Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2024 02:32

General

  • Target

    cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe

  • Size

    717KB

  • MD5

    f5c6a11662d347dfd4fcc22faa210cac

  • SHA1

    f18d93e3bb1f415a00b4c857fd644cff695a0ff6

  • SHA256

    cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501

  • SHA512

    406fcbe52119d7f216f3b531a736b496e2b5feba708152ac91229d0f2fa8191fadaaeddf31c76ab073fedb16b3466adeb36bd189e105523cd96c2d6a4f0511bc

  • SSDEEP

    12288:k1upqfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:k1AmLOS2opPIXV

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe
      "C:\Users\Admin\AppData\Local\Temp\cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:1984
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a259A.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2612
          • C:\Users\Admin\AppData\Local\Temp\cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe
            "C:\Users\Admin\AppData\Local\Temp\cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe"
            4⤵
            • Executes dropped EXE
            PID:2468
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2548
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2396
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2536
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2364

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

          Filesize

          258KB

          MD5

          c1311e35ea05def263f404a5d7b73260

          SHA1

          952954211d07edfb16b371cf104aa332731011b7

          SHA256

          c502724428c14d7c1079512448dd16a7495a543483d0b818d4d6b67add762748

          SHA512

          5606f9ef7170a427dbd217e79bf36dff7c9f13b3799c73221940ba8412cb6e436e30ee88bc8aefbdb6428dec24e03d503a68d67d8f03bb8bcb027563e87070ed

        • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

          Filesize

          478KB

          MD5

          c8b074fbff9452f981c52acd82c24918

          SHA1

          03ffff9c1f1e8da670c6c65b2d858a9ed7eae4fa

          SHA256

          986587b92dc97769781c303bcf1c6e13dacd413cac927afb4462389b3204d888

          SHA512

          fc282e5789ea88095cfd50a0aa1c38d63515f70b28c52c2d68da57119f4b8f5f5ba4216a3547fe5202939d0ca3c8ad6c1cd938831c5b0bb3fc6e96b6d834bf8c

        • C:\Users\Admin\AppData\Local\Temp\$$a259A.bat

          Filesize

          722B

          MD5

          fba26e6bdcde78d85680c5382ceddb4c

          SHA1

          159f91538159915a6219630c032e5ec4a7b3d4ea

          SHA256

          279617231b96e434f3c2d61db09ad0f528cf803eb0be9d7fb3d0ace5618073c1

          SHA512

          2af2814a6dffb7b63385084fff20ff397e209eb83f6d4d7562033b083358c8fd7fd9cbb1765d7b37bb7012266c58cd068e4cb652d41370baa8ae6ea799a53161

        • C:\Users\Admin\AppData\Local\Temp\cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe.exe

          Filesize

          684KB

          MD5

          50f289df0c19484e970849aac4e6f977

          SHA1

          3dc77c8830836ab844975eb002149b66da2e10be

          SHA256

          b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305

          SHA512

          877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38

        • C:\Windows\Logo1_.exe

          Filesize

          33KB

          MD5

          a0c02032a40d35cd333d9e5c309519d2

          SHA1

          010b30527b26c9264fab15a3941e2f692b014bbf

          SHA256

          0f552e28158600bb566846945865b84540a6e4ddd0a4da4cf9effd58c85c3724

          SHA512

          dd414f5e166e2b53738d868af9bf580bae8efb2aa1dfa0702fc22172e3402bbc5dd6b92c25d33c9a456b56c54215cb784fba38bf65c2f43acce7044abc6167a7

        • F:\$RECYCLE.BIN\S-1-5-21-2297530677-1229052932-2803917579-1000\_desktop.ini

          Filesize

          9B

          MD5

          3b22ce0fee2d1aaf2c66dcd142740e29

          SHA1

          94d542b4bb9854a9419753c38e6ffe747653d91c

          SHA256

          8284772f28954a109c16f1583e6e34e29f06673b34e04f268bda961b57ba9f79

          SHA512

          efd4900a49624170e51ea401f0845634f49484a49335845258dc3d41a12e2022bf413a6751fcbcfd1ec68cde506f3363beae57f20e8eaca8b214d28baa138c5b

        • memory/1040-18-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/1040-0-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/1040-12-0x0000000000230000-0x000000000026D000-memory.dmp

          Filesize

          244KB

        • memory/1192-30-0x00000000024E0000-0x00000000024E1000-memory.dmp

          Filesize

          4KB

        • memory/2728-33-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/2728-3284-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/2728-4103-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB