHA1

    a6b017fa1c95a6fb982c0f6a26079195688f45d6

  • SHA256

    ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60

  • SHA512

    cd880fb0057b2d012d53bb98f17f052c45c9365c3744cac702cfd10f89c91074b4ab8fcb6f3463a325ff90dc2e055c91716b9deee8b7c4a879b79fa2908e66c0

  • SSDEEP

    49152:ydRI8boQhfD6UDvxvykXk1rBsgyegFKvc4clwY:ydDDm

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60.exe
      "C:\Users\Admin\AppData\Local\Temp\ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60.exe"
      2⤵
      • Drops file in Drivers directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1084
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:2384
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1E5A.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2364
          • C:\Users\Admin\AppData\Local\Temp\ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60.exe
            "C:\Users\Admin\AppData\Local\Temp\ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2984
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2716
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2564
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2580
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2732

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          258KB

          MD5

          3abe1cbfd0debb68fe3c2d4f99c608ec

          SHA1

          029614f3948dfe6b6ffaffe8bce1cafbf9417f9d

          SHA256

          3852af8ebfaea778190bb692f270499f767cc0a114bd69eb69dd348b9ed1b0eb

          SHA512

          1be2efd9731051729e71758f01436f7b7475f62efdd1a48b776f461dab176b64df3c66c393737b0c0496707542d08e762682a5b92d78f1f4649e84258a668a57

        • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

          Filesize

          478KB

          MD5

          e93193856beaecee9905e2a6f36be17f

          SHA1

          d4c267ea34f28f048e29461656984aad70912eda

          SHA256

          1d345f4e09acdbc12e63ce90d0bd373b56d50a378f4603d8425f6df815e44a7b

          SHA512

          1fbe9c0e86ad98d6a2a7924badec0fffc69a7d0a4839e8af45d0aedf1e4e24a4a798df0ec5b8d0aa6e0e566c0c83a4030549bd32b9ac27406fc772d4a2ff5fc3

        • C:\Users\Admin\AppData\Local\Temp\$$a1E5A.bat

          Filesize

          722B

          MD5

          7348604623f161e931b96345994cb22d

          SHA1

          92683bf9f5a0d09d0acbea67bf6602280337e42f

          SHA256

          2fa951f967bdbaab57691c06b4b47807561bd7897081fac71b169414119b01b5

          SHA512

          5861cb75fa18d165c4ea298d710d331649ccd0da630d72e5871ebce74285bcf19c2f7e343c9166a69e2cd587b57e2e5ae0684524dee00d990a4cb6e9434bf834

        • C:\Users\Admin\AppData\Local\Temp\ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60.exe.exe

          Filesize

          3.0MB

          MD5

          07dd9dcd1cc2840751a1f8772f3c0195

          SHA1

          c6203a3990cfbf396ae87110e341f773cd6be4c1

          SHA256

          9b39147e1ba781ea8e463c22700f6ce354ac5e775e36657fd87bf41074835602

          SHA512

          5e547dc18a2b44a6dd67f6b43ee5b5b1bbd4ec1e8b5507b0d990837a7adb72b66808e7487f97062d54e4d3c2c7b791e3b580c9ed316e9d003849f7a6f6a3d56b

        • C:\Windows\Logo1_.exe

          Filesize

          33KB

          MD5

          e566cc2bee05cd120e02caaa3c08df55

          SHA1

          dbb9f693919d0ca109f532ab4ddfcb5769635b18

          SHA256

          5dda0cc34970e4a60d14a0775b925153d046b4aa80068f6f2918eef1bc3d2c78

          SHA512

          f88c382cfcd0bd6770824b9f6c50b87c6940925daf197ba37ead13544bc91ac322afdc3407f04de40c89ea6b89c308247aca61ca97f9f0fb2122589e71d97662

        • C:\Windows\system32\drivers\etc\hosts

          Filesize

          832B

          MD5

          7e3a0edd0c6cd8316f4b6c159d5167a1

          SHA1

          753428b4736ffb2c9e3eb50f89255b212768c55a

          SHA256

          1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

          SHA512

          9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

        • F:\$RECYCLE.BIN\S-1-5-21-3691908287-3775019229-3534252667-1000\_desktop.ini

          Filesize

          9B

          MD5

          e850d9ceb7ebcc619d731dc2f1377b2b

          SHA1

          a45553c9057075c02e28f90d5e8ea57a0dddbacc

          SHA256

          b682a6e85069777ca22f84b99607acd09640eaa80029d74363c0a5aabddead4c

          SHA512

          be92bd8393d0fe69559ec55e1068fcd77ccc699361a9cb98d467bd51a029c371852b7a1196ad53fa8865e956582e6a4d35f6ac6fea3832058b7a427133b0048c

        • memory/1224-34-0x0000000002550000-0x0000000002551000-memory.dmp

          Filesize

          4KB

        • memory/2204-38-0x00000000003C0000-0x00000000003FE000-memory.dmp

          Filesize

          248KB

        • memory/2204-18-0x00000000003C0000-0x00000000003FE000-memory.dmp

          Filesize

          248KB

        • memory/2204-0-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2204-19-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2204-17-0x00000000003C0000-0x00000000003FE000-memory.dmp

          Filesize

          248KB

        • memory/2704-37-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2704-23-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2704-2967-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2704-4141-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2984-29-0x00000000001F0000-0x00000000001F1000-memory.dmp

          Filesize

          4KB