Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe
Resource
win7-20231215-en
General
-
Target
f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe
-
Size
146KB
-
MD5
53a847a89559619e499dde3b88605210
-
SHA1
7fdfb93ed92eee4b984963184f03de6b2b7d8f14
-
SHA256
f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9
-
SHA512
9deceb5b24514c9ae45cd2209119bbc7cd8d09700007751b172f36f953e5f2711d87b773b476f4c46b9cb5d5d4244cd379059ece81a734fc0e142b0ee99ce3dc
-
SSDEEP
1536:cAsxN92ppTSahtA3AwT/igXrotyFD+ljb6e2s82qjUbb5d6ojOepel5:cfNIv7MwwrFob8LjUbb5d6u6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2716 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2096 Logo1_.exe 2588 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe -
Loads dropped DLL 2 IoCs
pid Process 2716 cmd.exe 2716 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe File created C:\Windows\Logo1_.exe f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe 2096 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2748 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 28 PID 2120 wrote to memory of 2748 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 28 PID 2120 wrote to memory of 2748 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 28 PID 2120 wrote to memory of 2748 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 28 PID 2748 wrote to memory of 2108 2748 net.exe 30 PID 2748 wrote to memory of 2108 2748 net.exe 30 PID 2748 wrote to memory of 2108 2748 net.exe 30 PID 2748 wrote to memory of 2108 2748 net.exe 30 PID 2120 wrote to memory of 2716 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 31 PID 2120 wrote to memory of 2716 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 31 PID 2120 wrote to memory of 2716 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 31 PID 2120 wrote to memory of 2716 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 31 PID 2120 wrote to memory of 2096 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 33 PID 2120 wrote to memory of 2096 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 33 PID 2120 wrote to memory of 2096 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 33 PID 2120 wrote to memory of 2096 2120 f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe 33 PID 2096 wrote to memory of 2392 2096 Logo1_.exe 34 PID 2096 wrote to memory of 2392 2096 Logo1_.exe 34 PID 2096 wrote to memory of 2392 2096 Logo1_.exe 34 PID 2096 wrote to memory of 2392 2096 Logo1_.exe 34 PID 2392 wrote to memory of 3012 2392 net.exe 36 PID 2392 wrote to memory of 3012 2392 net.exe 36 PID 2392 wrote to memory of 3012 2392 net.exe 36 PID 2392 wrote to memory of 3012 2392 net.exe 36 PID 2716 wrote to memory of 2588 2716 cmd.exe 37 PID 2716 wrote to memory of 2588 2716 cmd.exe 37 PID 2716 wrote to memory of 2588 2716 cmd.exe 37 PID 2716 wrote to memory of 2588 2716 cmd.exe 37 PID 2096 wrote to memory of 2628 2096 Logo1_.exe 38 PID 2096 wrote to memory of 2628 2096 Logo1_.exe 38 PID 2096 wrote to memory of 2628 2096 Logo1_.exe 38 PID 2096 wrote to memory of 2628 2096 Logo1_.exe 38 PID 2628 wrote to memory of 2584 2628 net.exe 40 PID 2628 wrote to memory of 2584 2628 net.exe 40 PID 2628 wrote to memory of 2584 2628 net.exe 40 PID 2628 wrote to memory of 2584 2628 net.exe 40 PID 2096 wrote to memory of 1276 2096 Logo1_.exe 17 PID 2096 wrote to memory of 1276 2096 Logo1_.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe"C:\Users\Admin\AppData\Local\Temp\f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a5245.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe"C:\Users\Admin\AppData\Local\Temp\f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe"4⤵
- Executes dropped EXE
PID:2588
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3012
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2584
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD520cef2186133a343a70d5d5d4feef3a3
SHA14844bc3596fa52272bb96cc418f2754b9e33fb17
SHA256a56a482a19e754be811a156bce1a2951aa5ce0765aca04261ede8179ad9e33db
SHA512023fb969db382c783bbcf9b6fa8e88603caeac25b7802da432a98a5d4a686893e97de785d918341767b389f39ebfaf5111b42fe283802402fe0fe04e1b2eac54
-
Filesize
478KB
MD585bfd80e5e2a61689d1273c6efa51ccc
SHA18ae8a160124cc56983f24a933fbecdac08da435a
SHA256892cf1575e0cc60639951f9a5a37323f3ca7d06f335e8a39635c3b858596ea3c
SHA51296dd851f4d17a65aa6dfddfdc134a46d30b0417451b4c4b31092b66056cae59302d49b706294547e5766e347dc368ff4bd176d90376c5e2ad5c7a52aa8718a79
-
Filesize
722B
MD5ca0ad52b81c5f5dccd6a5aa66cb33b6b
SHA19583965cfeea40a1dfc79434940b71ebc5c55841
SHA256c8aff2ab2f3f9976b6767c08eb754d7168e09cc659e3b64c86cf54c12c68781b
SHA5128d2f29992fa720fa2d0b2be1c8692c921cb5c6e2970739debe8416c570791c2f76c42f04a938125769fbd67967a926d30a8e8f905d5088065757be34fa6afd3d
-
C:\Users\Admin\AppData\Local\Temp\f68c9f702e5f462d6c796f4d3bc343891931dcbe020784742f4a8d18539802e9.exe.exe
Filesize113KB
MD5095dabb90bb0953800131fbcc6f6df5e
SHA19166e25e1fe27c3f92e642ec2fcc36e7c3b19216
SHA25672f1979b588357e1b0dc3e6e9f9a368d2742f18bf1daab0ee94f26d6811f8a33
SHA512041a008d96140a46aa89776fd11e64064b9cda9bd551747f59ae98ccfdff07af010061338655d4d07925f4e2a6c9fc3c79159cec2c9e055445f4b2ab1275152f
-
Filesize
33KB
MD574de944429af39f54ac31888ee07b892
SHA17c05f329379c5a396dbdf1e3857f59734eeaaf07
SHA25622a484df9625b0a17e2e7b65945360f0b031ec1bea68fb96d3553d07ab354f52
SHA512d4a8d643b207e1742071a11b05b3044c0750849f767ecbecb5e957d1df1bc95a312a0a595c7c34cc8a09523ef25deac47fddb4801735bcff6087879ef8d10fd7
-
Filesize
9B
MD562b5f4cbf35e0811170865d2c1b514b0
SHA1eb9ab8cea4d5052efe5126141140269f2fc29e7b
SHA2560c2b516efab7a741c31502cb6f7828de32cd4feb088b683d651225489f183bb3
SHA5124632536c26324e72b20e87d53546ea1d012bc1f3457ce5d8e1b33dd3eebc41ad5e4a3d3f6a3a542d7ce103f95ca5a5a1973c6c036980f1e8860c6c5d93c5696f