Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2024, 15:11

General

  • Target

    0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028.exe

  • Size

    264KB

  • MD5

    59c0a090709b272a3d13597e24366edf

  • SHA1

    f118be31b546bb591fb245a9e3f0b6ec05f6cbc7

  • SHA256

    0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028

  • SHA512

    8e7c583d568a9ea0d70ca96b47a75fedbad4a539e001046ff8733521d9e25cd3820b9e5a4ad19a3b69bd78f73d146a9c4442e29b81152be14f0cde43a2aba1eb

  • SSDEEP

    3072:Hx9AaY46tGNttyCa6jLRkgUA1nQZwFGVO4Mqg+WDY:3Q46tGdyr6jLRp1nQ4QLd

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028.exe
        "C:\Users\Admin\AppData\Local\Temp\0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3052
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1460
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aD49D.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2804
          • C:\Users\Admin\AppData\Local\Temp\0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028.exe
            "C:\Users\Admin\AppData\Local\Temp\0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3056
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops file in Drivers directory
          • Drops startup file
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2180
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2760
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2768
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2636
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2968

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

            Filesize

            258KB

            MD5

            953b14909436255cf8b577cdb4d8847c

            SHA1

            fd7490804997808f2f66966c9cdc47178306e824

            SHA256

            b0bb88aa0ed41f4eeeb6dcc089a6bbfc5a86cfd06a14baf6f5faf7f1423a00f0

            SHA512

            cf42958cf6570d17ecf0f7268860174bad40048c84b366b2b708778046bf5d11822e399258c47b41336533d5582aa549301b742c59647fa33a341a038f3bad57

          • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

            Filesize

            478KB

            MD5

            351e71807210e37c4767fb10f08e8e94

            SHA1

            4209f9b8e9570e5fd6c50d742c7833fffa83c70b

            SHA256

            3ba4929aaf7cd407db10183d2ef6330cb842144a18613ec33003427de41e5383

            SHA512

            97fee72f9bb10d482a4ca1098053527b6b7707c8be869a18bb5ad35abd037663f7b834724ef3e61cd950843cba085a5b9a34cee3662d1cbf49df4d0dac91a1b4

          • C:\Users\Admin\AppData\Local\Temp\$$aD49D.bat

            Filesize

            722B

            MD5

            98dbb92d76335afb25953fbaaa30aca0

            SHA1

            a7d89f0db9e8524278b524b2cd55279ab3fcf65b

            SHA256

            9edda7e40b7807a17d1aae6fa8f695488de96b86e56956ae7973ca4b4f97301d

            SHA512

            8cf77dc85c654e4be76cba722079cc334bfc231820bd2f63394f03cc3b72a6830c2500bb6f94b590248452d08dce5aedab12739d3b328f18a6ed07cdd908d63b

          • C:\Users\Admin\AppData\Local\Temp\0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028.exe.exe

            Filesize

            231KB

            MD5

            6f581a41167d2d484fcba20e6fc3c39a

            SHA1

            d48de48d24101b9baaa24f674066577e38e6b75c

            SHA256

            3eb8d53778eab9fb13b4c97aeab56e4bad2a6ea3748d342f22eaf4d7aa3185a7

            SHA512

            e1177b6cea89445d58307b3327c78909adff225497f9abb8de571cdd114b547a8f515ec3ab038b583bf752a085b231f6329d6ca82fbe6be8a58cd97a1dbaf0f6

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            f592a695c614a35428ee6c9de88f2211

            SHA1

            84f32c4c5cc64ba34a66f3fccaabe4dbe295bdcc

            SHA256

            d1592ab1059b17898a5b0fb193a1e1e1cad6edf57e5190c5ad2cf99c8830e85b

            SHA512

            c1ce2431e3812cd57f65bc8f79a5025395f76bcdc7f98bd3744ece29300bf10e008198365de9b7a326f0b9202130ea8c4df7e07cf8cc66d845d48892f1666f15

          • C:\Windows\system32\drivers\etc\hosts

            Filesize

            832B

            MD5

            7e3a0edd0c6cd8316f4b6c159d5167a1

            SHA1

            753428b4736ffb2c9e3eb50f89255b212768c55a

            SHA256

            1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

            SHA512

            9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

          • F:\$RECYCLE.BIN\S-1-5-21-3290804112-2823094203-3137964600-1000\_desktop.ini

            Filesize

            10B

            MD5

            1603436fb34d76c51d66ab1816519131

            SHA1

            3d5dc4ccfe3cc992c253dccfccf66ea727f66bf6

            SHA256

            9072a674ab684ff3ef851bf4f0fdc4118d2bcbe765282f38f3f6de4360057d60

            SHA512

            30d89b59822313e4b281b8f63b959f36262b2b948cf38e6389e9a1a7517c7c239349a41de9e35c8cd27d6b852ab5349206c2fb85b631dc59fab5421d997dbd46

          • memory/1248-31-0x0000000002DC0000-0x0000000002DC1000-memory.dmp

            Filesize

            4KB

          • memory/2180-35-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2180-21-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2180-2879-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2180-4159-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3052-20-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3052-18-0x0000000001CA0000-0x0000000001CDE000-memory.dmp

            Filesize

            248KB

          • memory/3052-17-0x0000000001CA0000-0x0000000001CDE000-memory.dmp

            Filesize

            248KB

          • memory/3052-0-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB