Analysis

  • max time kernel
    149s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 09:08

General

  • Target

    f0e567d0ce8f4fffd60612d0e9292df4bd879bacee10122aaa7ad80cd8004909.exe

  • Size

    70KB

  • MD5

    ef391aab778930d221099b0b1bd87768

  • SHA1

    8c7ce224f789fb8c0913c6edf2ec148f81606748

  • SHA256

    f0e567d0ce8f4fffd60612d0e9292df4bd879bacee10122aaa7ad80cd8004909

  • SHA512

    822f30e77c3877fdfea4616e72c19a65b5533cce1fc16c6785e5bafd0fce812b8d496e84578cc65e2ba780581b29083d422882464b3abb77c7e6eb3917a1f06a

  • SSDEEP

    1536:e8cx1ae9n40g9i/qo6SKHQriw+d9bHrkT5gUHz7FxtJ:e8fZQioJKwrBkfkT5xHzD

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\f0e567d0ce8f4fffd60612d0e9292df4bd879bacee10122aaa7ad80cd8004909.exe
        "C:\Users\Admin\AppData\Local\Temp\f0e567d0ce8f4fffd60612d0e9292df4bd879bacee10122aaa7ad80cd8004909.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2476
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2416
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2084
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a14C8.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2756
            • C:\Users\Admin\AppData\Local\Temp\f0e567d0ce8f4fffd60612d0e9292df4bd879bacee10122aaa7ad80cd8004909.exe
              "C:\Users\Admin\AppData\Local\Temp\f0e567d0ce8f4fffd60612d0e9292df4bd879bacee10122aaa7ad80cd8004909.exe"
              4⤵
              • Executes dropped EXE
              PID:688
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops startup file
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2828
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2744
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2844
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2800
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2356

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            9546e9ae8c8e5b5f8d651e3b1b233224

            SHA1

            0821cdef875610dbc6b2a2b174d4889cc849219f

            SHA256

            15ff73d8df6cc0264065f36b5bf87488a2428ee4b0764a5fc29d50b429444ab2

            SHA512

            f05e8c8e528299319eae73d577fb95e6ab894187d63df221e6f002f862d15cfcb0d353058736e0482b73b9608c6bcf59f206c0a5f0f12d4a492cb6d9e53bf74a

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            478KB

            MD5

            79d96b6a2771e7783309bf05ebe7b5c1

            SHA1

            b19da11278224b17598d5b6de189892a83196708

            SHA256

            eb38a47ec49f3f376f53aff58def8c3a0e095bad67e2887d3f58bb4a3c71a19e

            SHA512

            72e30060fd922fc37662d762bc647bf85938986d810057926fe86a1622e1b05fc841bab9ee06ee7855071ed27da3d8fe20d41f03ae68c4c76cc720a7e56d4d68

          • C:\Users\Admin\AppData\Local\Temp\$$a14C8.bat

            Filesize

            722B

            MD5

            528a1c30fd375b0ca19ccac399e30971

            SHA1

            75758e0144ce79333b24254e1aeb9993b7489a28

            SHA256

            8ca3c9c3faa96f467a1b175ede16fa6922495c2e59e6ee142b6a90ad3aa9fdeb

            SHA512

            ad7062ada36e19ec0060bef5ad0301a519222ab2303c00d6c9dc45e53342c5c27bc25c0357d9acd4d4be470f9e329b496624f014f6103fbf2e287ce3651ef511

          • C:\Users\Admin\AppData\Local\Temp\f0e567d0ce8f4fffd60612d0e9292df4bd879bacee10122aaa7ad80cd8004909.exe.exe

            Filesize

            36KB

            MD5

            9f498971cbe636662f3d210747d619e1

            SHA1

            44b8e2732fa1e2f204fc70eaa1cb406616250085

            SHA256

            8adf6748981c3e7b62f5dbca992be6675574fffbce7673743f2d7fe787d56a41

            SHA512

            b73083c2f7b028d2946cb8f7b4fe2289fedaa4175364a2aac37db0aeff4602aede772ccc9eba7e6dcfcb7276e52604ca45d8021952201b5834485b48bca3dc93

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            ca3dc0fcaad3c989a4751cedef27edb0

            SHA1

            79710f6a3d257400fc7d6960b64cf134e08111f8

            SHA256

            7a7e092711c0b2d515ff4787f8c4abe0c7fe1ea6a325eb5885b2cd061637a191

            SHA512

            ddc2f8fbf8940f317c4bd92c235c5c1744fa78c61d7817c6b88fbaae863d603e43ffdaab387e7d87d927e00f52a22e3a2e311d058f725dc25312ba88a2b6a64b

          • F:\$RECYCLE.BIN\S-1-5-21-2212144002-1172735686-1556890956-1000\_desktop.ini

            Filesize

            8B

            MD5

            d8dca68320777bb03e3a6dbdb7624c4f

            SHA1

            094cbdfea49743824e2aaf9c66082c25da2157b1

            SHA256

            ebe46a39e49fe879afd1b4ac0de5c6c62e8e90342cd71aaaf3ec1d84269e9c6e

            SHA512

            9097e8a3df0ae12235002caaef04951ab586d84ea9db1b9952e684b5ab570a033ba1bf047598fca329652cab23a5ec1516e6cd6dbcbd979fd32b9b8afbdf88cc

          • memory/1252-29-0x0000000002A70000-0x0000000002A71000-memory.dmp

            Filesize

            4KB

          • memory/2476-17-0x0000000000230000-0x000000000026D000-memory.dmp

            Filesize

            244KB

          • memory/2476-18-0x0000000000230000-0x000000000026D000-memory.dmp

            Filesize

            244KB

          • memory/2476-0-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2476-20-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2828-33-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2828-19-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2828-2335-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2828-5881-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2828-6348-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB