Analysis

  • max time kernel
    150s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 10:24

General

  • Target

    10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe

  • Size

    165KB

  • MD5

    febbce4a4884011c8203571018a6db1b

  • SHA1

    3906e1612c2d67463d991fbf87053e2efbed005b

  • SHA256

    10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272

  • SHA512

    61beac16bb56b2bd79b9e629c0448d01fbcadafb2ef0e014b415a0c8123147195b164c33f29ce122d3ddd85f00e464e492336e6189627b999ed8786b156a9ebe

  • SSDEEP

    3072:PAaY46tGNttyJQ7KRZ99djmMGWBgh1002J8emEu3T7TO+9Z9sTOVrZzxVxU:Y46tGdytYWBW1Wu3rOOuOVr8

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3348
      • C:\Users\Admin\AppData\Local\Temp\10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe
        "C:\Users\Admin\AppData\Local\Temp\10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1452
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1400
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2344
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aC890.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3960
          • C:\Users\Admin\AppData\Local\Temp\10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe
            "C:\Users\Admin\AppData\Local\Temp\10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:5044
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops file in Drivers directory
          • Drops startup file
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2068
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3980
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3608
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2436
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      251KB

      MD5

      61df7a95330214312aaa9099fd631f21

      SHA1

      5c6f5a22cbd1525ff951566e72f6129fb8c11560

      SHA256

      734023a9633031e915b216ba54f65929438838d46d194e47c413cc0ff02e5e20

      SHA512

      0c441efae345891a4c65d3cb4336a2bfeb2a623e6f5f144e3c86e56e858688ee8a3071dc05db1feb98f03e665c60ac011451028c9c7eedf9ca93170214edb796

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      577KB

      MD5

      1eb506486ea33ba644a0113e46b4966c

      SHA1

      3920ec8a454463920908ae9d7b9969994b916f93

      SHA256

      6b50f6c68d4575cf9acf30b972433d12e5ebe6a8c6eee73c0c203a2b00d8589c

      SHA512

      8371120b1dcd4820929a1f0a73416484a6d0e1c84e8a41c5d4727c9166dd399d6b521145255e40d473c4ad308ab4c68b99f7e3888c43194660b7c5907f049a19

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      643KB

      MD5

      c812cad58e4a4cedd3373f5125ed73dc

      SHA1

      48cb77381e1c81f5f75e13ee39e35ced130fc784

      SHA256

      1c27223874f6c587ed068134e66e9a0588de3776370bf5f14bfdd246c860d9cf

      SHA512

      72af90d02def9f922ca8d4e621bea562718c8e530039eb22f44e8fc9089ccc4990e0a20b1f2d5761e46af0e579bbd5a666c9176d07b096c751b754a476e6626f

    • C:\Users\Admin\AppData\Local\Temp\$$aC890.bat

      Filesize

      722B

      MD5

      4f89ddc4b333f89eb90c0a991411a6eb

      SHA1

      a2be934e68b5f304b3aae0ee4225c155ec3ecae0

      SHA256

      62a3a1d873aa07234564c963cf9653a7c2fc59422268d0b62146604fcfa0d651

      SHA512

      ac6b134d29aab2842ac57c8ab60857851cab8413e630e9c587eb710c9be10e1d4026e3933071e5b503c343647f2a88b0cc049f6498f9976e717f7805f2f6f299

    • C:\Users\Admin\AppData\Local\Temp\10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe.exe

      Filesize

      131KB

      MD5

      16438a96a8adb85472ca72da04701b29

      SHA1

      b1f5ee8bc083804de4de820255107f6541c84735

      SHA256

      9291cd97d2f1b119438f16e97ea75119f19fd959ec5414e84b337530d692e289

      SHA512

      58f659a29cb34245a261b7666b1cda4b76f2df1039f3713dda6ff5a97c33b4cc273b110d10b4131a6a5c13897efcfa9a5ef3031e0e5fb14db1adc0ac1ef25dcd

    • C:\Windows\Logo1_.exe

      Filesize

      33KB

      MD5

      3d9c952267a9a305ef5d062d58fd34c7

      SHA1

      8aa433b4b2c265827dab122d3f3a170770077811

      SHA256

      7672a8f08195d21919c254b8d4f493c3df281c91a880601baaadc749b8d5b8ae

      SHA512

      92f74261778082ffa25869a64b630a5ac5651614cccd0ef6840c605b53f24bc3e451c628809a1f254bf49eb85726d40be4d56137200f8bb636a714eac306fd5c

    • C:\Windows\system32\drivers\etc\hosts

      Filesize

      842B

      MD5

      6f4adf207ef402d9ef40c6aa52ffd245

      SHA1

      4b05b495619c643f02e278dede8f5b1392555a57

      SHA256

      d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e

      SHA512

      a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

    • F:\$RECYCLE.BIN\S-1-5-21-945322488-2060912225-3527527000-1000\_desktop.ini

      Filesize

      9B

      MD5

      5412111268dd2c1fb1cf8697bfab9b6c

      SHA1

      16d0b289e83c74cb50a004edd7c5750ac706f321

      SHA256

      f3aa35be7048ddbf11fc581e5f9476745d75bcf097e121ba2915614e360a0cdc

      SHA512

      13fc5bf11faaf5471fde8a1bafdcc6d27521bad796e5e532c94d9c8232dd70088e70b6d5ac60c4c15d13e59926ac38e9a9e01b4dd4694a77d70bdd1ae7005ccf

    • memory/1452-11-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1452-0-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2068-20-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2068-2864-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2068-10-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2068-8852-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB