Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 05:49

General

  • Target

    b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe

  • Size

    67KB

  • MD5

    622fd2902022c7d50411a2fc2dc0d35a

  • SHA1

    69ec79e5fc41fa78f2484b2f68ac70ad1e6e64ad

  • SHA256

    b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d

  • SHA512

    b7785a0bf7e398baf421ef8d5f01bfe74175dd46ee4761a3522365f49ff66681136ff0c0dee7f901b83d659d23ed013672301d9aed5b02cbe09a648d06a67417

  • SSDEEP

    1536:eocx1ae9n40g9i/qo6SKHDZoEV0JuRUFyMOaHQ1l:eofZQioJKek0JXXOeQ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1184
      • C:\Users\Admin\AppData\Local\Temp\b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe
        "C:\Users\Admin\AppData\Local\Temp\b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2288
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:3036
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\$$a9000.bat
            3⤵
            • Deletes itself
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:3052
            • C:\Users\Admin\AppData\Local\Temp\b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe
              "C:\Users\Admin\AppData\Local\Temp\b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe"
              4⤵
              • Executes dropped EXE
              PID:2736
          • C:\Windows\Logo1_.exe
            C:\Windows\Logo1_.exe
            3⤵
            • Drops startup file
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2704
            • C:\Windows\SysWOW64\net.exe
              net stop "Kingsoft AntiVirus Service"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2820
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                5⤵
                  PID:2732
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2720
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:2668

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

                  Filesize

                  258KB

                  MD5

                  b7bb6fde5070f22c2892f8ffa90e21ab

                  SHA1

                  99b915a961b74560ec71e48bab9140ebf0ff8828

                  SHA256

                  22241fd7d48785774c50055f9fe6796818868706fbfbbaa47db9abbdf7e58909

                  SHA512

                  a6b96e2379c22911039024570edca5aba589210683a653b1b06225492972d8a6616b9a85b77a9a77cd05d3279efbdc2894594ebc936b5acd786a08749313aa89

                • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

                  Filesize

                  478KB

                  MD5

                  79d96b6a2771e7783309bf05ebe7b5c1

                  SHA1

                  b19da11278224b17598d5b6de189892a83196708

                  SHA256

                  eb38a47ec49f3f376f53aff58def8c3a0e095bad67e2887d3f58bb4a3c71a19e

                  SHA512

                  72e30060fd922fc37662d762bc647bf85938986d810057926fe86a1622e1b05fc841bab9ee06ee7855071ed27da3d8fe20d41f03ae68c4c76cc720a7e56d4d68

                • C:\Users\Admin\AppData\Local\Temp\$$a9000.bat

                  Filesize

                  722B

                  MD5

                  2e54d6e798d0c9a8212040a0d23d713f

                  SHA1

                  c310ca2bb15e82959fe14b6e01b78c3d9293b5b5

                  SHA256

                  58ffb0dd5c76bb63463c4f1458e6f17c6865a611353a038a628371ca79485c0e

                  SHA512

                  b1d302e4b7d7b66dfa157c9ee365bdaa55b3fea226e9d1dbed46c5baf43e41658a1984c8d4b4f8dc85fa3c71bd3d1539f6a06fa0877fb564ea142bdf044d25f6

                • C:\Users\Admin\AppData\Local\Temp\b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe.exe

                  Filesize

                  33KB

                  MD5

                  69b16c7b7746ba5c642fc05b3561fc73

                  SHA1

                  83d80d668dca76b899e1bf662ddee0e0c18ac791

                  SHA256

                  0deceb6b1b7a2dd1f13133ac7328ff420dad4610cee1fa7466e8e0f6baa39116

                  SHA512

                  6b8eebcfe5b04141640047fe468371ad02bb115ee9ef00260c0b33cfd56b142c2e01b3b1c6f07281aa57b1f3b9fdb1f1082fe5620f88a57b92d8f547267ef154

                • C:\Windows\Logo1_.exe

                  Filesize

                  33KB

                  MD5

                  2a82d5208360158b3c993c811395e0a6

                  SHA1

                  7b0769ce4994359e329fd2c93a8d4c7f6a311084

                  SHA256

                  9c8ff7750281ee54d8fdf3990659d7652c663fb986e029a791f8f051e3bf40f9

                  SHA512

                  381ab7e6f07b427f2a5a2b9cd5c5914fa45a5edaf70e622969156d7a1deed8c3cab70b55084799d4055ce73324cbdc3acad6b45b83cfcebb25f62354d732b51b

                • F:\$RECYCLE.BIN\S-1-5-21-2212144002-1172735686-1556890956-1000\_desktop.ini

                  Filesize

                  9B

                  MD5

                  2efce5174bcf8d378a924333f75e26ad

                  SHA1

                  4fe6e1d729b55d42eb9d74aca11b36a94402de14

                  SHA256

                  04ccb9bec2864153c72852867d8e65dca07eca4e5edcfb4beb62cb364dcd91fa

                  SHA512

                  24684969632fb0562a3a7a5fec91d869d627730d8e9d83a2b17e326d7047e3fbff205eec207914e42ecd50fef68a212c19f3599ded271c00e66acc22f1f04c16

                • memory/1184-30-0x0000000002A30000-0x0000000002A31000-memory.dmp

                  Filesize

                  4KB

                • memory/1656-17-0x0000000000290000-0x00000000002CD000-memory.dmp

                  Filesize

                  244KB

                • memory/1656-0-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/1656-19-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/1656-15-0x0000000000290000-0x00000000002CD000-memory.dmp

                  Filesize

                  244KB

                • memory/2704-34-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2704-1822-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2704-20-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2704-4191-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2704-6352-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB