Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 18:50
Static task
static1
Behavioral task
behavioral1
Sample
83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe
Resource
win7-20231215-en
General
-
Target
83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe
-
Size
66KB
-
MD5
bf8ec633c850b0ee8c95f32af9c2a377
-
SHA1
9de8159c4eb498a137b76cfc7e6e68666868c861
-
SHA256
83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704
-
SHA512
1a1f1b5b50b59889c0ebd23c1f45d94ba89d4b909fa452435a1e46f6ffd1ef2c360644c6fc813098e9109f309264d3de52ca38ccaebe1f50da19570b50fd89fe
-
SSDEEP
1536:hxDacx1aeg1vjrI9U/xvyyZ/MF0Vz5gpEaDoc:hMf9kU0k/W0VzBaDP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2688 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2788 Logo1_.exe 3004 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe -
Loads dropped DLL 1 IoCs
pid Process 2688 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe Logo1_.exe File created C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe Logo1_.exe File created C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DAO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2164 wrote to memory of 1632 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 28 PID 2164 wrote to memory of 1632 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 28 PID 2164 wrote to memory of 1632 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 28 PID 2164 wrote to memory of 1632 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 28 PID 1632 wrote to memory of 1736 1632 net.exe 30 PID 1632 wrote to memory of 1736 1632 net.exe 30 PID 1632 wrote to memory of 1736 1632 net.exe 30 PID 1632 wrote to memory of 1736 1632 net.exe 30 PID 2164 wrote to memory of 2688 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 31 PID 2164 wrote to memory of 2688 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 31 PID 2164 wrote to memory of 2688 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 31 PID 2164 wrote to memory of 2688 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 31 PID 2164 wrote to memory of 2788 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 33 PID 2164 wrote to memory of 2788 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 33 PID 2164 wrote to memory of 2788 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 33 PID 2164 wrote to memory of 2788 2164 83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe 33 PID 2788 wrote to memory of 2708 2788 Logo1_.exe 34 PID 2788 wrote to memory of 2708 2788 Logo1_.exe 34 PID 2788 wrote to memory of 2708 2788 Logo1_.exe 34 PID 2788 wrote to memory of 2708 2788 Logo1_.exe 34 PID 2708 wrote to memory of 2568 2708 net.exe 36 PID 2708 wrote to memory of 2568 2708 net.exe 36 PID 2708 wrote to memory of 2568 2708 net.exe 36 PID 2708 wrote to memory of 2568 2708 net.exe 36 PID 2688 wrote to memory of 3004 2688 cmd.exe 37 PID 2688 wrote to memory of 3004 2688 cmd.exe 37 PID 2688 wrote to memory of 3004 2688 cmd.exe 37 PID 2688 wrote to memory of 3004 2688 cmd.exe 37 PID 2788 wrote to memory of 2588 2788 Logo1_.exe 38 PID 2788 wrote to memory of 2588 2788 Logo1_.exe 38 PID 2788 wrote to memory of 2588 2788 Logo1_.exe 38 PID 2788 wrote to memory of 2588 2788 Logo1_.exe 38 PID 2588 wrote to memory of 2756 2588 net.exe 40 PID 2588 wrote to memory of 2756 2588 net.exe 40 PID 2588 wrote to memory of 2756 2588 net.exe 40 PID 2588 wrote to memory of 2756 2588 net.exe 40 PID 2788 wrote to memory of 1184 2788 Logo1_.exe 21 PID 2788 wrote to memory of 1184 2788 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe"C:\Users\Admin\AppData\Local\Temp\83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a52B2.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe"C:\Users\Admin\AppData\Local\Temp\83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe"4⤵
- Executes dropped EXE
PID:3004
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2568
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2756
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5d3adc69a0af918de8ca779119dc3824e
SHA11acd37dbe349ee094f20adedeead47187d449876
SHA256331366057a460595eea4cd12de73bd9e2fcc6127487fc6a070b1d1c056700f9f
SHA512346c88bf50e019ff7ebe812584dedba2b1dd13ac02e58f75c0e6c3834daf9c87000bf4f1bba0d2075edfaa24413cc11decf9dcddb05dcc7d9c72294186f1e733
-
Filesize
478KB
MD544f2a0b82d8247e1cd5a12a40841f9a8
SHA1f451bd8ba9098bb674624169aa40f0371ba67924
SHA256056311169bf6ff9bf378a311dbd3c48697ccce39bedac8cb9ddb7da01384127d
SHA512bd5f7bf6b83c70bd03416a4944f62fdafbcb7907c3321432c831e189e9d4f95a52faefa575de57209fa5c1523ebed5fde8831f6230fc6f23400bbd33e772c219
-
Filesize
722B
MD529c197c54390e157a98bba932d794407
SHA12284a8d1d7e020fda044916272c6d01f3f130024
SHA2565844467184de506389e19ac7503c37925bfc1f513366e309d7ac984d62a61bc1
SHA512881cfdad60532747972d89166cbe1756506bb039ac43482c7f336c851d82ef85a3a088a412982c0bc247b3f8c5e00e833262fe25d22abe9f6fe9e547fad4db06
-
C:\Users\Admin\AppData\Local\Temp\83889fe248efc28953e990c521f1318902a936556e2b8952b4c6e7e9dc08b704.exe.exe
Filesize33KB
MD5cfcf15f5729649399cfb9b2590c9e80a
SHA1f595a3f2812a29492326e5a0478f3924bcbae545
SHA256b6fde5431374f5cc8a2b6b6953d7c466ce8828faf68c43661a2c0cf87481868f
SHA512bbd925abf352af8962ab5e7d4b76bc4146e806cb0f8fde8a7cc2c13318450b46dd5529f6855065241de56efd72e33f4f9961ef5aa4ba8fd3c1ca312444ac8e19
-
Filesize
33KB
MD5e8ee4723f696b9e3ecde75768c7018be
SHA168bcc682ab485eeead9552174bd6d69bf82f96e7
SHA256905167896d2eecbb77f54d30f6f4e76fc75a804a7d6748f813724afebe930e44
SHA5126329f42ff79d9fe1a32cf8a7d6bd3e1acdca94e1e0041afc8e9da3a78931f35343def9c9f333091d3cc6db7dd6bbe2e3626a8a74a37535bb048af4b6b56a5e7e
-
Filesize
8B
MD5209b72362215bdaaf45b2d2388ee962c
SHA1872a46c03b4ff1322f5dd750c7ac0a07e5113ca0
SHA25656dc9a9a2aef97a2582545195a5ae52880339dff396cf5a749551379418aed62
SHA51245e9bfd535948c288f7342c28cc31fa63331dddc3b2f38afeb6cc1547f1301c46c97f9925905ee4d0ca46bb2d5f40181b913cfeaf9763ae6a38debdd24db7cc9