Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2024 14:21

General

  • Target

    a3c6340b171de28c88d2c9ada271fca0588c5b99933add613ce334a42044e7db.exe

  • Size

    1.5MB

  • MD5

    66081074e23d7ac3c78c0985f6a24c5c

  • SHA1

    4b6bf640b697f6a4b2e62913ede6891a2e2de202

  • SHA256

    a3c6340b171de28c88d2c9ada271fca0588c5b99933add613ce334a42044e7db

  • SHA512

    03c9f2367cadb83934cc23ca22222375e4b3adfb8624767752bb769b8513ec6825f4e4b71dbd05bc4f9ae34bacd12d1e056cffb1de1a1628ae04075a4ecad671

  • SSDEEP

    24576:IBAQC7HmUDDPC803QpIY46xNIxuzP2e+2RJXlhO1DrA/1EZ8J/6Q4xUEisz2T:IBAQCXDPCT3QCYroEb2e+2RJO1Ds/1E4

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3420
      • C:\Users\Admin\AppData\Local\Temp\a3c6340b171de28c88d2c9ada271fca0588c5b99933add613ce334a42044e7db.exe
        "C:\Users\Admin\AppData\Local\Temp\a3c6340b171de28c88d2c9ada271fca0588c5b99933add613ce334a42044e7db.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3684
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:868
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:4400
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a33E1.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4296
            • C:\Users\Admin\AppData\Local\Temp\a3c6340b171de28c88d2c9ada271fca0588c5b99933add613ce334a42044e7db.exe
              "C:\Users\Admin\AppData\Local\Temp\a3c6340b171de28c88d2c9ada271fca0588c5b99933add613ce334a42044e7db.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:4164
              • \??\c:\e793473c7316e77ded80593693662661\update\update.exe
                c:\e793473c7316e77ded80593693662661\update\update.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:4824
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops startup file
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2040
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1452
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:712
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2200
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:4920

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            27edd294cced0fdf1261a2be12beb18c

            SHA1

            bcb1909b19a8e6df284ef6d2cbcea01da6198bb7

            SHA256

            e5e2debb02812311f440ad7689bb8db46367a31e240a22011b5ee0d4e4c918cd

            SHA512

            d8f46bc13adb794714bb2e95bb77cdda534f4e842e65888f859aafa4fa6072912ab94960fc2e922afd9758595c4891d9ebb94ffcfce5cd573d6dcb3f67617ce9

          • C:\Program Files\7-Zip\7z.exe

            Filesize

            577KB

            MD5

            0900a56bec7cf5f775caadbc87084840

            SHA1

            a695a01cf14919ae65508de4bcb6fac337302e70

            SHA256

            53846306feeea8fc6cdc5eeb63bd0458a1774f02306aac786edf6626e9e39e50

            SHA512

            a15bd7ed752213af678b0b078856a5577404bc01110cab3126dd3dd7fa848b282d536c5d99ef23448a294d3a1b188b4e4ad71ed177a469629ad47315c62a2896

          • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

            Filesize

            643KB

            MD5

            ee6237a8da92a5b1aa43c2cd1d39c4e0

            SHA1

            0888063540246785ccb7257f4b4e281e423065ae

            SHA256

            5dd6dbe42874d0ddcd999df9348be22cbe48dfb5104dc6783eee6aa3cb382659

            SHA512

            d92c1b544ca273462b1cd8423f65398b0398dcbbe126b1d86b6d4392b32e03b7849cddf8f0925c8975228c3255bff70c4327dfaa9b46d489da80635f0c49c31e

          • C:\Users\Admin\AppData\Local\Temp\$$a33E1.bat

            Filesize

            722B

            MD5

            ca303022359796e5df2a17955182bc17

            SHA1

            5ca794c1ab7edbc5df7d4c8f9de364ee1abc18b2

            SHA256

            38e62c1ad4e30361fe08897d400cd334a6fdf3f54c7dbc32911125e120805501

            SHA512

            24c28cc2770533940feda308aa251025e8219e651a5d7372d577ef6ced7c49836781961daea3d776e87c56b6df6f1a04fa37269d184eb1d1709bcb777db82845

          • C:\Users\Admin\AppData\Local\Temp\a3c6340b171de28c88d2c9ada271fca0588c5b99933add613ce334a42044e7db.exe.exe

            Filesize

            1.5MB

            MD5

            8b44f267d215f5ab372a65fc071c42c2

            SHA1

            66682ed84d2e7d1d2ad19d99d886173a14e307c3

            SHA256

            cf4591b63d920fc1c4787a5b674cf4f1abe2fef245b19b14970a0f127924841a

            SHA512

            fa70edee34704e8dbe6dfff921f36c91ca356141bcd0d6d788040b2f4d57abebbaee74bbc8be2988d9c1f42462bc0050c0d7627b6d0d0044cf1b352ed6f37e16

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            d9d56e898f9fe3e52f62c443b4066874

            SHA1

            3dd496210187e236bf545e128e21dd5c53d44a83

            SHA256

            dfd87b3c1dcf2125f58bf86d1773bfaf2744355ed369f00ea44c72a287c9f72d

            SHA512

            fe0eaf0c95cd52c8a5c4ce50ae63fd85c7d67ba824b87ab6d9c702ccbde5923e1d6a3cd45aa636b5475494e330fc866e00df8e4fc6e1a2115cef7f7861eaff26

          • C:\e793473c7316e77ded80593693662661\_sfx_.dll

            Filesize

            30KB

            MD5

            b9b02d97007953e74caaa38497e7278a

            SHA1

            3954391efec4615a597594b02ad755f539d2fa42

            SHA256

            e4ecf14cf98b855642505802a04be2035db6e13600112c01632e2e600c8184cc

            SHA512

            78f39f6c6167ba61f52501912b3c5fa6d8c0d594be9f9a5b888b2cb4e19c1d499328fe28a90cc1457e15b14f78ce5a3591b8ed1468afb8d5e944df07a7ae2c6e

          • C:\e793473c7316e77ded80593693662661\update\update.exe

            Filesize

            701KB

            MD5

            3b5eaaedb8a9d3f98debbdb0cfd214d5

            SHA1

            c9e09f6f6026f928d3d6d9056af868df83bd44ef

            SHA256

            2e2e9f1ea41d8673bcf69c8c97fc16c22932e2b7807fc87c556516261ea33d99

            SHA512

            26dbaefdedf9ba0094714f65d78b7c68fefc6afbd937cb0322ac698cbf3d104c4ccfbfb671314d6ea98bce2b0c090e2d4a19441d1abc2acb6b143e05818c2b75

          • C:\e793473c7316e77ded80593693662661\update\updspapi.dll

            Filesize

            363KB

            MD5

            ebdb17c673b090a949f17c9e6486aaf3

            SHA1

            2231731f56f803662e0f1d537b22cba7625ef433

            SHA256

            f484cf06e20996e1887b4304b33444f3ee1c03fb912f5ec8d5327c4074a97abb

            SHA512

            b05b2e548c507c2bce556acd43174c2a2743d46ba816896e97a475089237020208c710e25aa204aee40be36cc3c8480da0dc6c383cadf2c619268b48f5e8fe40

          • F:\$RECYCLE.BIN\S-1-5-21-200405930-3877336739-3533750831-1000\_desktop.ini

            Filesize

            9B

            MD5

            1884bfdeea71ff22db39c196f4447c9c

            SHA1

            3eafc7e6e17ba6ce7a087a3588fb1efb596da038

            SHA256

            163167bc5a01ad6b3ed4406c2a9a1baaf2c0ef4620ab7d5b39aeddf976ca776d

            SHA512

            b22124aa3a912462e6face7f71ad3dfec4b27dab16b2e20e3a0adc277f89f631ec889c91b185ac4b9b670933d881b8fd26c25d6f405e465aa8148cdbb7f7c3e2

          • memory/2040-67-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2040-9-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2040-2713-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2040-8918-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/3684-0-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/3684-10-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4824-66-0x0000000000F80000-0x0000000000FDC000-memory.dmp

            Filesize

            368KB