Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 07:46

General

  • Target

    c21ef6c22f4d48dd72db3763e21e532af7510630e938c26db4bb3a0047f14503.exe

  • Size

    72KB

  • MD5

    096085650918102b001b3f9bb6b2078a

  • SHA1

    2c3fc6d2cb302d86efa375794e5264dcd2c7c31e

  • SHA256

    c21ef6c22f4d48dd72db3763e21e532af7510630e938c26db4bb3a0047f14503

  • SHA512

    749f67c236a863fe8c1e177bbc6b57c9fcdbb43603a6162697d4161420eca575f7f5e786196e33af0529401711e57b8f2a96c4bf94c0793b7a7548a1bd3df356

  • SSDEEP

    1536:Ate+Zk7qzUJBC2KsgSMcJziyDfzHa/iSfRmq:Ate+aezUa6pBiyDfzhSfRb

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\c21ef6c22f4d48dd72db3763e21e532af7510630e938c26db4bb3a0047f14503.exe
        "C:\Users\Admin\AppData\Local\Temp\c21ef6c22f4d48dd72db3763e21e532af7510630e938c26db4bb3a0047f14503.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2204
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2552
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2544
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a9203.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2132
          • C:\Users\Admin\AppData\Local\Temp\c21ef6c22f4d48dd72db3763e21e532af7510630e938c26db4bb3a0047f14503.exe
            "C:\Users\Admin\AppData\Local\Temp\c21ef6c22f4d48dd72db3763e21e532af7510630e938c26db4bb3a0047f14503.exe"
            4⤵
            • Executes dropped EXE
            PID:2736
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2228
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2820
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2768
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2880
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2712

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

      Filesize

      264KB

      MD5

      297174cd7555610558f6b0963d51959d

      SHA1

      cf49c0c794953afb6215b5a40a94eb80883d459a

      SHA256

      1af18f231c1b4ad3eea5f379a16689d9d255bc16c8ccdccef12036c909a604b7

      SHA512

      c01a218df37d548e1adb60a4081442ac65ad81541fb550e81e4f130377d565785792b7735fe5ac480118ea4c5df5340aaa1d8de926245b22e268ca694d14c2e2

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      484KB

      MD5

      e81910ec88765abcb2543d1b8c398902

      SHA1

      decc58517653fd3118508debf5fe5b7ec88f9b67

      SHA256

      4380184488b4e4894847e9a1dc5e4b3fb1dbbb7d4e0de341d411cc822a094d03

      SHA512

      ae444bd9925bd0e29f1e164fc19c11b3845f17c0af56baf05e8b6fcc7ea3b4b6afb151de19e88aaa011c6039ff85080c941549f97bef1144ad78b4611e0df20f

    • C:\Users\Admin\AppData\Local\Temp\$$a9203.bat

      Filesize

      722B

      MD5

      2ef6f298e028d0a218522164df066241

      SHA1

      2d5babe6e70ab3147d70c7d2d5cde838c878e0ef

      SHA256

      3818c4dda02ac43436df17dd493c737a5782e7d7cf2774f6b92cb5d9920658e2

      SHA512

      35f9dfa8de086990a071486dff4ac9d2efd32c291bef102a5f2e005537d060046d7a3e80be92ff474ea2ecf981b81b2955824b08f3373a5655a5e71cc491f0ec

    • C:\Users\Admin\AppData\Local\Temp\c21ef6c22f4d48dd72db3763e21e532af7510630e938c26db4bb3a0047f14503.exe.exe

      Filesize

      33KB

      MD5

      aa8eced8b0c3b3722e8958b79a4c6296

      SHA1

      4ff7ef88e26a40675f194b7f07e1bf8f3350ba07

      SHA256

      91e0b1b49ace92844e5a9afffcf2fb584cfec9f548e58ef57e3dd37dfd19f638

      SHA512

      6f2f104befbeefa821b86d47ec256f7b13ae8f00a7cbd5d724a7bdfd20c94c5cb53c654b5637b3c7ae4fc3cd2f10d6332bf08d85af718201068a985214322698

    • C:\Windows\Logo1_.exe

      Filesize

      39KB

      MD5

      0b034525c0a86d564a1585fe1b22bb5f

      SHA1

      e12b56f99a607fb621f7af46c5d829d71ce97cd6

      SHA256

      d8a7abd2d5a1dce1488ea5a68f80cdebca7225ab725853a8f5277855bdf23c4e

      SHA512

      4ccf381fcb4038259db3a9e6099e79b203e4f8e22771300f9429d811ae022327953f2648458bfa78dac78e58b2cf2af8a1dad34207d736ebf4cfff0dedabbf4a

    • F:\$RECYCLE.BIN\S-1-5-21-3551809350-4263495960-1443967649-1000\_desktop.ini

      Filesize

      8B

      MD5

      24cfb7e9169e3ecbcdf34395dff5aed0

      SHA1

      64061d8b0afd788fb3d2990e90e61f14010896dd

      SHA256

      e11477f26e6139dabba6ad5dab927732c6a3785db78f82194ad7ae20323c6578

      SHA512

      a315d4ab14f15f8df115e35134f0a1eff8018b0c35c5a0283928f2d3f3014215d683973b9aeba1bc74c49437cc929ea4e2fb847b4305da6d5abca235c750e299

    • memory/1216-28-0x0000000002D80000-0x0000000002D81000-memory.dmp

      Filesize

      4KB

    • memory/2204-18-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2204-0-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2204-12-0x00000000002D0000-0x000000000030D000-memory.dmp

      Filesize

      244KB

    • memory/2228-19-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2228-32-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2228-3001-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2228-4150-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB