Analysis
-
max time kernel
260s -
max time network
288s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 01:34
Static task
static1
Behavioral task
behavioral1
Sample
512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe
Resource
win7-20230831-en
General
-
Target
512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe
-
Size
183KB
-
MD5
ad263cb24bd45f358afdae1af924b88a
-
SHA1
60c7db5c7df0e77a8f38228d6d6c1dd87ffc57ab
-
SHA256
512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750
-
SHA512
7e6b06cbe6acfc51451f953fd396d1290c472d78547a1bf61279b50400a55b9ad7812bf3b376ad44fd069662ad2d022d4434ac431615194b3715fd1fc7c1b76d
-
SSDEEP
3072:qecVOv+Kq7XRdEQ0FJ1ppM48XjyN8PtySC5bsOynXacwoge1i2qZgzoI7h+aS1GI:IKq7hd2b/b2yGPteb5KqcX1+Zgzo0naD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1076 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2724 Logo1_.exe 2412 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe -
Loads dropped DLL 1 IoCs
pid Process 1076 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1040\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Biscay\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Lime\_desktop.ini Logo1_.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\rundl132.exe 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe File created C:\Windows\Logo1_.exe 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe 2724 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2776 wrote to memory of 1076 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 27 PID 2776 wrote to memory of 1076 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 27 PID 2776 wrote to memory of 1076 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 27 PID 2776 wrote to memory of 1076 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 27 PID 2776 wrote to memory of 2724 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 28 PID 2776 wrote to memory of 2724 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 28 PID 2776 wrote to memory of 2724 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 28 PID 2776 wrote to memory of 2724 2776 512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe 28 PID 2724 wrote to memory of 3028 2724 Logo1_.exe 30 PID 2724 wrote to memory of 3028 2724 Logo1_.exe 30 PID 2724 wrote to memory of 3028 2724 Logo1_.exe 30 PID 2724 wrote to memory of 3028 2724 Logo1_.exe 30 PID 3028 wrote to memory of 1932 3028 net.exe 32 PID 3028 wrote to memory of 1932 3028 net.exe 32 PID 3028 wrote to memory of 1932 3028 net.exe 32 PID 3028 wrote to memory of 1932 3028 net.exe 32 PID 1076 wrote to memory of 2412 1076 cmd.exe 33 PID 1076 wrote to memory of 2412 1076 cmd.exe 33 PID 1076 wrote to memory of 2412 1076 cmd.exe 33 PID 1076 wrote to memory of 2412 1076 cmd.exe 33 PID 2724 wrote to memory of 1280 2724 Logo1_.exe 8 PID 2724 wrote to memory of 1280 2724 Logo1_.exe 8
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe"C:\Users\Admin\AppData\Local\Temp\512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aB6E1.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe"C:\Users\Admin\AppData\Local\Temp\512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe"4⤵
- Executes dropped EXE
PID:2412
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1932
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD517321a662164e00653992931c7086824
SHA12ba991da6ca531a4d9391a78b6771f8cd74fa1b3
SHA256cc8f605fa6bfbeb6e2e3e1f848e617ad44f85577981384517314f8f4b78a8f10
SHA512a0a9929656ac8f0f2d8f3d1b6bdb063f6f1f1f483cdba5949f7de209c5d7f04582d44488ba9bb7a43906b06914d53974ca3b2c2409890212f047a43511aca7ae
-
Filesize
722B
MD517321a662164e00653992931c7086824
SHA12ba991da6ca531a4d9391a78b6771f8cd74fa1b3
SHA256cc8f605fa6bfbeb6e2e3e1f848e617ad44f85577981384517314f8f4b78a8f10
SHA512a0a9929656ac8f0f2d8f3d1b6bdb063f6f1f1f483cdba5949f7de209c5d7f04582d44488ba9bb7a43906b06914d53974ca3b2c2409890212f047a43511aca7ae
-
C:\Users\Admin\AppData\Local\Temp\512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe
Filesize152KB
MD5f3ab2989a77729bfa6cbf11d2a57b77e
SHA1c6e99fc37c912abfd2809444cbb0ea49187f00ac
SHA2569d3b0fcde1054ac1669e601790a465f4589eff7cfe90484af155f33b439f8149
SHA51220f859965e0112179d4dc4d5faa1518d6ef6d470a0cd94cf1f361921349d30ce1f261438fc198749d847590b810fba560157d5a8759eddd86de049674ae81dab
-
C:\Users\Admin\AppData\Local\Temp\512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe.exe
Filesize152KB
MD5f3ab2989a77729bfa6cbf11d2a57b77e
SHA1c6e99fc37c912abfd2809444cbb0ea49187f00ac
SHA2569d3b0fcde1054ac1669e601790a465f4589eff7cfe90484af155f33b439f8149
SHA51220f859965e0112179d4dc4d5faa1518d6ef6d470a0cd94cf1f361921349d30ce1f261438fc198749d847590b810fba560157d5a8759eddd86de049674ae81dab
-
Filesize
31KB
MD50de7c1f6eef5c04adc7e5798c070340b
SHA1bd3bb0fd8d69544d4fb159a6ff809745445b79c3
SHA2565d2f3ff50e87673f5526096cdf528994900d37892a50ea94265ec3f0f1b04a7c
SHA5127ad05217f2563e2cc46b4b91187a9fe8614724e94be17716843f8c351a4cbef8737445e1c64fc9fb2d4df23ae6abda6d5b84d978af5da533244078fc39b3752f
-
Filesize
31KB
MD50de7c1f6eef5c04adc7e5798c070340b
SHA1bd3bb0fd8d69544d4fb159a6ff809745445b79c3
SHA2565d2f3ff50e87673f5526096cdf528994900d37892a50ea94265ec3f0f1b04a7c
SHA5127ad05217f2563e2cc46b4b91187a9fe8614724e94be17716843f8c351a4cbef8737445e1c64fc9fb2d4df23ae6abda6d5b84d978af5da533244078fc39b3752f
-
Filesize
31KB
MD50de7c1f6eef5c04adc7e5798c070340b
SHA1bd3bb0fd8d69544d4fb159a6ff809745445b79c3
SHA2565d2f3ff50e87673f5526096cdf528994900d37892a50ea94265ec3f0f1b04a7c
SHA5127ad05217f2563e2cc46b4b91187a9fe8614724e94be17716843f8c351a4cbef8737445e1c64fc9fb2d4df23ae6abda6d5b84d978af5da533244078fc39b3752f
-
Filesize
31KB
MD50de7c1f6eef5c04adc7e5798c070340b
SHA1bd3bb0fd8d69544d4fb159a6ff809745445b79c3
SHA2565d2f3ff50e87673f5526096cdf528994900d37892a50ea94265ec3f0f1b04a7c
SHA5127ad05217f2563e2cc46b4b91187a9fe8614724e94be17716843f8c351a4cbef8737445e1c64fc9fb2d4df23ae6abda6d5b84d978af5da533244078fc39b3752f
-
Filesize
10B
MD5b00c1a89b15effd3d1fb2de4fdc7bee5
SHA10c3a4f06bcd397d1d3a63ab2ca05e64cc7ae554d
SHA2560767fccea7e57d6427b0a9b440f28687f4b835409c5dcdeb337a479009222cd9
SHA512b50a3c1df331ecd7dbbd88c202c7b7b8fe6ece8df96249d88f40138952fb3c523f6f133a2d12daa2fd892643b53e4c19b39bcb16ef810f789c996e00bad03bc0
-
\Users\Admin\AppData\Local\Temp\512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750.exe
Filesize152KB
MD5f3ab2989a77729bfa6cbf11d2a57b77e
SHA1c6e99fc37c912abfd2809444cbb0ea49187f00ac
SHA2569d3b0fcde1054ac1669e601790a465f4589eff7cfe90484af155f33b439f8149
SHA51220f859965e0112179d4dc4d5faa1518d6ef6d470a0cd94cf1f361921349d30ce1f261438fc198749d847590b810fba560157d5a8759eddd86de049674ae81dab