Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/09/2024, 19:08

General

  • Target

    b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226.exe

  • Size

    963KB

  • MD5

    05856185e19e9591005fbc3b1b71c064

  • SHA1

    fb53f199268d0cb1a9dd2b0358062dcd33a46928

  • SHA256

    b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226

  • SHA512

    14559d721cedbd62473dabb7c0117fb12199cc22f71f3e2f9497621e50b0e15cc0a49254aa64f8be7a1c3f25e5628c23a2ca04d33a610dd35dd760da18ca86a1

  • SSDEEP

    12288:v+aWRKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:vBPBpDRmi78gkPXlyo0G/jr

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226.exe
        "C:\Users\Admin\AppData\Local\Temp\b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3364
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:888
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBB70.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4920
          • C:\Users\Admin\AppData\Local\Temp\b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226.exe
            "C:\Users\Admin\AppData\Local\Temp\b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2168
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4776
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4164
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4060
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4524
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4480

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

            Filesize

            250KB

            MD5

            34bed1754d18866317944f88b9a13c9f

            SHA1

            c9774fe369bc0edbb99a6e999bafb5a4f280d8cb

            SHA256

            3a7342b0c06602627cfeea77a6028b6d9a9f5c67a26f0569c3045ee83fa1a913

            SHA512

            120f42e83af30aa17637646de8e1a71e0ba35d2ccfdcd4f784a78c32f1b71014ebfa5fbe8e940bdad49de55f8c2c03d35de4eccc2122fca6bd50b830d0822fec

          • C:\Program Files\7-Zip\7z.exe

            Filesize

            577KB

            MD5

            2f496ad343c36da3dc6ffa51ac2da7b1

            SHA1

            a6af11506b717df5b91760caafd380b8ccb2c7fc

            SHA256

            ef49d4788538d4f0785387e4a63634a54a7e39a7176da544202fe189e50be7fd

            SHA512

            eb9e7318f0a464d9284a3d4629f9808180f09df312bc0223eb3bf89177fb1783f956b00de3a6b98af3c23bd3deb72556fd09c3fe160ee9f93e56571013bb68e8

          • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

            Filesize

            643KB

            MD5

            408712704306e27135339f85cf53d4e6

            SHA1

            9e76febdb633e7fe4d841b3319104a459e7260d4

            SHA256

            f5c5383d16bc30c38d4ffd13cfa81a8c91577ef9624ebe20571b5ba457e3e573

            SHA512

            381d9955ef1ad6d5f01220aac314ba56d33a312a00c45bd24609769036bedd9d223981352a289dcff6bf4b97728eff03efb75696e4829d4e7d0aa40bf53ea7d8

          • C:\Users\Admin\AppData\Local\Temp\$$aBB70.bat

            Filesize

            722B

            MD5

            b6e4f775294d8e75e5353959439182d3

            SHA1

            18c0abdb5da7dae014c5470fd2c20f5963eec9b7

            SHA256

            208b2d1d5a3a016fe5b3c6c07397014dea6fa71e03c06f0b0daeb98526e9fa05

            SHA512

            110b84d0f27c2b462afb7a92722e48b8ee5ce66511555b276c2043382bd3c70d2aada75e76c50743a32ba3a0eee1c944eea03d9a16cb2dd07f692ecadaecd2c8

          • C:\Users\Admin\AppData\Local\Temp\b6227408df6a45bb24ae89b2cbf4aa6e387334a612532ce80828dd150f104226.exe.exe

            Filesize

            930KB

            MD5

            30ac0b832d75598fb3ec37b6f2a8c86a

            SHA1

            6f47dbfd6ff36df7ba581a4cef024da527dc3046

            SHA256

            1ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74

            SHA512

            505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            7e619692b53866243cf3f4bcd669d555

            SHA1

            5a8429b110acd43c0ddb3f101eac0bf55afb402b

            SHA256

            d33a86247c1731fc2f4acd320bd281542e708ae43ffdb05ee62a89f50bf034ff

            SHA512

            e7d65a2f4fa9e54b2f3445cc3c51d2e442e42ea1132b77c8fe0abf67052eb75a32414e02b10cd172e62b84996898c7dffa1e88496a1b5441dd3fb5059a320421

          • F:\$RECYCLE.BIN\S-1-5-21-2412658365-3084825385-3340777666-1000\_desktop.ini

            Filesize

            8B

            MD5

            5894100cc85ef83f995c15a4d7fce813

            SHA1

            55d61ce36a76e549348eff08abae3e32e96b8123

            SHA256

            4912abab5bf4a890230f6c060bcae7827f96d9ffcf6025852967b53a65fc315d

            SHA512

            248346b25ea49cbaaa8bbd25f2fb26ad59c3f1ba650efd4e9eda9b32d1e918292bab3e5f1b19d92543d416cfe9d8a0b49d09f1eebcdca085a031e8238d461655

          • memory/2200-11-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2200-0-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4776-18-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4776-2876-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4776-8-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4776-8798-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB