Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 15:11

General

  • Target

    0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028.exe

  • Size

    264KB

  • MD5

    59c0a090709b272a3d13597e24366edf

  • SHA1

    f118be31b546bb591fb245a9e3f0b6ec05f6cbc7

  • SHA256

    0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028

  • SHA512

    8e7c583d568a9ea0d70ca96b47a75fedbad4a539e001046ff8733521d9e25cd3820b9e5a4ad19a3b69bd78f73d146a9c4442e29b81152be14f0cde43a2aba1eb

  • SSDEEP

    3072:Hx9AaY46tGNttyCa6jLRkgUA1nQZwFGVO4Mqg+WDY:3Q46tGdyr6jLRp1nQ4QLd

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3380
      • C:\Users\Admin\AppData\Local\Temp\0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028.exe
        "C:\Users\Admin\AppData\Local\Temp\0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5076
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4496
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4180
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a807A.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4272
          • C:\Users\Admin\AppData\Local\Temp\0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028.exe
            "C:\Users\Admin\AppData\Local\Temp\0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3020
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops file in Drivers directory
          • Drops startup file
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4468
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2016
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:1936
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2196
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2300

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

            Filesize

            251KB

            MD5

            ed3402e9b15a3bbd9524371c86059497

            SHA1

            1985cc1f9c4c202bc3b999b2d5f807be3468ea84

            SHA256

            13da562fee9cb7ff7ed75fcd22b9912ce9bfcac0c072be077f54c714fb987d75

            SHA512

            b6c61dba5e0b422e5442147fb6bca1a920f2db3b75f3c800baf442df6009640c233b49a16177cfb3dd29ecbb3224b652e289001ba2bddb67a5bad7e94b6c3d19

          • C:\Program Files\7-Zip\7z.exe

            Filesize

            577KB

            MD5

            4e5252171e6c7bdb2181267865d20ba5

            SHA1

            1115a4f4dcee557cdca971b5a9c801eed01e629a

            SHA256

            a2d88af1a630da600580ab6bc6d4ea18d2c44cc9254dfdf945d95534577354a2

            SHA512

            4ed54ef6cf2bc08250c16ba1c842ad3e3bfe84815dc5712dfd63aa8ba358f163147a73823e14148de59c15c224e9aee39b969a7d089e46603c739405924d537b

          • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

            Filesize

            644KB

            MD5

            068a33bb477e4ec6dbcbde7e8ddca6eb

            SHA1

            e570f512d736f0d78b2c9d9ed6e0dc9d5f82b4e4

            SHA256

            d0f6ee3e4f6d04526d7e29cf0d393844a9942a2341d7f37c7824ed220d21d7d8

            SHA512

            50d4b143a42bb7b655b8a3d923ce959521a59c69a2a6a8deab5d11f9a15ea27baad1eb4eea7d16c5516fbce1b7d3cce22159f060326266c6c6c5ffe14c902406

          • C:\Users\Admin\AppData\Local\Temp\$$a807A.bat

            Filesize

            722B

            MD5

            76423e6e93d638799460edf9ccfeef30

            SHA1

            ef016805ea53fb73c0b41b5023fe9d5b0922fa12

            SHA256

            a014785511346461aec3ef081282677b9fe16ff3b03ddd6dc09ba5f44756f81e

            SHA512

            1c43cf0fec5f2019498e45f8aff7cc777febe41614df8cb8ed2fb6181d2f6a0c39c7a657f88b82031e614b33cb58053f31098a442237ed9af00ce9b507d2ea2e

          • C:\Users\Admin\AppData\Local\Temp\0f1998fd0b1d62cb0fb1309bfd786d3cdc21a8dfdee8b229db3ae4c9a511d028.exe.exe

            Filesize

            231KB

            MD5

            6f581a41167d2d484fcba20e6fc3c39a

            SHA1

            d48de48d24101b9baaa24f674066577e38e6b75c

            SHA256

            3eb8d53778eab9fb13b4c97aeab56e4bad2a6ea3748d342f22eaf4d7aa3185a7

            SHA512

            e1177b6cea89445d58307b3327c78909adff225497f9abb8de571cdd114b547a8f515ec3ab038b583bf752a085b231f6329d6ca82fbe6be8a58cd97a1dbaf0f6

          • C:\Windows\Logo1_.exe

            Filesize

            33KB

            MD5

            f592a695c614a35428ee6c9de88f2211

            SHA1

            84f32c4c5cc64ba34a66f3fccaabe4dbe295bdcc

            SHA256

            d1592ab1059b17898a5b0fb193a1e1e1cad6edf57e5190c5ad2cf99c8830e85b

            SHA512

            c1ce2431e3812cd57f65bc8f79a5025395f76bcdc7f98bd3744ece29300bf10e008198365de9b7a326f0b9202130ea8c4df7e07cf8cc66d845d48892f1666f15

          • C:\Windows\system32\drivers\etc\hosts

            Filesize

            842B

            MD5

            6f4adf207ef402d9ef40c6aa52ffd245

            SHA1

            4b05b495619c643f02e278dede8f5b1392555a57

            SHA256

            d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e

            SHA512

            a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

          • F:\$RECYCLE.BIN\S-1-5-21-3442511616-637977696-3186306149-1000\_desktop.ini

            Filesize

            10B

            MD5

            1603436fb34d76c51d66ab1816519131

            SHA1

            3d5dc4ccfe3cc992c253dccfccf66ea727f66bf6

            SHA256

            9072a674ab684ff3ef851bf4f0fdc4118d2bcbe765282f38f3f6de4360057d60

            SHA512

            30d89b59822313e4b281b8f63b959f36262b2b948cf38e6389e9a1a7517c7c239349a41de9e35c8cd27d6b852ab5349206c2fb85b631dc59fab5421d997dbd46

          • memory/4468-20-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4468-3009-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4468-9-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4468-8768-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/5076-0-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/5076-12-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB