Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 19:07

General

  • Target

    7b03dff7a43563327fc7985816d4cd0352d62da27a81207f53d28918d29a9c69.exe

  • Size

    717KB

  • MD5

    995b75fa14c89a153be32843e1877131

  • SHA1

    12a0f6c7122c76f66163542f2f818c5b4e99f70c

  • SHA256

    7b03dff7a43563327fc7985816d4cd0352d62da27a81207f53d28918d29a9c69

  • SHA512

    2bfcfc7c11e9868014bf5ae63cf71d5e0b07e5e950d240dfb9962c173d9ddc294302a11aeb8e7d2b82b51f352569eeff2cd759e43ed0ad9f836c0d7131b495e4

  • SSDEEP

    12288:/l3NPfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:t3NnLOS2opPIXV

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\7b03dff7a43563327fc7985816d4cd0352d62da27a81207f53d28918d29a9c69.exe
      "C:\Users\Admin\AppData\Local\Temp\7b03dff7a43563327fc7985816d4cd0352d62da27a81207f53d28918d29a9c69.exe"
      2⤵
      • Drops file in Drivers directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:548
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2040
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\$$aDFC4.bat
        3⤵
        • Deletes itself
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1436
        • C:\Users\Admin\AppData\Local\Temp\7b03dff7a43563327fc7985816d4cd0352d62da27a81207f53d28918d29a9c69.exe
          "C:\Users\Admin\AppData\Local\Temp\7b03dff7a43563327fc7985816d4cd0352d62da27a81207f53d28918d29a9c69.exe"
          4⤵
          • Executes dropped EXE
          PID:2636
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        3⤵
        • Drops file in Drivers directory
        • Drops startup file
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2736
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

    Filesize

    258KB

    MD5

    78027959d5cff1141c07380e803faafe

    SHA1

    122c33e1e6909c587b9968892a430145a6e1d031

    SHA256

    768341063dd8754f8cdc5d8b85c3b81c556810b0f94335e9bc73eeda39466b9e

    SHA512

    1683d3ac13a3678f71fb153045d64203f81d3833f8dff13057bc163d4f04b619ee285c2922e02e9d762339d29ee8cfa0355c6cb06cbd4fab0c106a630d9a66bb

  • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

    Filesize

    478KB

    MD5

    0165e17c5e9a80f5533940114281c930

    SHA1

    5e5bd89c8cb9e5ec512e5759c5b1e080ce27c9a6

    SHA256

    f8ea49a11b2001dda551b78c743cfc62461d8270aab8ed822a5dfb68c3a269a5

    SHA512

    56f43711fd84c5052e1d15fe47fd7755b0aa944197e08c6a84762c2db6dc2ea1fbe2b14451772f213f82a34e18d4a79b7c3efd5be211b86ecd7c9603fd4c772b

  • C:\Users\Admin\AppData\Local\Temp\$$aDFC4.bat

    Filesize

    722B

    MD5

    0652f1baec45f35da34b74056131655c

    SHA1

    4e70ea5911c25eba1271975b96c2282db9712a29

    SHA256

    25a79746eeb601076e142b31910c00a1a17a9da344e81c87c0a4b47c2ab0f464

    SHA512

    9d28e0451c1b7b17791abb5073060dff53e8110119c2798c7dc0fa87042905ed06da5a607c91671956c9b4c8de5367b3f0a422b7220594850e4fb11687929ad1

  • C:\Users\Admin\AppData\Local\Temp\7b03dff7a43563327fc7985816d4cd0352d62da27a81207f53d28918d29a9c69.exe.exe

    Filesize

    684KB

    MD5

    50f289df0c19484e970849aac4e6f977

    SHA1

    3dc77c8830836ab844975eb002149b66da2e10be

    SHA256

    b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305

    SHA512

    877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38

  • C:\Windows\Logo1_.exe

    Filesize

    33KB

    MD5

    40273888e6f810c5d36b67a557705a9b

    SHA1

    c3645a700012862685fe72fd7b48111e99096328

    SHA256

    37ac64227c05364e74a0d788824758e8783e4d57ec9fb38db311e40111b1403a

    SHA512

    695354d1339276071024a89279ee97e3b519fee92e7a89aef3333cafe00ea4537f4e7e1f22ae9804719ac47d5fa867413681290916e832864a430c463e10e658

  • C:\Windows\system32\drivers\etc\hosts

    Filesize

    832B

    MD5

    7e3a0edd0c6cd8316f4b6c159d5167a1

    SHA1

    753428b4736ffb2c9e3eb50f89255b212768c55a

    SHA256

    1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

    SHA512

    9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

  • F:\$RECYCLE.BIN\S-1-5-21-3290804112-2823094203-3137964600-1000\_desktop.ini

    Filesize

    9B

    MD5

    f74f4ac317419affe59fa4d389dd7e7c

    SHA1

    010f494382d5a64298702fe3732c9b96f438c653

    SHA256

    74fafb0f14fb17a8a4963d5f46fc50b3517e7aa13414ac5f42edfdf212a9bb01

    SHA512

    f82fea1632b97d2b6771f43a6941c84d7fbb86f4c4f69e9b4335aa0e166e2670f09d451da61b13cb16994b9294e99b1cfa27f2447579645b3886b7bd014cc00f

  • memory/548-18-0x0000000000230000-0x000000000026E000-memory.dmp

    Filesize

    248KB

  • memory/548-13-0x0000000000230000-0x000000000026E000-memory.dmp

    Filesize

    248KB

  • memory/548-0-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/548-20-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1212-33-0x0000000002E10000-0x0000000002E11000-memory.dmp

    Filesize

    4KB

  • memory/3048-23-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/3048-36-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/3048-2965-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/3048-4154-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB