Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/09/2024, 19:08

General

  • Target

    b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226.exe

  • Size

    963KB

  • MD5

    05856185e19e9591005fbc3b1b71c064

  • SHA1

    fb53f199268d0cb1a9dd2b0358062dcd33a46928

  • SHA256

    b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226

  • SHA512

    14559d721cedbd62473dabb7c0117fb12199cc22f71f3e2f9497621e50b0e15cc0a49254aa64f8be7a1c3f25e5628c23a2ca04d33a610dd35dd760da18ca86a1

  • SSDEEP

    12288:v+aWRKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:vBPBpDRmi78gkPXlyo0G/jr

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226.exe
        "C:\Users\Admin\AppData\Local\Temp\b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3364
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:888
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBB70.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4920
          • C:\Users\Admin\AppData\Local\Temp\b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226.exe
            "C:\Users\Admin\AppData\Local\Temp\b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2168
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4776
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4164
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4060
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4524
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4480

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      250KB

      MD5

      34bed1754d18866317944f88b9a13c9f

      SHA1

      c9774fe369bc0edbb99a6e999bafb5a4f280d8cb

      SHA256

      3a7342b0c06602627cfeea77a6028b6d9a9f5c67a26f0569c3045ee83fa1a913

      SHA512

      120f42e83af30aa17637646de8e1a71e0ba35d2ccfdcd4f784a78c32f1b71014ebfa5fbe8e940bdad49de55f8c2c03d35de4eccc2122fca6bd50b830d0822fec

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      577KB

      MD5

      2f496ad343c36da3dc6ffa51ac2da7b1

      SHA1

      a6af11506b717df5b91760caafd380b8ccb2c7fc

      SHA256

      ef49d4788538d4f0785387e4a63634a54a7e39a7176da544202fe189e50be7fd

      SHA512

      eb9e7318f0a464d9284a3d4629f9808180f09df312bc0223eb3bf89177fb1783f956b00de3a6b98af3c23bd3deb72556fd09c3fe160ee9f93e56571013bb68e8

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      643KB

      MD5

      408712704306e27135339f85cf53d4e6

      SHA1

      9e76febdb633e7fe4d841b3319104a459e7260d4

      SHA256

      f5c5383d16bc30c38d4ffd13cfa81a8c91577ef9624ebe20571b5ba457e3e573

      SHA512

      381d9955ef1ad6d5f01220aac314ba56d33a312a00c45bd24609769036bedd9d223981352a289dcff6bf4b97728eff03efb75696e4829d4e7d0aa40bf53ea7d8

    • C:\Users\Admin\AppData\Local\Temp\$$aBB70.bat

      Filesize

      722B

      MD5

      b6e4f775294d8e75e5353959439182d3

      SHA1

      18c0abdb5da7dae014c5470fd2c20f5963eec9b7

      SHA256

      208b2d1d5a3a016fe5b3c6c07397014dea6fa71e03c06f0b0daeb98526e9fa05

      SHA512

      110b84d0f27c2b462afb7a92722e48b8ee5ce66511555b276c2043382bd3c70d2aada75e76c50743a32ba3a0eee1c944eea03d9a16cb2dd07f692ecadaecd2c8

    • C:\Users\Admin\AppData\Local\Temp\b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226.exe.exe

      Filesize

      930KB

      MD5

      30ac0b832d75598fb3ec37b6f2a8c86a

      SHA1

      6f47dbfd6ff36df7ba581a4cef024da527dc3046

      SHA256

      1ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74

      SHA512

      505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057

    • C:\Windows\Logo1_.exe

      Filesize

      33KB

      MD5

      7e619692b53866243cf3f4bcd669d555

      SHA1

      5a8429b110acd43c0ddb3f101eac0bf55afb402b

      SHA256

      d33a86247c1731fc2f4acd320bd281542e708ae43ffdb05ee62a89f50bf034ff

      SHA512

      e7d65a2f4fa9e54b2f3445cc3c51d2e442e42ea1132b77c8fe0abf67052eb75a32414e02b10cd172e62b84996898c7dffa1e88496a1b5441dd3fb5059a320421

    • F:\$RECYCLE.BIN\S-1-5-21-2412658365-3084825385-3340777666-1000\_desktop.ini

      Filesize

      8B

      MD5

      5894100cc85ef83f995c15a4d7fce813

      SHA1

      55d61ce36a76e549348eff08abae3e32e96b8123

      SHA256

      4912abab5bf4a890230f6c060bcae7827f96d9ffcf6025852967b53a65fc315d

      SHA512

      248346b25ea49cbaaa8bbd25f2fb26ad59c3f1ba650efd4e9eda9b32d1e918292bab3e5f1b19d92543d416cfe9d8a0b49d09f1eebcdca085a031e8238d461655

    • memory/2200-11-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2200-0-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4776-18-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4776-2876-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4776-8-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4776-8798-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB