Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2024, 07:28

General

  • Target

    4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c.exe

  • Size

    264KB

  • MD5

    4ab45cfb9b6521024b3829a53017c2d2

  • SHA1

    590a9bc930de81b2a2b5577f2e1162be6f0c4920

  • SHA256

    4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c

  • SHA512

    f461363ec46ab62e488dc37a1982c028afc51ee5a855d2d7f7f8c0959619e2e418b426721e6e4c158b39366cb2f44c567a69e4b5bfe781b5a9a77a83a88e2c28

  • SSDEEP

    3072:2CaY46tGNttyeQLYm1LLRkgUA1nQZwFGVO4Mqg+WDY:h46tGdye41LLRp1nQ4QLd

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1236
      • C:\Users\Admin\AppData\Local\Temp\4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c.exe
        "C:\Users\Admin\AppData\Local\Temp\4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2080
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2212
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aD1A1.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1852
          • C:\Users\Admin\AppData\Local\Temp\4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c.exe
            "C:\Users\Admin\AppData\Local\Temp\4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2624
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops file in Drivers directory
          • Drops startup file
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1152
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2896
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2960
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2652
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2844

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            aafff27a423e2993ede528075c1f1852

            SHA1

            fb5f5d781a2f405a62658ee6156806cb1440af50

            SHA256

            a341ea6ea0b94996007723410bfcb17cce91cfcab0e86e111a3b320afea0d6b3

            SHA512

            63be407cb2a41809bc9d6174baacd6dac700eebfbccefa49593daa33fa7570c08dac58a267dfe50214118dba19065e6fb70820178558c26c7b14e27c33f08490

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            478KB

            MD5

            221886d1b103525fc407c8fed3ab083e

            SHA1

            965d60f0b645def3fdc5dc1d0178b6bfee45d941

            SHA256

            12b9b8617c5633e47953da144c80388512ee9a5fcb4fe7d0c143a3bc08e90458

            SHA512

            f5f7aea322a28570dfa57b5344002759e043b1f0e2806d95ee2492f6fe6a8a3cd5a9f8817cd4714cfa9f90fb219613654f03ed5b7e4ccf7b0761d9f945485348

          • C:\Users\Admin\AppData\Local\Temp\$$aD1A1.bat

            Filesize

            722B

            MD5

            9f724fb1eb3cda255804efc37311486e

            SHA1

            2721d1c535cc4e77e77c130840b1c95876348c32

            SHA256

            48c3cb855251b1b90cff0089bc36c685098e8ea4a9cb04344a34b8aedb20e472

            SHA512

            61fd19a1a8ba489d91b8e291fb0ebda2a0480bcdd6c89b9901c7a7107dbc607eddc954b0ceed1826d8f04034bfe64714a0790492514d9c15ee33d0bf6a705f3c

          • C:\Users\Admin\AppData\Local\Temp\4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c.exe.exe

            Filesize

            231KB

            MD5

            6f581a41167d2d484fcba20e6fc3c39a

            SHA1

            d48de48d24101b9baaa24f674066577e38e6b75c

            SHA256

            3eb8d53778eab9fb13b4c97aeab56e4bad2a6ea3748d342f22eaf4d7aa3185a7

            SHA512

            e1177b6cea89445d58307b3327c78909adff225497f9abb8de571cdd114b547a8f515ec3ab038b583bf752a085b231f6329d6ca82fbe6be8a58cd97a1dbaf0f6

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            da194ed032e8c4c99f906abd0b52e279

            SHA1

            77b06c04e207481522179ea7ac71c7ebdc80b70e

            SHA256

            b06e9af9027c0f9b6929c97f21192d88b44fc4e0be72db6db918398eb8ea183b

            SHA512

            02a6b836e8f8221d994fcad3f05bec20ea32029cbd56946670414b0fd3b4d391c6ccf455f2c18fc6a5e0d0d4174cc402cabe3ea8109e7bca27e9e728aea43f1a

          • C:\Windows\system32\drivers\etc\hosts

            Filesize

            832B

            MD5

            7e3a0edd0c6cd8316f4b6c159d5167a1

            SHA1

            753428b4736ffb2c9e3eb50f89255b212768c55a

            SHA256

            1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

            SHA512

            9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

          • F:\$RECYCLE.BIN\S-1-5-21-1846800975-3917212583-2893086201-1000\_desktop.ini

            Filesize

            10B

            MD5

            1603436fb34d76c51d66ab1816519131

            SHA1

            3d5dc4ccfe3cc992c253dccfccf66ea727f66bf6

            SHA256

            9072a674ab684ff3ef851bf4f0fdc4118d2bcbe765282f38f3f6de4360057d60

            SHA512

            30d89b59822313e4b281b8f63b959f36262b2b948cf38e6389e9a1a7517c7c239349a41de9e35c8cd27d6b852ab5349206c2fb85b631dc59fab5421d997dbd46

          • memory/1152-23-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1152-35-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1152-2964-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1152-4153-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1236-31-0x0000000002550000-0x0000000002551000-memory.dmp

            Filesize

            4KB

          • memory/2432-20-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2432-18-0x00000000002D0000-0x000000000030E000-memory.dmp

            Filesize

            248KB

          • memory/2432-0-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2432-13-0x00000000002D0000-0x000000000030E000-memory.dmp

            Filesize

            248KB