Analysis

  • max time kernel
    149s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 04:27

General

  • Target

    f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe

  • Size

    717KB

  • MD5

    2233607fd7b1ba5067a3f69f88c2d715

  • SHA1

    cf8a0ae2d350d17e5c0c52b37a06749b06c62022

  • SHA256

    f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81

  • SHA512

    4eb96bd98a1478022f107f705ba3f71f8479f2621d037563faee97c64645640d8bfb39b27ea6b567166b93527159c04c56319396687388b3e6a6a659405a096f

  • SSDEEP

    12288:23WFjJfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:23M9LOS2opPIXV

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1404
    • C:\Users\Admin\AppData\Local\Temp\f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe
      "C:\Users\Admin\AppData\Local\Temp\f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe"
      2⤵
      • Drops file in Drivers directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2260
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\$$a47D9.bat
        3⤵
        • Deletes itself
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Users\Admin\AppData\Local\Temp\f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe
          "C:\Users\Admin\AppData\Local\Temp\f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe"
          4⤵
          • Executes dropped EXE
          PID:2920
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        3⤵
        • Drops file in Drivers directory
        • Drops startup file
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2288
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2864
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1204
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

    Filesize

    258KB

    MD5

    48ac4fe7bf907ae4c6588ef9ce22404a

    SHA1

    2063e8c058705af01f0970d14e8dca76547148d5

    SHA256

    07bbb740259b06365208527424faa445efbce60315b337fe5607c2ce8b8ae876

    SHA512

    fec0ca458488ad3c389a599539bbd6140a8190a137e9cae8401e6e13042e1b022ef9650061cc86aa626d38c278b274df220350da9505058443f386daea57d458

  • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

    Filesize

    478KB

    MD5

    e3d7f6cbc53a96972587f05acd5c0ca0

    SHA1

    e12f124807a30188da6157d4423775373c668dd8

    SHA256

    75db003d5fe6855e432e4ccaf8720890f181c3dc9d800b253508aebabfde2da8

    SHA512

    ea783b525ebf1fa786d06051e64c72efa9665aaaa0e456c99c3fb80298066491da47d9056f7046d35d4bb3165ac2ca85eac9c9a9331923dbf56937831a9bc078

  • C:\Users\Admin\AppData\Local\Temp\$$a47D9.bat

    Filesize

    722B

    MD5

    0a59249a179e74bf1b94ad942cc66a72

    SHA1

    554205c64342a0e885dec629d073d404bb6685dc

    SHA256

    05f7038fd645096b5d6ead2f3059016d3df8da94cfcb3a73232c1c379d0bfc04

    SHA512

    fdb557b1b18becec9adc29badebb7aa220d9e9124dc560ecdd4f4c4148bc800fb2544a112e9eef0536dffc101ea5912eb75e5645228dc54d444bdc7c78b7fce0

  • C:\Users\Admin\AppData\Local\Temp\f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe.exe

    Filesize

    684KB

    MD5

    50f289df0c19484e970849aac4e6f977

    SHA1

    3dc77c8830836ab844975eb002149b66da2e10be

    SHA256

    b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305

    SHA512

    877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38

  • C:\Windows\Logo1_.exe

    Filesize

    33KB

    MD5

    6d586ac2bb64f07330035c899711c07b

    SHA1

    514323c069ae4d4d6993c0eea9bec585476cf8c5

    SHA256

    875ebcd4a1bab1fc1bb872ff320de3f4e9e86cc92c9bfc7715378c3248f88df5

    SHA512

    1f51607712145a9c19bc7b5d4859f9329619576f7be6d87d69d3d36cac7462f887e5a8af0311e4fd192eec53afd34e45ade76077b329241c956f897b07670f80

  • C:\Windows\system32\drivers\etc\hosts

    Filesize

    832B

    MD5

    7e3a0edd0c6cd8316f4b6c159d5167a1

    SHA1

    753428b4736ffb2c9e3eb50f89255b212768c55a

    SHA256

    1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

    SHA512

    9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

  • F:\$RECYCLE.BIN\S-1-5-21-1506706701-1246725540-2219210854-1000\_desktop.ini

    Filesize

    9B

    MD5

    9f88a7249d726e0d4ebea8ef2b661d98

    SHA1

    f68a9700c917086c68acd41e85887dc8fcc4c2c3

    SHA256

    969f39ddb9e19420959783eb412b391e2c49b99261750aa2716b781fabcc0f3b

    SHA512

    f68c4e069aeefc665d8c92f0c734098e4de0f4b1bea40dd72510827a49f9bd2ef6dd5b606d05cb0716630f1f27f471c3cf7d036442f34c3faa4f905d6101e21f

  • memory/1404-32-0x0000000002A20000-0x0000000002A21000-memory.dmp

    Filesize

    4KB

  • memory/2360-0-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2360-18-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2360-19-0x00000000005D0000-0x000000000060E000-memory.dmp

    Filesize

    248KB

  • memory/2360-13-0x00000000005D0000-0x000000000060E000-memory.dmp

    Filesize

    248KB

  • memory/2760-35-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2760-2939-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2760-4158-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB