Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 09:12

General

  • Target

    fd838afd7a1544868918ae3e26b310fca89629f0b919d07a8088907521df1ac0.exe

  • Size

    562KB

  • MD5

    fa5e58ca1aa2f50246eb24d68279d4c7

  • SHA1

    39a92791d42f535d01f3812447753556c34669ce

  • SHA256

    fd838afd7a1544868918ae3e26b310fca89629f0b919d07a8088907521df1ac0

  • SHA512

    917d7a9e2a0fd06cab549e024c4534b291f330fd54bffca5be77bbb65cc531ec361f302b18efda10ae6a426d592acbb0da82b272e02c12ce8e5bcb813af4b230

  • SSDEEP

    12288:YOc9iJafmm2VYK+UNo0RweQfoAxHv9sN4A4H9J618UtQ43iUa:YOVm2VZQwy9E1Vf3M

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\fd838afd7a1544868918ae3e26b310fca89629f0b919d07a8088907521df1ac0.exe
        "C:\Users\Admin\AppData\Local\Temp\fd838afd7a1544868918ae3e26b310fca89629f0b919d07a8088907521df1ac0.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2252
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2240
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:2772
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a20AA.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2684
            • C:\Users\Admin\AppData\Local\Temp\fd838afd7a1544868918ae3e26b310fca89629f0b919d07a8088907521df1ac0.exe
              "C:\Users\Admin\AppData\Local\Temp\fd838afd7a1544868918ae3e26b310fca89629f0b919d07a8088907521df1ac0.exe"
              4⤵
              • Executes dropped EXE
              PID:2484
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops startup file
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2556
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2736
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2500
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3028
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:1584

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                  Filesize

                  258KB

                  MD5

                  b5410fc429914200276ec7a3af01029a

                  SHA1

                  3ff9addb437659b743dd0ba280e3579ab09b38de

                  SHA256

                  b8539bd9b6e238a1df46ac0616ebe7e590831aba721f427a1681e45dfc90c384

                  SHA512

                  8ad8c2b1e1834976c20583e0368fcc3c634baba0a8bfbb03698a86b755a147a4a786c81e928a54a873675c11121084d72faddc90117a0e22eff13f04f25942d7

                • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

                  Filesize

                  478KB

                  MD5

                  79d96b6a2771e7783309bf05ebe7b5c1

                  SHA1

                  b19da11278224b17598d5b6de189892a83196708

                  SHA256

                  eb38a47ec49f3f376f53aff58def8c3a0e095bad67e2887d3f58bb4a3c71a19e

                  SHA512

                  72e30060fd922fc37662d762bc647bf85938986d810057926fe86a1622e1b05fc841bab9ee06ee7855071ed27da3d8fe20d41f03ae68c4c76cc720a7e56d4d68

                • C:\Users\Admin\AppData\Local\Temp\$$a20AA.bat

                  Filesize

                  722B

                  MD5

                  b29b106e10c4be1d6066a25d34e6a254

                  SHA1

                  472834ad126a97c22652ab7b8f72bc9543a4bc45

                  SHA256

                  50c169f559ac1a0b072b762237ddc4396f0f1633d5c53e94cd598635d3faf7d3

                  SHA512

                  e402ee7b9652d7ea988f6c2fa30ac278c3f3cef7ce4e995dfc0deb3ea6e9d835d4e7a5410e574f0109eb960ab448167bba5292d58bba01fab518df0d88c79710

                • C:\Users\Admin\AppData\Local\Temp\fd838afd7a1544868918ae3e26b310fca89629f0b919d07a8088907521df1ac0.exe.exe

                  Filesize

                  529KB

                  MD5

                  cca0c5482b8a6a275d9d49433f435dfa

                  SHA1

                  a72ae8621386e13c34055f612ae7612b8a18a39e

                  SHA256

                  6ea08bbcedf7cb51cfbe4896ef8c589a4568b1d5240265b1dcfda83dc8b55365

                  SHA512

                  b88f5cdb4bc08429ca40d24cef490128d341e10615d1d93d084b3247c2b28573d177d878c1385d3941e16a8bcc8a9f6b7870c152f4a43d02e69c05defcc9196e

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  290dee5a49ef64523421b246a4cedf2a

                  SHA1

                  9007fc4f0068bec23817185e12ac4ad5cae11fbf

                  SHA256

                  bd104419c07fdc4dc576e21673a193efb0e9fabd2884cfc6e82afca89b2384f7

                  SHA512

                  2b8e4681c617192dc99c710028fd2d2005ad18a0d2fc7fc33b27cbe13c20a2503aee7e120cee787fef53318a2162539dc841ac04779cb8591b4915427165cc8f

                • F:\$RECYCLE.BIN\S-1-5-21-940600906-3464502421-4240639183-1000\_desktop.ini

                  Filesize

                  8B

                  MD5

                  d8dca68320777bb03e3a6dbdb7624c4f

                  SHA1

                  094cbdfea49743824e2aaf9c66082c25da2157b1

                  SHA256

                  ebe46a39e49fe879afd1b4ac0de5c6c62e8e90342cd71aaaf3ec1d84269e9c6e

                  SHA512

                  9097e8a3df0ae12235002caaef04951ab586d84ea9db1b9952e684b5ab570a033ba1bf047598fca329652cab23a5ec1516e6cd6dbcbd979fd32b9b8afbdf88cc

                • memory/1192-30-0x00000000029E0000-0x00000000029E1000-memory.dmp

                  Filesize

                  4KB

                • memory/2252-19-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2252-0-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2252-17-0x00000000002B0000-0x00000000002ED000-memory.dmp

                  Filesize

                  244KB

                • memory/2252-15-0x00000000002B0000-0x00000000002ED000-memory.dmp

                  Filesize

                  244KB

                • memory/2556-34-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2556-21-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2556-3309-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2556-4156-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB