Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 07:28

General

  • Target

    4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c.exe

  • Size

    264KB

  • MD5

    4ab45cfb9b6521024b3829a53017c2d2

  • SHA1

    590a9bc930de81b2a2b5577f2e1162be6f0c4920

  • SHA256

    4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c

  • SHA512

    f461363ec46ab62e488dc37a1982c028afc51ee5a855d2d7f7f8c0959619e2e418b426721e6e4c158b39366cb2f44c567a69e4b5bfe781b5a9a77a83a88e2c28

  • SSDEEP

    3072:2CaY46tGNttyeQLYm1LLRkgUA1nQZwFGVO4Mqg+WDY:h46tGdye41LLRp1nQ4QLd

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3504
      • C:\Users\Admin\AppData\Local\Temp\4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c.exe
        "C:\Users\Admin\AppData\Local\Temp\4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5088
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3284
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4832
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7196.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1816
          • C:\Users\Admin\AppData\Local\Temp\4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c.exe
            "C:\Users\Admin\AppData\Local\Temp\4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2800
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops file in Drivers directory
          • Drops startup file
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1528
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2740
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4936
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3364
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2568

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

            Filesize

            251KB

            MD5

            712d1e8ff36d128a500dd2ca03f4366d

            SHA1

            4d97940b84b69b44fd90705723534dd90bb51083

            SHA256

            22c5c03331c868888af212d1698d1f5f6b5c0d71f7bc8f1b2e8f1775e519e635

            SHA512

            ada0f660f4c593d48a592601774b8f8562e8fd1886d7b27f0db23f5aef5c31363b52598d4755d881863d553a08da8f0ab750d00569120f4c8891f8d118ac1a84

          • C:\Program Files\7-Zip\7z.exe

            Filesize

            577KB

            MD5

            c20f761fcf118d3856ccedeeaa8f7522

            SHA1

            99119635ff856ed9cd80c5d8972908b9495a4cb4

            SHA256

            df7c4a56c6a097085284a91a043102a9c4ff8a7b071af13618c084c51665a21c

            SHA512

            fc9cd7090ffdd7cff4e50c0cad7ac17d6c28a4ddbcacb76f6fe51da67dc590005ee672514b7087a5783ab997fea615a0c02f423186aad62b7002b9948d035eaf

          • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

            Filesize

            644KB

            MD5

            e3789f43def2321f01c16b6e18bba5ff

            SHA1

            4911c2ef35ff8ef5b9c5a5ec69f4394a08f87492

            SHA256

            3443421d39fe1ff808589873d0a95e0258a738cddc3015f6b42aa9b68fedbaf4

            SHA512

            132ed6a72034454bb97a0290a5289c10c990eb2f2be9db8d93816db25a2d7e19e164ff7f0b35ad190a891af0852ce4613d2c01db7ac2f2bf34cfb59f8c3dc6ed

          • C:\Users\Admin\AppData\Local\Temp\$$a7196.bat

            Filesize

            722B

            MD5

            cb832284cc2805de0a4f60ed51240fbf

            SHA1

            2657cdd32f9f123661c608f143dff8a28207f8fb

            SHA256

            50192d3767d6e17787f2064936eb4824eb4242f6adaeb00d525e67ee1900bc78

            SHA512

            beaa89002ec8ddb1115b8a1ab51af331eae2d1c8da391992a081192912591b8abaf47f5d39c10b6f50ffc85134ed7b130c4d6a71a715def33a9b97d773d046dc

          • C:\Users\Admin\AppData\Local\Temp\4b08663a1ea030d9b396d356fbf16b1ba2f3671118285952f2aaf2254e4c868c.exe.exe

            Filesize

            231KB

            MD5

            6f581a41167d2d484fcba20e6fc3c39a

            SHA1

            d48de48d24101b9baaa24f674066577e38e6b75c

            SHA256

            3eb8d53778eab9fb13b4c97aeab56e4bad2a6ea3748d342f22eaf4d7aa3185a7

            SHA512

            e1177b6cea89445d58307b3327c78909adff225497f9abb8de571cdd114b547a8f515ec3ab038b583bf752a085b231f6329d6ca82fbe6be8a58cd97a1dbaf0f6

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            da194ed032e8c4c99f906abd0b52e279

            SHA1

            77b06c04e207481522179ea7ac71c7ebdc80b70e

            SHA256

            b06e9af9027c0f9b6929c97f21192d88b44fc4e0be72db6db918398eb8ea183b

            SHA512

            02a6b836e8f8221d994fcad3f05bec20ea32029cbd56946670414b0fd3b4d391c6ccf455f2c18fc6a5e0d0d4174cc402cabe3ea8109e7bca27e9e728aea43f1a

          • C:\Windows\system32\drivers\etc\hosts

            Filesize

            842B

            MD5

            6f4adf207ef402d9ef40c6aa52ffd245

            SHA1

            4b05b495619c643f02e278dede8f5b1392555a57

            SHA256

            d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e

            SHA512

            a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

          • F:\$RECYCLE.BIN\S-1-5-21-4089630652-1596403869-279772308-1000\_desktop.ini

            Filesize

            10B

            MD5

            1603436fb34d76c51d66ab1816519131

            SHA1

            3d5dc4ccfe3cc992c253dccfccf66ea727f66bf6

            SHA256

            9072a674ab684ff3ef851bf4f0fdc4118d2bcbe765282f38f3f6de4360057d60

            SHA512

            30d89b59822313e4b281b8f63b959f36262b2b948cf38e6389e9a1a7517c7c239349a41de9e35c8cd27d6b852ab5349206c2fb85b631dc59fab5421d997dbd46

          • memory/1528-20-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1528-3486-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1528-9-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1528-8722-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/5088-0-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/5088-11-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB