Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe
Resource
win7-20240221-en
General
-
Target
4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe
-
Size
666KB
-
MD5
8ba8471bbdfe45be94f00e6c46ceb3c0
-
SHA1
044485dcb998b184800cfeb6544e93e8b05dc97c
-
SHA256
4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c
-
SHA512
9e7c184f64cab8bac9a7fe3b124aa892aec8b935efafcb6608f15795ace26e07b80ae2e189b61ce0129dedcba02ae01e8c18caac208c14837b5182a3be744a64
-
SSDEEP
6144:A+aX3LdC9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcdEKFVg:A+aoPFlTz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2284 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2780 Logo1_.exe 2596 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe -
Loads dropped DLL 1 IoCs
pid Process 2284 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\Icons\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\wmplayer.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe File created C:\Windows\Logo1_.exe 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2168 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 28 PID 3020 wrote to memory of 2168 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 28 PID 3020 wrote to memory of 2168 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 28 PID 3020 wrote to memory of 2168 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 28 PID 2168 wrote to memory of 3044 2168 net.exe 30 PID 2168 wrote to memory of 3044 2168 net.exe 30 PID 2168 wrote to memory of 3044 2168 net.exe 30 PID 2168 wrote to memory of 3044 2168 net.exe 30 PID 3020 wrote to memory of 2284 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 31 PID 3020 wrote to memory of 2284 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 31 PID 3020 wrote to memory of 2284 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 31 PID 3020 wrote to memory of 2284 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 31 PID 3020 wrote to memory of 2780 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 33 PID 3020 wrote to memory of 2780 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 33 PID 3020 wrote to memory of 2780 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 33 PID 3020 wrote to memory of 2780 3020 4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe 33 PID 2780 wrote to memory of 2508 2780 Logo1_.exe 34 PID 2780 wrote to memory of 2508 2780 Logo1_.exe 34 PID 2780 wrote to memory of 2508 2780 Logo1_.exe 34 PID 2780 wrote to memory of 2508 2780 Logo1_.exe 34 PID 2508 wrote to memory of 2644 2508 net.exe 36 PID 2508 wrote to memory of 2644 2508 net.exe 36 PID 2508 wrote to memory of 2644 2508 net.exe 36 PID 2508 wrote to memory of 2644 2508 net.exe 36 PID 2284 wrote to memory of 2596 2284 cmd.exe 37 PID 2284 wrote to memory of 2596 2284 cmd.exe 37 PID 2284 wrote to memory of 2596 2284 cmd.exe 37 PID 2284 wrote to memory of 2596 2284 cmd.exe 37 PID 2780 wrote to memory of 2844 2780 Logo1_.exe 38 PID 2780 wrote to memory of 2844 2780 Logo1_.exe 38 PID 2780 wrote to memory of 2844 2780 Logo1_.exe 38 PID 2780 wrote to memory of 2844 2780 Logo1_.exe 38 PID 2844 wrote to memory of 2916 2844 net.exe 40 PID 2844 wrote to memory of 2916 2844 net.exe 40 PID 2844 wrote to memory of 2916 2844 net.exe 40 PID 2844 wrote to memory of 2916 2844 net.exe 40 PID 2780 wrote to memory of 1412 2780 Logo1_.exe 21 PID 2780 wrote to memory of 1412 2780 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe"C:\Users\Admin\AppData\Local\Temp\4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:3044
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a6EBA.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe"C:\Users\Admin\AppData\Local\Temp\4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe"4⤵
- Executes dropped EXE
PID:2596
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2644
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2916
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5ec71a61715110767626fe1094063291b
SHA11fd433c484e987ad74fb6dd5026e94eba029f62f
SHA256e737572195b0c4d8df6f1211e324b97191d66ba2b409cfaa2dd07fd5b96a87f4
SHA51261df3880ff6b71b5b2c522678a1ee69011a9387158e3956f6dd8db8e2c76113772fcf2b9979e27ee84d659925d3d44382d9d5da171dcdfb8a3b21c8034297d6f
-
Filesize
478KB
MD5f5cd7b35ea5f0009cdb5355dbc356066
SHA1c06af0b31cdebdc4e31d57f448acb174e5be44b7
SHA256472ce6c84e17f672782a003fa17f8d412c85a25675f83d16b1a1fb7bfc085f6d
SHA51289573e495959ad60f4a4079248f3cfb6991b8c700223538a269d7553baaacd6de837f26cfe1a4f6a6c0940b8d758406ae2d9e85f2e5738371c9025ea699a7d28
-
Filesize
722B
MD590869a95c63805bbaf307b99437d97b5
SHA1d1223ebf0d59c04414e72525044d000a53988f59
SHA25638300e1df1fb3dca163cb0754800bda11f7b886b0399f18c5ac2be2d79309087
SHA512ff64dd93eade2e9dcd2df7b69857dfa4dc85572677c0a7d1be918bf15bb6e746c8a00d863a89153747a705bbd9dc4ee9d5869ba9b7c78fa95c5762aee7ccaa03
-
C:\Users\Admin\AppData\Local\Temp\4766eed153734646b8c3ba33a06dc74f86160aa3c62fb576d366d64d1b40f79c.exe.exe
Filesize633KB
MD52e0d056ad62b6ef87a091003714fd512
SHA173150bddb5671c36413d9fbc94a668f132a2edc5
SHA256cb83f04591cc1d602e650dd5c12f4470cf21b04328477bd6a52081f37c04bd7c
SHA512b8e920f8b7547aec6f5771e3e6119b01157e5e36a92c67142b0d73ffe0d501d933581e1fc752e5bba9ce819e3897be9c146bebfc0018e91318b0c99d188a2580
-
Filesize
33KB
MD5c4ec2631f0913b349423b6d2bd687a6b
SHA19b9ae1664a063db7e1bd53073f6f1c3a62fa0e55
SHA256cdaed7acb956972ce40a95412620150fcf1428c34a8ddbd0e9f0742df0d885bb
SHA512a8ba683aa3c9d607d7ef9c3ec28a924b23be85a90e5334eb2a9f6edb8117442a818608c44f010b2bdaec052319fcc6436b5628408f4ebb82d207196df1729e86
-
Filesize
8B
MD5eb2b82f341fdb4eae25ceb49373ed303
SHA1cf7db5d16d0cdb9abd32cb4fe1e343e2296142b0
SHA2568a35cc496890b7089f69f59dd7dd7fed74622e8ff18cf9f99d49c94aa5888c5a
SHA512895d5f91dcdf77750063ec0b0112b643597bfcc87ddaa30f07864adeadf185ce062ead7699d964bd05135dcf034ca4028165ec95ab2e17b549c5faf2236f8982