Analysis
-
max time kernel
153s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe
Resource
win7-20240221-en
General
-
Target
dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe
-
Size
47KB
-
MD5
a8fc318e7b1589e0a401d0451c49d10a
-
SHA1
f05e1e351c1e941b07f15da35830e65edb712b55
-
SHA256
dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506
-
SHA512
7ce4502977b06f2031bb033d7dd3497862aa13c3889166fe77dc58d632f865a9c1d2964ba439752261ef9a9f5d9a76a65de2a6fca9344f16a891a2cd8b281e2a
-
SSDEEP
768:4uu6oO5RroZJ767395uINsEKeMy/t3QTM/OFcxPSiLqYJUukGdKETL4Ibq:4uue+Zk77RNtMy/tgTM/OqxPVhXRTlq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2040 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3028 Logo1_.exe 2636 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe -
Loads dropped DLL 2 IoCs
pid Process 2040 cmd.exe 2040 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\wmplayer.exe Logo1_.exe File created C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Uninstall Information\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe File created C:\Windows\Logo1_.exe dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2360 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 28 PID 2180 wrote to memory of 2360 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 28 PID 2180 wrote to memory of 2360 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 28 PID 2180 wrote to memory of 2360 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 28 PID 2360 wrote to memory of 1428 2360 net.exe 30 PID 2360 wrote to memory of 1428 2360 net.exe 30 PID 2360 wrote to memory of 1428 2360 net.exe 30 PID 2360 wrote to memory of 1428 2360 net.exe 30 PID 2180 wrote to memory of 2040 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 31 PID 2180 wrote to memory of 2040 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 31 PID 2180 wrote to memory of 2040 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 31 PID 2180 wrote to memory of 2040 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 31 PID 2180 wrote to memory of 3028 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 33 PID 2180 wrote to memory of 3028 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 33 PID 2180 wrote to memory of 3028 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 33 PID 2180 wrote to memory of 3028 2180 dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe 33 PID 3028 wrote to memory of 3032 3028 Logo1_.exe 34 PID 3028 wrote to memory of 3032 3028 Logo1_.exe 34 PID 3028 wrote to memory of 3032 3028 Logo1_.exe 34 PID 3028 wrote to memory of 3032 3028 Logo1_.exe 34 PID 3032 wrote to memory of 2624 3032 net.exe 36 PID 3032 wrote to memory of 2624 3032 net.exe 36 PID 3032 wrote to memory of 2624 3032 net.exe 36 PID 3032 wrote to memory of 2624 3032 net.exe 36 PID 2040 wrote to memory of 2636 2040 cmd.exe 37 PID 2040 wrote to memory of 2636 2040 cmd.exe 37 PID 2040 wrote to memory of 2636 2040 cmd.exe 37 PID 2040 wrote to memory of 2636 2040 cmd.exe 37 PID 3028 wrote to memory of 2844 3028 Logo1_.exe 38 PID 3028 wrote to memory of 2844 3028 Logo1_.exe 38 PID 3028 wrote to memory of 2844 3028 Logo1_.exe 38 PID 3028 wrote to memory of 2844 3028 Logo1_.exe 38 PID 2844 wrote to memory of 2916 2844 net.exe 40 PID 2844 wrote to memory of 2916 2844 net.exe 40 PID 2844 wrote to memory of 2916 2844 net.exe 40 PID 2844 wrote to memory of 2916 2844 net.exe 40 PID 3028 wrote to memory of 1412 3028 Logo1_.exe 21 PID 3028 wrote to memory of 1412 3028 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe"C:\Users\Admin\AppData\Local\Temp\dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1428
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a7F4D.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe"C:\Users\Admin\AppData\Local\Temp\dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe"4⤵
- Executes dropped EXE
PID:2636
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2624
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2916
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477KB
MD549d515b044bbad65c9307b89dd66e79a
SHA1d0edd7c63488d72b6ba185eee80e63df89df6966
SHA256c696990b3d0f156f8e572201d9ac44dd5a79c95235c9b84c2a8ffcd098789ebe
SHA512aedd7b238961a154477d8704082691ab64a75f4c3bbb584ce55b62845b46b94dd2e39a1eb8939398f662db6cc504da9af788c054a4d054e683d02fcbad0d5d84
-
Filesize
722B
MD59328b61257ec3ba3e1863db24cb20494
SHA12cf050a7d1d926e9018b3c18aa82d6e3308a8bb0
SHA256adedd45d95c2f37693a35d8d31033d29fd7e1bd3ba1f5af898f939d0a1e9a5cd
SHA512e0ba891f5412bae402e9508f5c45119d89af67e30282d6989dcaf43f77105a6a3daa873f7258a9a95cb8841a3ab0413b338ce945578c45ab8b5ff6ea1ea3a745
-
C:\Users\Admin\AppData\Local\Temp\dcb3eea7f06f8ff16a8600809691cdda965411341b180f624264d1f8ee89f506.exe.exe
Filesize14KB
MD5dc6311fbfd49f41fbf35860a30e68355
SHA1b08b15be412e843acaf7ad5e6df0ef1e8bdb465c
SHA256ffdf81680522029c2eb578a9f442fd9692900a5c782c711e35203fb2d25620ba
SHA5125e2938f5a8396154928a7d093db3843d73497cea4f49c0f1b77e3aac6e29d1db7f0ad4518587c336f0dfccb67ff33aac8e12afa70503504c5d8d46d12a86e453
-
Filesize
33KB
MD51eb46052207e9bdf5c8cc6aa7dcccf89
SHA137ed03cd7c2ccade09093134c6a2b6099d450227
SHA256db79ee7697ddc2795271dd97e4910c9343f58758e913ba19df70e7a481555cda
SHA512f4b0fdfebbbc9fa25563f2da3d6171cde29306ff5ac5ac024c05da231b3150c11dd52021162ba8f13926f6defa611968628bd776b9f4f8660c995915b43c9eca
-
Filesize
9B
MD5a7058e06d084fd947f7dddc2897ebb22
SHA1400bcc9cc3cbab99b910b4696cc0163ba8713226
SHA256da0976fbb0588170763cb9b0d9b3ce23b0ff3e7cc146ecf1840a40e7655f1287
SHA5124921df984df8d792e9cde40d30fd19e315b2af1b034966c6fc397ef92e3cb25cfa258400758277e9ec01b5609f3041ba42c8e5911b79eff5a08843a91ad9c9c9