Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 15:11

General

  • Target

    7d809d0ed2d1dcca30a87b43474a97110dafaee2690d90faec54302e94142d5a.exe

  • Size

    717KB

  • MD5

    963c4f21514de2f084e8dbf17037e9b8

  • SHA1

    a6ea0cc9b7fb0192c2a2fd5189d3e5164db895bb

  • SHA256

    7d809d0ed2d1dcca30a87b43474a97110dafaee2690d90faec54302e94142d5a

  • SHA512

    a296c30bad3fd6ffc8564c558281628d3d5035146cfbee30ad586cff50766c5900debf7401a39d6e237e7eefd1983cff8342224ea413b191d38aa57f0dfc9b0e

  • SSDEEP

    12288:5Q3N2cfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:5Q3N2wLOS2opPIXV

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\7d809d0ed2d1dcca30a87b43474a97110dafaee2690d90faec54302e94142d5a.exe
      "C:\Users\Admin\AppData\Local\Temp\7d809d0ed2d1dcca30a87b43474a97110dafaee2690d90faec54302e94142d5a.exe"
      2⤵
      • Drops file in Drivers directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2320
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2504
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\$$aE994.bat
        3⤵
        • Deletes itself
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2244
        • C:\Users\Admin\AppData\Local\Temp\7d809d0ed2d1dcca30a87b43474a97110dafaee2690d90faec54302e94142d5a.exe
          "C:\Users\Admin\AppData\Local\Temp\7d809d0ed2d1dcca30a87b43474a97110dafaee2690d90faec54302e94142d5a.exe"
          4⤵
          • Executes dropped EXE
          PID:2820
      • C:\Windows\Logo1_.exe
        C:\Windows\Logo1_.exe
        3⤵
        • Drops file in Drivers directory
        • Drops startup file
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1692
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2652
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2968
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2580
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

    Filesize

    258KB

    MD5

    c51b885d6fb355c3c50b6f42af332f61

    SHA1

    7e572d2db63abad922075b19065b478d9bb82c9f

    SHA256

    80a0ee404071faf0810fc05a29edfff37575c86e4d1d71c63dfb2a5bffda2029

    SHA512

    0279fcd2329ddc0fd0ff98c90dbef9fd3d2923f902b81bc1877c81239c4ba0ef70103618c52d75016b584da01f868f6038df26f2926f3abad504ed8216f01d1d

  • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

    Filesize

    478KB

    MD5

    351e71807210e37c4767fb10f08e8e94

    SHA1

    4209f9b8e9570e5fd6c50d742c7833fffa83c70b

    SHA256

    3ba4929aaf7cd407db10183d2ef6330cb842144a18613ec33003427de41e5383

    SHA512

    97fee72f9bb10d482a4ca1098053527b6b7707c8be869a18bb5ad35abd037663f7b834724ef3e61cd950843cba085a5b9a34cee3662d1cbf49df4d0dac91a1b4

  • C:\Users\Admin\AppData\Local\Temp\$$aE994.bat

    Filesize

    722B

    MD5

    fe7eacc72aa341a3dabc9c1a859aaf43

    SHA1

    639211d4400966c91607c94247610137319533d7

    SHA256

    56c8465dceefe76fdbfef7c72508c892192ad2ec4d5c3d3c0e813a7b8df35233

    SHA512

    fc6e1a3d17afca78847d355fbddc96895650f4bcc8852cfcba723db8198ed78192cea39ba1e431748a79f1a0a5c5eee7ce86382208ef0070fb2b5686af1715bb

  • C:\Users\Admin\AppData\Local\Temp\7d809d0ed2d1dcca30a87b43474a97110dafaee2690d90faec54302e94142d5a.exe.exe

    Filesize

    684KB

    MD5

    50f289df0c19484e970849aac4e6f977

    SHA1

    3dc77c8830836ab844975eb002149b66da2e10be

    SHA256

    b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305

    SHA512

    877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38

  • C:\Windows\Logo1_.exe

    Filesize

    33KB

    MD5

    842f70bb22385dc5d566e8c8f3c5f604

    SHA1

    5313625052602d69facc1d14ecaefb20703cf644

    SHA256

    e449ee541be98bca7b0a7e0e255d0bbe82d53d39c66fa66e137399771903a743

    SHA512

    2280d09e006b7abe522f061b19097935d97b73d8e0834c0934f473dda7a9cbd76dd065cecf1bfda558df3028fbb15d71e4eb1f8f2c03044d0ae3915b38134918

  • C:\Windows\system32\drivers\etc\hosts

    Filesize

    832B

    MD5

    7e3a0edd0c6cd8316f4b6c159d5167a1

    SHA1

    753428b4736ffb2c9e3eb50f89255b212768c55a

    SHA256

    1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

    SHA512

    9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

  • F:\$RECYCLE.BIN\S-1-5-21-2872745919-2748461613-2989606286-1000\_desktop.ini

    Filesize

    10B

    MD5

    1603436fb34d76c51d66ab1816519131

    SHA1

    3d5dc4ccfe3cc992c253dccfccf66ea727f66bf6

    SHA256

    9072a674ab684ff3ef851bf4f0fdc4118d2bcbe765282f38f3f6de4360057d60

    SHA512

    30d89b59822313e4b281b8f63b959f36262b2b948cf38e6389e9a1a7517c7c239349a41de9e35c8cd27d6b852ab5349206c2fb85b631dc59fab5421d997dbd46

  • memory/1212-32-0x0000000003D50000-0x0000000003D51000-memory.dmp

    Filesize

    4KB

  • memory/1320-20-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1320-16-0x00000000001C0000-0x00000000001FE000-memory.dmp

    Filesize

    248KB

  • memory/1320-18-0x00000000001C0000-0x00000000001FE000-memory.dmp

    Filesize

    248KB

  • memory/1320-0-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1692-35-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1692-2833-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1692-4158-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB