Analysis
-
max time kernel
151s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe
Resource
win7-20240221-en
General
-
Target
79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe
-
Size
72KB
-
MD5
55eb01d65d1be47bb0fcb009b9eace53
-
SHA1
7b8efe95ade2192156fec0f1f70c022c0a58a400
-
SHA256
79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0
-
SHA512
44a894d7e1fd50a617e858f122a33e81595c5e1261405d73c5bc482a085e00cc3007aad8b782492b3ced15e418c7d86aaeb058698ac9a33c176e1e1ccaff6d23
-
SSDEEP
1536:8oqe+Zk7VJbwlYXjPrsqrZMYR5p8wk2kKzs2Irj5hN:8je+azbRPrlr9RXFk2kKzQj5r
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2556 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2636 Logo1_.exe 2916 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe -
Loads dropped DLL 1 IoCs
pid Process 2556 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jre7\lib\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\Skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe File created C:\Windows\Logo1_.exe 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe 2636 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3020 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 28 PID 2972 wrote to memory of 3020 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 28 PID 2972 wrote to memory of 3020 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 28 PID 2972 wrote to memory of 3020 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 28 PID 3020 wrote to memory of 2736 3020 net.exe 30 PID 3020 wrote to memory of 2736 3020 net.exe 30 PID 3020 wrote to memory of 2736 3020 net.exe 30 PID 3020 wrote to memory of 2736 3020 net.exe 30 PID 2972 wrote to memory of 2556 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 31 PID 2972 wrote to memory of 2556 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 31 PID 2972 wrote to memory of 2556 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 31 PID 2972 wrote to memory of 2556 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 31 PID 2972 wrote to memory of 2636 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 33 PID 2972 wrote to memory of 2636 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 33 PID 2972 wrote to memory of 2636 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 33 PID 2972 wrote to memory of 2636 2972 79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe 33 PID 2636 wrote to memory of 2552 2636 Logo1_.exe 34 PID 2636 wrote to memory of 2552 2636 Logo1_.exe 34 PID 2636 wrote to memory of 2552 2636 Logo1_.exe 34 PID 2636 wrote to memory of 2552 2636 Logo1_.exe 34 PID 2552 wrote to memory of 2436 2552 net.exe 36 PID 2552 wrote to memory of 2436 2552 net.exe 36 PID 2552 wrote to memory of 2436 2552 net.exe 36 PID 2552 wrote to memory of 2436 2552 net.exe 36 PID 2556 wrote to memory of 2916 2556 cmd.exe 37 PID 2556 wrote to memory of 2916 2556 cmd.exe 37 PID 2556 wrote to memory of 2916 2556 cmd.exe 37 PID 2556 wrote to memory of 2916 2556 cmd.exe 37 PID 2636 wrote to memory of 2596 2636 Logo1_.exe 38 PID 2636 wrote to memory of 2596 2636 Logo1_.exe 38 PID 2636 wrote to memory of 2596 2636 Logo1_.exe 38 PID 2636 wrote to memory of 2596 2636 Logo1_.exe 38 PID 2596 wrote to memory of 2428 2596 net.exe 40 PID 2596 wrote to memory of 2428 2596 net.exe 40 PID 2596 wrote to memory of 2428 2596 net.exe 40 PID 2596 wrote to memory of 2428 2596 net.exe 40 PID 2636 wrote to memory of 1244 2636 Logo1_.exe 11 PID 2636 wrote to memory of 1244 2636 Logo1_.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe"C:\Users\Admin\AppData\Local\Temp\79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a7511.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe"C:\Users\Admin\AppData\Local\Temp\79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe"4⤵
- Executes dropped EXE
PID:2916
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2428
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD55607ab9d477658733de1dc92f1c5df0e
SHA13ecf0a7e0fbe49389bee0a28135478ec386b17c0
SHA256a03531b2769537e5363cf793bdc80f097dbe3a2766c180350a569019beeda830
SHA5121b0a7a2bce1225230943fe1957db146d5c3e82a508e33940c0a654b89701506a36bf713f7257d654158b9b4faab26a8aad35ab22ea84c8961cfb1db349d53875
-
Filesize
484KB
MD541d5bd106a62b9a38b1c76df058c795d
SHA1f4d66b06c910103c30e24010f380d2d98bd49cab
SHA256a3d71d07d47ca777c1976260894fa8f618a7dc9e5626150b578dd01f722d522f
SHA51246326985ebc5f47fe1542b04b5d78ef58b9fbf3ae7e8f08346b26dbc767eef6a46cebb5d27acc08cb7ce280e814e31032168566d2c2c75f0e0a54745ab976f22
-
Filesize
722B
MD5491fe0d62a0570d2e869d8cdde3d0d34
SHA1470692d00cde7f69cb72be8b492df9ef3e8982b1
SHA2561f7565dcf690da2c524c8bddaa66d3663e5c1f398c762cbba2e65bc46e5b7717
SHA512b86db64322e7eacddbfd608736b5ae5cd6ac43dca114572e55ed2ba97f382a31f2580f132ebfd504ccd678e0d7aaea09fc6820c80522f3602253dff30e01bcc5
-
C:\Users\Admin\AppData\Local\Temp\79b3f9630ba66b90e63ca87c9e55db1030fe5fae9c11f24b262415df8bbf4cb0.exe.exe
Filesize33KB
MD597ec61761e1fdfb2f1d4ea4d221a43d1
SHA1d6e1682a8dd967bdffe8c145731fb9ea1d0a3509
SHA2561f3069b596484ffa16181226b07c67ee1cb0f41d191ddde7c02f6bb75336cc52
SHA5127d34cc27dce09e2711d76f39c5f44525937ac15723aaedc303c154223f3ec42e6043374582614cc3067795781a2daf6ea8935f3f3b0a8747fa783cedf36090a9
-
Filesize
39KB
MD5a93f5efc0b2c641bd652a684e460e1c6
SHA13e14fa1a93963965769d42a31b494afc7aa894c0
SHA256ce50adfbb271796afc33d20c4433bee5e16446b56596c7a7cb100e8748b17310
SHA512cbcab17e89a46cf8c2136dff9b4684776a92d7a429b6772198e7f6e48047e054c41d5935302719d615a6a7219edaf1f5fd60f096d9a56caf8eb12f5bc5565265
-
Filesize
9B
MD5cfe6f484be357c72eb43c1bf358667cc
SHA1e3d7e0445522b691704b4118172728b6a29eb809
SHA256da822ce24d9fbaf4a51165971caf1c53642c637bb0140121b9041e3b23b05946
SHA51229d9ed22715e24413a7b4110e4a45e99110c8b7c0e4f6b0033d5b41f9564687e70aabb182ff809223355daccc6bebf4a90df3dfd6bbbc54649227bf38097b236