Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 14:59

General

  • Target

    ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60.exe

  • Size

    3.1MB

  • MD5

    934653db91427eb38c5ae7d1fab765b1

  • SHA1

    a6b017fa1c95a6fb982c0f6a26079195688f45d6

  • SHA256

    ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60

  • SHA512

    cd880fb0057b2d012d53bb98f17f052c45c9365c3744cac702cfd10f89c91074b4ab8fcb6f3463a325ff90dc2e055c91716b9deee8b7c4a879b79fa2908e66c0

  • SSDEEP

    49152:ydRI8boQhfD6UDvxvykXk1rBsgyegFKvc4clwY:ydDDm

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3492
      • C:\Users\Admin\AppData\Local\Temp\ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60.exe
        "C:\Users\Admin\AppData\Local\Temp\ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4520
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3480
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2012
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a414F.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3552
            • C:\Users\Admin\AppData\Local\Temp\ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60.exe
              "C:\Users\Admin\AppData\Local\Temp\ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:5080
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops file in Drivers directory
            • Drops startup file
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4840
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1912
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2120
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2220
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:1188

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            3abe1cbfd0debb68fe3c2d4f99c608ec

            SHA1

            029614f3948dfe6b6ffaffe8bce1cafbf9417f9d

            SHA256

            3852af8ebfaea778190bb692f270499f767cc0a114bd69eb69dd348b9ed1b0eb

            SHA512

            1be2efd9731051729e71758f01436f7b7475f62efdd1a48b776f461dab176b64df3c66c393737b0c0496707542d08e762682a5b92d78f1f4649e84258a668a57

          • C:\Program Files\7-Zip\7z.exe

            Filesize

            577KB

            MD5

            582795a0494288fd7561e5b71a348a3c

            SHA1

            5b25e56a6159787081a3a4f6a17adeb7778a0caf

            SHA256

            8bc2d99c53992d811567b98cd20e70941dd4d9351b71f03a18450d3fc78b88cd

            SHA512

            69843624a507a7ce886e5fe66d704413847950ffca8bbbf818697b0a66cf3ff561a8e075e709f6da3ad1ff1820ee44b808e38157f8c8f37936a7a19f9ca8a331

          • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

            Filesize

            643KB

            MD5

            635e9422a0a86f5c7ac989802b0ac448

            SHA1

            3ea9cc1462b063639526a8d278b571f38b846d1d

            SHA256

            a97d8545a6204abf1a179f2098ca8780e92f4448c7a03e62f6c32e8e5e5cb17f

            SHA512

            857c6d683fe1f7a6757420c84efc4f7f48f58e586e601c969ce27e4ded8cad6ca774ef367a1a1e075081c4e2d41f8cdda558fddf5622e062975cfeff5a929133

          • C:\Users\Admin\AppData\Local\Temp\$$a414F.bat

            Filesize

            722B

            MD5

            182ff1b8b27a5d620774a488d116a6ec

            SHA1

            c414150d2d1b8c93a025ac53150df6372a1c9603

            SHA256

            5afed892ab829aacde7e15477a7168f4208b5906ce52159ef60947ff3646b388

            SHA512

            efc0ec61c7600cf67f9c66a96b88a1f49b859842d1a64207e81acdc9d06863945bedfd006231c0dedff41f97b04ff71a48bdcd5f2da76b33cd575db195d222f8

          • C:\Users\Admin\AppData\Local\Temp\ec1d9b03a0c9ae49490589d2ae295f118b34b2f6e42c6b9a4d64ed1e728cdf60.exe.exe

            Filesize

            3.0MB

            MD5

            07dd9dcd1cc2840751a1f8772f3c0195

            SHA1

            c6203a3990cfbf396ae87110e341f773cd6be4c1

            SHA256

            9b39147e1ba781ea8e463c22700f6ce354ac5e775e36657fd87bf41074835602

            SHA512

            5e547dc18a2b44a6dd67f6b43ee5b5b1bbd4ec1e8b5507b0d990837a7adb72b66808e7487f97062d54e4d3c2c7b791e3b580c9ed316e9d003849f7a6f6a3d56b

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            e566cc2bee05cd120e02caaa3c08df55

            SHA1

            dbb9f693919d0ca109f532ab4ddfcb5769635b18

            SHA256

            5dda0cc34970e4a60d14a0775b925153d046b4aa80068f6f2918eef1bc3d2c78

            SHA512

            f88c382cfcd0bd6770824b9f6c50b87c6940925daf197ba37ead13544bc91ac322afdc3407f04de40c89ea6b89c308247aca61ca97f9f0fb2122589e71d97662

          • C:\Windows\system32\drivers\etc\hosts

            Filesize

            842B

            MD5

            6f4adf207ef402d9ef40c6aa52ffd245

            SHA1

            4b05b495619c643f02e278dede8f5b1392555a57

            SHA256

            d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e

            SHA512

            a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

          • F:\$RECYCLE.BIN\S-1-5-21-711569230-3659488422-571408806-1000\_desktop.ini

            Filesize

            9B

            MD5

            e850d9ceb7ebcc619d731dc2f1377b2b

            SHA1

            a45553c9057075c02e28f90d5e8ea57a0dddbacc

            SHA256

            b682a6e85069777ca22f84b99607acd09640eaa80029d74363c0a5aabddead4c

            SHA512

            be92bd8393d0fe69559ec55e1068fcd77ccc699361a9cb98d467bd51a029c371852b7a1196ad53fa8865e956582e6a4d35f6ac6fea3832058b7a427133b0048c

          • memory/4520-0-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4520-11-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4840-20-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4840-12-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4840-3150-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4840-8660-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB