Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe
Resource
win7-20231215-en
General
-
Target
3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe
-
Size
285KB
-
MD5
01ce56f8e90830180cbdf4fa288225de
-
SHA1
dfb522cc1e7130c4479d2fe6e74b658e7ae30481
-
SHA256
3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c
-
SHA512
15720475a988ed06a0bfbe341af3946230fbf0d74bf24d3393776d48d6a52b25b8dee6821dffc94613e21148bf04689e56b37e9af4c501e481fc8aacc44bca74
-
SSDEEP
6144:Uul0MTi0+lfh+L5qe9T5q4GAFzWTBPMmC1UC6fOaU:UMTi0uhMqe9ts2zWTpMmCG7W
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2768 Logo1_.exe 2708 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe -
Loads dropped DLL 2 IoCs
pid Process 2748 cmd.exe 2748 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe File created C:\Windows\Logo1_.exe 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe 2768 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1304 wrote to memory of 3056 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 28 PID 1304 wrote to memory of 3056 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 28 PID 1304 wrote to memory of 3056 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 28 PID 1304 wrote to memory of 3056 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 28 PID 3056 wrote to memory of 2988 3056 net.exe 30 PID 3056 wrote to memory of 2988 3056 net.exe 30 PID 3056 wrote to memory of 2988 3056 net.exe 30 PID 3056 wrote to memory of 2988 3056 net.exe 30 PID 1304 wrote to memory of 2748 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 31 PID 1304 wrote to memory of 2748 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 31 PID 1304 wrote to memory of 2748 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 31 PID 1304 wrote to memory of 2748 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 31 PID 1304 wrote to memory of 2768 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 33 PID 1304 wrote to memory of 2768 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 33 PID 1304 wrote to memory of 2768 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 33 PID 1304 wrote to memory of 2768 1304 3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe 33 PID 2768 wrote to memory of 2672 2768 Logo1_.exe 36 PID 2768 wrote to memory of 2672 2768 Logo1_.exe 36 PID 2768 wrote to memory of 2672 2768 Logo1_.exe 36 PID 2768 wrote to memory of 2672 2768 Logo1_.exe 36 PID 2672 wrote to memory of 2224 2672 net.exe 35 PID 2672 wrote to memory of 2224 2672 net.exe 35 PID 2672 wrote to memory of 2224 2672 net.exe 35 PID 2672 wrote to memory of 2224 2672 net.exe 35 PID 2748 wrote to memory of 2708 2748 cmd.exe 37 PID 2748 wrote to memory of 2708 2748 cmd.exe 37 PID 2748 wrote to memory of 2708 2748 cmd.exe 37 PID 2748 wrote to memory of 2708 2748 cmd.exe 37 PID 2768 wrote to memory of 2684 2768 Logo1_.exe 38 PID 2768 wrote to memory of 2684 2768 Logo1_.exe 38 PID 2768 wrote to memory of 2684 2768 Logo1_.exe 38 PID 2768 wrote to memory of 2684 2768 Logo1_.exe 38 PID 2684 wrote to memory of 2604 2684 net.exe 40 PID 2684 wrote to memory of 2604 2684 net.exe 40 PID 2684 wrote to memory of 2604 2684 net.exe 40 PID 2684 wrote to memory of 2604 2684 net.exe 40 PID 2768 wrote to memory of 1196 2768 Logo1_.exe 9 PID 2768 wrote to memory of 1196 2768 Logo1_.exe 9
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe"C:\Users\Admin\AppData\Local\Temp\3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2988
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a49FB.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe"C:\Users\Admin\AppData\Local\Temp\3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe"4⤵
- Executes dropped EXE
PID:2708
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2672
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2604
-
-
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"1⤵PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD520cef2186133a343a70d5d5d4feef3a3
SHA14844bc3596fa52272bb96cc418f2754b9e33fb17
SHA256a56a482a19e754be811a156bce1a2951aa5ce0765aca04261ede8179ad9e33db
SHA512023fb969db382c783bbcf9b6fa8e88603caeac25b7802da432a98a5d4a686893e97de785d918341767b389f39ebfaf5111b42fe283802402fe0fe04e1b2eac54
-
Filesize
478KB
MD585bfd80e5e2a61689d1273c6efa51ccc
SHA18ae8a160124cc56983f24a933fbecdac08da435a
SHA256892cf1575e0cc60639951f9a5a37323f3ca7d06f335e8a39635c3b858596ea3c
SHA51296dd851f4d17a65aa6dfddfdc134a46d30b0417451b4c4b31092b66056cae59302d49b706294547e5766e347dc368ff4bd176d90376c5e2ad5c7a52aa8718a79
-
Filesize
722B
MD5409c6d34d30caab71c2da9622f8007f6
SHA188f5f52a4e8e143086c6d2e1484daa2fe664eb31
SHA256d0b1e45ecf3a92fa5dde3aecf8cbec9581c0f067d931ab676d88c8ecf7b86478
SHA5121a9accf5df9de190bc2b21024edfebbee8fa3f3a522e72e4c6d97f447353725eac653f05d1a13e3c8b8deeae1732d07f8875c37d396069739ac1437a5b10e263
-
C:\Users\Admin\AppData\Local\Temp\3077da8c30ae56605fa3e098aa475d0be42ec88dadec74d95731b4052e8f272c.exe.exe
Filesize252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
33KB
MD574de944429af39f54ac31888ee07b892
SHA17c05f329379c5a396dbdf1e3857f59734eeaaf07
SHA25622a484df9625b0a17e2e7b65945360f0b031ec1bea68fb96d3553d07ab354f52
SHA512d4a8d643b207e1742071a11b05b3044c0750849f767ecbecb5e957d1df1bc95a312a0a595c7c34cc8a09523ef25deac47fddb4801735bcff6087879ef8d10fd7
-
Filesize
9B
MD562b5f4cbf35e0811170865d2c1b514b0
SHA1eb9ab8cea4d5052efe5126141140269f2fc29e7b
SHA2560c2b516efab7a741c31502cb6f7828de32cd4feb088b683d651225489f183bb3
SHA5124632536c26324e72b20e87d53546ea1d012bc1f3457ce5d8e1b33dd3eebc41ad5e4a3d3f6a3a542d7ce103f95ca5a5a1973c6c036980f1e8860c6c5d93c5696f