Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03/06/2024, 09:33

General

  • Target

    15d1e6b25099fbf1ecd59e8566fce63a89d10e100e7540d47718be5753eed61c.exe

  • Size

    64KB

  • MD5

    0a4ad8aa58382cdff5603c8ee09de9c5

  • SHA1

    f5ab35d2e6365497a4c8b87100156dc30d80d2d7

  • SHA256

    15d1e6b25099fbf1ecd59e8566fce63a89d10e100e7540d47718be5753eed61c

  • SHA512

    f0d1f708393c6ee18a080f7481da47cf713a6e1358157e5d12b3e2ab5bcd1d968bf37c329cc754653baf8d7479e4de969994804a42d21f64bb1b9c314c1bf36d

  • SSDEEP

    1536:F4Tncx1aeg1vye1MRSpomCEi1KqGCq2iW7z:FGf9qe1ISpomCP1dGCH

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\15d1e6b25099fbf1ecd59e8566fce63a89d10e100e7540d47718be5753eed61c.exe
        "C:\Users\Admin\AppData\Local\Temp\15d1e6b25099fbf1ecd59e8566fce63a89d10e100e7540d47718be5753eed61c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2224
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1956
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a90F9.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2560
            • C:\Users\Admin\AppData\Local\Temp\15d1e6b25099fbf1ecd59e8566fce63a89d10e100e7540d47718be5753eed61c.exe
              "C:\Users\Admin\AppData\Local\Temp\15d1e6b25099fbf1ecd59e8566fce63a89d10e100e7540d47718be5753eed61c.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of WriteProcessMemory
              PID:2160
              • C:\Users\Admin\AppData\Local\Temp\lCOuvh.exe
                C:\Users\Admin\AppData\Local\Temp\lCOuvh.exe
                5⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of WriteProcessMemory
                PID:2672
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\2fba7071.bat" "
                  6⤵
                    PID:1856
            • C:\Windows\Logo1_.exe
              C:\Windows\Logo1_.exe
              3⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2584
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2572
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2512
                • C:\Windows\SysWOW64\net.exe
                  net stop "Kingsoft AntiVirus Service"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2780
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                    5⤵
                      PID:568

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe

                    Filesize

                    305KB

                    MD5

                    b5ad735674fcb3510e761cdeebd629b6

                    SHA1

                    a1379420798deaffe7bd257a907808d5b9bab800

                    SHA256

                    09321e83ed1016e58479c28c8d5aa98fabcc8f2b78f1a7d9bc50918c63bc08df

                    SHA512

                    15c5ff71ce8151ebd4391adff837dd1ec79405ae1b20296181f672d0f6424ff502f780bbbf554d6d8ab01d13ebc50162f3e18be1461d516b5c7db641fd19b14f

                  • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                    Filesize

                    258KB

                    MD5

                    faaa09cb2d9197da4a00a0df01ac2e5c

                    SHA1

                    ce497e70212da947764b054c161a468be867cf1b

                    SHA256

                    51d9d9203fddf941f10518b44fa657ea3a68c2156ba573b36cbec3c8959992c6

                    SHA512

                    98feb4b1927fe22b02fa5169dd77b774b8d467ff71ca6b5d6f5244723e6d4ce118d647821db2e1cbc8441316fdbec463bd1d06ce3a398b3ed43c7834ecbf43c6

                  • C:\Program Files\7-Zip\Uninstall.exe

                    Filesize

                    64KB

                    MD5

                    c3ff4c8a467baa2924f6a253cba36a50

                    SHA1

                    c5563e48c313f9a16fc8f7ae629627aa1fb0432c

                    SHA256

                    fd3fbdc27706373b97720924a170a70ef2c201d13f64a7bf04ad53732dd72afe

                    SHA512

                    c4b1712378aedcdec6182a7fbbde808173b2b6dbf93f49c63874dc9f8ded980cf3bb18a7b853df8bc4d0515a9437d3a4a1ff3b5404a898ba8430711c3511622e

                  • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

                    Filesize

                    478KB

                    MD5

                    5e54b5419052a6321d15fe6088be5258

                    SHA1

                    420003c0ad68fa2b977bee9e2ca2d1a53f8f1ec2

                    SHA256

                    142a70f95c82ea8acba8d3550273a20411a5b82f6d1b1c9657db51c3f83d5d97

                    SHA512

                    6d2d2025ed17d6f730d3fbb3a5549e60cfe951c7d9e0063f4ecca045ee28a375eac11fb9aa9cc484b181369165a0f7abae967807bad16aac0e4b60b7a8092f71

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\k2[1].rar

                    Filesize

                    4B

                    MD5

                    d3b07384d113edec49eaa6238ad5ff00

                    SHA1

                    f1d2d2f924e986ac86fdf7b36c94bcdf32beec15

                    SHA256

                    b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c

                    SHA512

                    0cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6

                  • C:\Users\Admin\AppData\Local\Temp\$$a90F9.bat

                    Filesize

                    722B

                    MD5

                    e38bcbb04a07484164ab1db74357bcf0

                    SHA1

                    d124367a3ef535abbbb837db89049f5a9644eadf

                    SHA256

                    342436e5a32e792bd58751d2b8f1d3c6bc8437d82caab709c12ba6ba619c4060

                    SHA512

                    6804e1cfc93c3396495dfa33458b48b773a8980be08de782cf4ebeadc46e6194321617252905ebee259d1ab1964b2f91000b084bd19806f473e3cb7fa1b3507a

                  • C:\Users\Admin\AppData\Local\Temp\050C7C2B.exe

                    Filesize

                    4B

                    MD5

                    20879c987e2f9a916e578386d499f629

                    SHA1

                    c7b33ddcc42361fdb847036fc07e880b81935d5d

                    SHA256

                    9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31

                    SHA512

                    bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

                  • C:\Users\Admin\AppData\Local\Temp\15d1e6b25099fbf1ecd59e8566fce63a89d10e100e7540d47718be5753eed61c.exe.exe

                    Filesize

                    31KB

                    MD5

                    3d0f864f1bb6e3e4e4f6893e070115be

                    SHA1

                    f2661a0d22c47c897a5e8dd43a2b0775962eb37d

                    SHA256

                    62a170c5d2bc372f8bb7f7fc059ec6e4bcd372a01af00b5a3ce3c2e208e6ea00

                    SHA512

                    dde178b4ef7ed72d6319a46ca5948f964a00f7bb50dc9b9e47e8eff4ea78772d515f299e152fc7cc502b58503532de93e563467310897f8ade6383dde25217ef

                  • C:\Users\Admin\AppData\Local\Temp\2fba7071.bat

                    Filesize

                    187B

                    MD5

                    4ee7ca9c5836f5c89d9ebfa24c367a7a

                    SHA1

                    ca9c1ed374e0e11868c060588588947cdee9122b

                    SHA256

                    15d7669f7d3a979b58d3d7bc060c5c3e114eb2b8e87a2d9277c15d358b2bfa38

                    SHA512

                    4c0303cb8c27cc29e4e08fd5a258bd98689dd8a56073e1b1fe82e13bc5a83f1b7cff217b8be91b6a81da3592e9fb128f3dd8dab25af9e005b592c08ec0659ef4

                  • C:\Users\Admin\AppData\Local\Temp\7B316C97.exe

                    Filesize

                    33KB

                    MD5

                    e2df2c847b727ab46536c89f46e959ea

                    SHA1

                    9aa70805b093134eb615cd8afc037ed5b7331b03

                    SHA256

                    8beb7cf4690399505ad0a2e994692e1251baf9c5b74ba9b123da405b1ddcb1b7

                    SHA512

                    18ea2561f00acb2fe94245dfb26cd592e75729168de06d319609d3367ac4c532c7566d68056785ab66f8d40cb4af08a3d04992aca3eb4c93fad5296535744997

                  • C:\Windows\Logo1_.exe

                    Filesize

                    33KB

                    MD5

                    9331307acc6ea0119adac27759d11956

                    SHA1

                    10cc3b729963eaf37ece65bfb77e4baf37a47003

                    SHA256

                    335e1655106eb4e07013c87fae6ae18f87132e28ab6b78f0a80889684d10316d

                    SHA512

                    9da4e4b2a124a3d1f25e22efe0681edb9ca900b03ae907fca9f320ef64ff05cac5cf6598c8c3f3af7bba561d927158de2362d8100e62081482c19af40fa118a8

                  • F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\_desktop.ini

                    Filesize

                    8B

                    MD5

                    a6f28952c332969f9e6d9f7d1a449737

                    SHA1

                    31c0826adb63cc03162fb9e88781f4b50da8f11b

                    SHA256

                    d9d875805581110dafdfb2ceb34c5e60f50fe720963f9813c287e4845248d208

                    SHA512

                    8187572ee8fbb9a42af34a3444be3a4309c5a798e7b1f27fce5b28b7168b72d015b1c10e611ccd3a9361af2aaeab831d2734017f77adff341c3fdb876c296eac

                  • \Users\Admin\AppData\Local\Temp\lCOuvh.exe

                    Filesize

                    15KB

                    MD5

                    56b2c3810dba2e939a8bb9fa36d3cf96

                    SHA1

                    99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

                    SHA256

                    4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

                    SHA512

                    27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

                  • memory/1260-72-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1688-18-0x00000000002C0000-0x00000000002FD000-memory.dmp

                    Filesize

                    244KB

                  • memory/1688-0-0x0000000000400000-0x000000000043D000-memory.dmp

                    Filesize

                    244KB

                  • memory/1688-12-0x00000000002C0000-0x00000000002FD000-memory.dmp

                    Filesize

                    244KB

                  • memory/1688-19-0x0000000000400000-0x000000000043D000-memory.dmp

                    Filesize

                    244KB

                  • memory/2160-86-0x0000000000400000-0x000000000040D000-memory.dmp

                    Filesize

                    52KB

                  • memory/2160-29-0x0000000000240000-0x0000000000249000-memory.dmp

                    Filesize

                    36KB

                  • memory/2560-24-0x0000000000280000-0x000000000028D000-memory.dmp

                    Filesize

                    52KB

                  • memory/2584-85-0x0000000000400000-0x000000000043D000-memory.dmp

                    Filesize

                    244KB

                  • memory/2584-1159-0x0000000000400000-0x000000000043D000-memory.dmp

                    Filesize

                    244KB

                  • memory/2584-4099-0x0000000000400000-0x000000000043D000-memory.dmp

                    Filesize

                    244KB

                  • memory/2672-83-0x0000000000D40000-0x0000000000D49000-memory.dmp

                    Filesize

                    36KB

                  • memory/2672-35-0x0000000000D40000-0x0000000000D49000-memory.dmp

                    Filesize

                    36KB