Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 12:08
Static task
static1
Behavioral task
behavioral1
Sample
159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe
Resource
win7-20240221-en
General
-
Target
159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe
-
Size
723KB
-
MD5
7e87022bc9bb33f187d8ee2d24d5e990
-
SHA1
fbf5f08d9e8025c745599695940c3d425e1618ae
-
SHA256
159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930
-
SHA512
a4df708238220634e0085d0f43554ee44d1d2a4c2cc8bbbf424e964ac0505e2fc41bbcd6628fd629fac5ce450abfac97cb61b6a9dc0c346edd7f08abe1268c9c
-
SSDEEP
12288:P+affC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:PB3LOS2opPIXV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1664 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1636 Logo1_.exe 2628 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1416 Explorer.EXE -
Loads dropped DLL 2 IoCs
pid Process 1664 cmd.exe 1664 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\images\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\wmplayer.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe File created C:\Windows\Logo1_.exe 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe 1636 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2376 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 28 PID 1740 wrote to memory of 2376 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 28 PID 1740 wrote to memory of 2376 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 28 PID 1740 wrote to memory of 2376 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 28 PID 2376 wrote to memory of 2364 2376 net.exe 30 PID 2376 wrote to memory of 2364 2376 net.exe 30 PID 2376 wrote to memory of 2364 2376 net.exe 30 PID 2376 wrote to memory of 2364 2376 net.exe 30 PID 1740 wrote to memory of 1664 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 31 PID 1740 wrote to memory of 1664 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 31 PID 1740 wrote to memory of 1664 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 31 PID 1740 wrote to memory of 1664 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 31 PID 1740 wrote to memory of 1636 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 33 PID 1740 wrote to memory of 1636 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 33 PID 1740 wrote to memory of 1636 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 33 PID 1740 wrote to memory of 1636 1740 159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe 33 PID 1636 wrote to memory of 2256 1636 Logo1_.exe 34 PID 1636 wrote to memory of 2256 1636 Logo1_.exe 34 PID 1636 wrote to memory of 2256 1636 Logo1_.exe 34 PID 1636 wrote to memory of 2256 1636 Logo1_.exe 34 PID 2256 wrote to memory of 2616 2256 net.exe 36 PID 2256 wrote to memory of 2616 2256 net.exe 36 PID 2256 wrote to memory of 2616 2256 net.exe 36 PID 2256 wrote to memory of 2616 2256 net.exe 36 PID 1664 wrote to memory of 2628 1664 cmd.exe 37 PID 1664 wrote to memory of 2628 1664 cmd.exe 37 PID 1664 wrote to memory of 2628 1664 cmd.exe 37 PID 1664 wrote to memory of 2628 1664 cmd.exe 37 PID 1636 wrote to memory of 2716 1636 Logo1_.exe 38 PID 1636 wrote to memory of 2716 1636 Logo1_.exe 38 PID 1636 wrote to memory of 2716 1636 Logo1_.exe 38 PID 1636 wrote to memory of 2716 1636 Logo1_.exe 38 PID 2716 wrote to memory of 2724 2716 net.exe 40 PID 2716 wrote to memory of 2724 2716 net.exe 40 PID 2716 wrote to memory of 2724 2716 net.exe 40 PID 2716 wrote to memory of 2724 2716 net.exe 40 PID 1636 wrote to memory of 1416 1636 Logo1_.exe 21 PID 1636 wrote to memory of 1416 1636 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe"C:\Users\Admin\AppData\Local\Temp\159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4940.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe"C:\Users\Admin\AppData\Local\Temp\159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe"4⤵
- Executes dropped EXE
PID:2628
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2724
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5398a7064313570d5e852fb87febbf03f
SHA1117d0ca007b73a8c7115f8880f54540e37ff7490
SHA25630429016be8ea9e22585980572b4b2af1ddabb9cba93e9222a231f4d95353751
SHA512e96c03db73e0b3d86b6a51fcc20f4b131116b1c2a649030b8f13d60d207944bd4ec1fe734c32e3f390d454dad3f6ad780ff52209c56852cc4456559102f01c80
-
Filesize
484KB
MD5ed07588854ba117151a141b0a96bda37
SHA178c58f4e85e9d9d4e39c230f1354e183f87bdd9e
SHA256fb97be2678ad28fef1f9f5a651fe12123ebea998adbb7f96b7073612990aa7d8
SHA51245487252c6da9155a3a017c5030425e80dc6fb44d88efd470179f4c9b5b7e91d0785be70d458c5c64247abf2763e514bf07989608f9307084306e65f3d76f579
-
Filesize
722B
MD5f37161003b076250fd99588490be9810
SHA179bbeccdb4fd0f855f6d1c124abd4149ae6a014c
SHA2564e0d56752373ff0cb05761f3635b4fd20a8269c2e0853ce30b5d91f638d55baf
SHA5120ff6c651c8509e9d2adcccc539dbabefb735108307b2e072023cbae4a4a0e631582cbc1aef5e01d26dec0e74262e5475d6f35eeabc4644c8c83622fe5b800a6d
-
C:\Users\Admin\AppData\Local\Temp\159fe19f3491d9bc1336127e1bd12bf0a3689868bb011a2298d062a2c6d92930.exe.exe
Filesize684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
39KB
MD50209d825c40705a1752ceecc4fe453c6
SHA1875b45703ab4a4f9b7b13c16277b235d43f075ef
SHA2560fbeb3b115479ea9f34e86e511238d235b942922660740d37e9f249b4e3fdf1e
SHA512b88b1ba93382a3a6fe4253a0c8fe69baa02a0c0dd74b2e6c79d7688f5c16be144676bb7bd3e061be96603148738845fddd05bbd4782d3abcb0bf495c1c96aa40
-
Filesize
9B
MD502ced53ce3f5b175c3bbec378047e7a7
SHA1dafdf07efa697ec99b3d7b9f7512439a52ea618d
SHA256485bb2341321a2837fd015a36963ea549c7c6f40985e165fd56c8a1e89b3f331
SHA512669dde3ea8628704d40681a7f8974cf52985385c92a61a540c97c18c13eb4d451207ae171b2a56cd061cadbc90e672a84eb55111b1f5016846918d73fb075c99