Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 19:29

General

  • Target

    23036d793dd3964189d5926cdf15b7232a95dfd67a2f0a7abf4c07f2ffea2210.exe

  • Size

    2.8MB

  • MD5

    4d95c7318a511c1ec193b0b804998c35

  • SHA1

    3ce7b715ab511a253db2fad0457441a7574949b2

  • SHA256

    23036d793dd3964189d5926cdf15b7232a95dfd67a2f0a7abf4c07f2ffea2210

  • SHA512

    5cf3d2abe4ceb26e5f9b33026254a3bce00df5dccbb1dffc6c5ef600b0de5f81fd6e2d7eaad32891cf8925eb954314cfe01275da6f024b25f7306fa16307673f

  • SSDEEP

    49152:t6gLKJuMarhVnMFwTH8/giBiBcbk4ZxZ2DqFeVMhuxcPh:gd1XdhBiiMa7

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1388
      • C:\Users\Admin\AppData\Local\Temp\23036d793dd3964189d5926cdf15b7232a95dfd67a2f0a7abf4c07f2ffea2210.exe
        "C:\Users\Admin\AppData\Local\Temp\23036d793dd3964189d5926cdf15b7232a95dfd67a2f0a7abf4c07f2ffea2210.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1308
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aBBC1.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2568
          • C:\Users\Admin\AppData\Local\Temp\23036d793dd3964189d5926cdf15b7232a95dfd67a2f0a7abf4c07f2ffea2210.exe
            "C:\Users\Admin\AppData\Local\Temp\23036d793dd3964189d5926cdf15b7232a95dfd67a2f0a7abf4c07f2ffea2210.exe"
            4⤵
            • Executes dropped EXE
            PID:2736
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1444
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2684
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2272
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2880

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      258KB

      MD5

      a5d5eca012aa894027f479d4e4c8970b

      SHA1

      e1fbcfc8ddf140299bf69540d09116696f43b693

      SHA256

      797daa7020aff280dab0ceba89a705523d4950324ac5d0e0aa3c7b1de8180826

      SHA512

      4d54211b01b3c9666cb03dd5ad6a5751c6b6643949d61f86a167c3b9c227613643b534b9f91ed7c034f7db8fb450f1ad5815729712f92d1cb32096eb0fd65a96

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      478KB

      MD5

      79d96b6a2771e7783309bf05ebe7b5c1

      SHA1

      b19da11278224b17598d5b6de189892a83196708

      SHA256

      eb38a47ec49f3f376f53aff58def8c3a0e095bad67e2887d3f58bb4a3c71a19e

      SHA512

      72e30060fd922fc37662d762bc647bf85938986d810057926fe86a1622e1b05fc841bab9ee06ee7855071ed27da3d8fe20d41f03ae68c4c76cc720a7e56d4d68

    • C:\Users\Admin\AppData\Local\Temp\$$aBBC1.bat

      Filesize

      722B

      MD5

      8a0b54739072f4acea2acd953ae46203

      SHA1

      e86511efe7d2ec7fd23bbaa5f301b2587c94957c

      SHA256

      760abfd9452fb9a866c7ead0fcc5b0af9b71cb3fd80a8c7a55c100b2a163b4f8

      SHA512

      8b5057f2526b159ffd18da9fe80b0452b28ce8d0ad42560b6b6b6167a489c7e705b7759ddaad21e72a622e2d7ed3e69e5773c5cc36dcd2387bb630c55b2f3565

    • C:\Users\Admin\AppData\Local\Temp\23036d793dd3964189d5926cdf15b7232a95dfd67a2f0a7abf4c07f2ffea2210.exe.exe

      Filesize

      2.8MB

      MD5

      095092f4e746810c5829038d48afd55a

      SHA1

      246eb3d41194dddc826049bbafeb6fc522ec044a

      SHA256

      2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

      SHA512

      7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

    • C:\Windows\Logo1_.exe

      Filesize

      33KB

      MD5

      eab77796242e6170e5d0127a39943097

      SHA1

      61d9438be926a40cfeaf993e586a1b530a3447a1

      SHA256

      810da0fd36a6de1d2d644daab89eab16893ff207d3b59dee7d63a69922795ab1

      SHA512

      abd8de6bedcd6e50492add733517d2b674e152df4a5454bc0e8edd59984df255a8082780d864b5652c6701118b93289022a836e732ed0114984aecf74f1a1faf

    • F:\$RECYCLE.BIN\S-1-5-21-2172136094-3310281978-782691160-1000\_desktop.ini

      Filesize

      8B

      MD5

      fcbaf0a2c3988ef775359f94d545ab42

      SHA1

      174ccd98ff87b8e6f46eebc493f379beafeb3b08

      SHA256

      895aaa8dac57f2bb76ddc8c2681e0480bf57dbf3f62cda3840cb448b8615612f

      SHA512

      7c81b6445708b1c482599bfb808e90462d6111e885691dd947d9cdf95ba028d580b20027575814a310a81f310261b649792b65153ce43063da063b5005561d20

    • memory/1388-27-0x0000000002D60000-0x0000000002D61000-memory.dmp

      Filesize

      4KB

    • memory/1444-31-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1444-3306-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1444-4154-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1712-18-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1712-0-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1712-12-0x00000000001C0000-0x00000000001FD000-memory.dmp

      Filesize

      244KB