Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe
Resource
win7-20240221-en
General
-
Target
4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe
-
Size
258KB
-
MD5
7799716e53f09fac3d4cba556618a732
-
SHA1
deb1760e81a12ed8c9fa3a92370ca820c6c0d61c
-
SHA256
4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa
-
SHA512
5a5dbbb98e27bae9a248330ab5e183ae65074dbf2867c407102240cb3310b2ffd9feebbd9bfe1984faa3ab8679de45edc4cb2117550acab118f4bfc71c87379a
-
SSDEEP
6144:c1m0tgiC4bXqsTk90qC1AOb7eswf1Px++fD8PJ:c1m0qitXqsTkiR7twRx+gD8PJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2644 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2576 Logo1_.exe 2592 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe -
Loads dropped DLL 1 IoCs
pid Process 2644 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe File created C:\Windows\Logo1_.exe 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1492 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 28 PID 2224 wrote to memory of 1492 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 28 PID 2224 wrote to memory of 1492 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 28 PID 2224 wrote to memory of 1492 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 28 PID 1492 wrote to memory of 2516 1492 net.exe 30 PID 1492 wrote to memory of 2516 1492 net.exe 30 PID 1492 wrote to memory of 2516 1492 net.exe 30 PID 1492 wrote to memory of 2516 1492 net.exe 30 PID 2224 wrote to memory of 2644 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 31 PID 2224 wrote to memory of 2644 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 31 PID 2224 wrote to memory of 2644 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 31 PID 2224 wrote to memory of 2644 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 31 PID 2224 wrote to memory of 2576 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 33 PID 2224 wrote to memory of 2576 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 33 PID 2224 wrote to memory of 2576 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 33 PID 2224 wrote to memory of 2576 2224 4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe 33 PID 2576 wrote to memory of 2668 2576 Logo1_.exe 34 PID 2576 wrote to memory of 2668 2576 Logo1_.exe 34 PID 2576 wrote to memory of 2668 2576 Logo1_.exe 34 PID 2576 wrote to memory of 2668 2576 Logo1_.exe 34 PID 2668 wrote to memory of 2664 2668 net.exe 36 PID 2668 wrote to memory of 2664 2668 net.exe 36 PID 2668 wrote to memory of 2664 2668 net.exe 36 PID 2668 wrote to memory of 2664 2668 net.exe 36 PID 2644 wrote to memory of 2592 2644 cmd.exe 37 PID 2644 wrote to memory of 2592 2644 cmd.exe 37 PID 2644 wrote to memory of 2592 2644 cmd.exe 37 PID 2644 wrote to memory of 2592 2644 cmd.exe 37 PID 2644 wrote to memory of 2592 2644 cmd.exe 37 PID 2644 wrote to memory of 2592 2644 cmd.exe 37 PID 2644 wrote to memory of 2592 2644 cmd.exe 37 PID 2576 wrote to memory of 2560 2576 Logo1_.exe 38 PID 2576 wrote to memory of 2560 2576 Logo1_.exe 38 PID 2576 wrote to memory of 2560 2576 Logo1_.exe 38 PID 2576 wrote to memory of 2560 2576 Logo1_.exe 38 PID 2560 wrote to memory of 2420 2560 net.exe 40 PID 2560 wrote to memory of 2420 2560 net.exe 40 PID 2560 wrote to memory of 2420 2560 net.exe 40 PID 2560 wrote to memory of 2420 2560 net.exe 40 PID 2576 wrote to memory of 1204 2576 Logo1_.exe 21 PID 2576 wrote to memory of 1204 2576 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe"C:\Users\Admin\AppData\Local\Temp\4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a531F.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe"C:\Users\Admin\AppData\Local\Temp\4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe"4⤵
- Executes dropped EXE
PID:2592
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2664
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2420
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD528959031896021bc7ca9f579de2cc456
SHA13577f294e56af20384c17c2e6b30043d3fb467ce
SHA256f033bbb306ff9feebc9f881d7bf293d303af233130e795d86a20b16aad085eec
SHA5128ccc791701cbf875cff76feb50e78391fdc4375e0bd78c59111a657059e2f4c8c91b8603755bd5cfc1feb1abcc98b3eda6e3f810de8e8d60eb35090eecb21020
-
Filesize
722B
MD56e4d0da4427b68ab51f520a6a25010b1
SHA1a1e4f38d959b8716767e0daa0fc5d3391b3059f6
SHA2566d1740cc38c0c2ba4ab13a1e39709ed4da8de1d15941292db33b2fa827282061
SHA5127ccb297ac41281b01fec975b789e0fe7ee3d5f3aed53495f51efbea07c8dd593ad8eaddc7367253f5cef5a85c4498d8068af6a91b96270b4438525517b1937df
-
C:\Users\Admin\AppData\Local\Temp\4b5091e52699708fc45ad65ef75c52f09e28be1c060bb538f718bf220e7067aa.exe.exe
Filesize224KB
MD5d4b257c01bbaa68d15d8368475a4e227
SHA1fafae083a882e163cfa8c77258baaab891c17df2
SHA256dd6dd981c7f1a6673dc8cc3a0fe1fc8a54e059a9fdb0545b0dc9258299c0c546
SHA512167494ecb32196e8e199d7d14a1c0498eee45ab8e8862e5441539fa569313bb602b9e979935c7cc5ba39300e54e8bdbdf2f502e4ea24b5e8339fd2c3685ca502
-
Filesize
33KB
MD5d653755b31e8bfbb783ff1fcdeece501
SHA13854cb9ae22e332969f1f0393e5b78e2cfa8fce5
SHA2561890193c8dfd409ebf0ba68a044b015ce0e8d2b369c7ca83a7062dd3904ac03d
SHA512f1eb2080db955ae144b68e7afc3880ce7b88f45b686ca73eb022a6c7e6883fb1e47c027adb91bcaa7319cf427aa3ae3a68d891a64c8fd556bddf2a1ebba3d80b
-
Filesize
9B
MD5108fdf573744a59e277323996400c0f6
SHA1ef2455daeb8ca0208cae55e098524ee5a28db101
SHA256cf34ef479883d417c78d4e5b3a1f7ed5d238644a5f27c7bf316cc8c3d00f2d15
SHA51239da2234e2fcfe7cc622c810829f204f83b7f82cfc23c95edd38d82383e90e5005958689bcd0ec55dc51bb3e056293a2975fdf917bbbdedbcceedb9975648715