Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe
Resource
win10v2004-20240412-en
General
-
Target
6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe
-
Size
1.1MB
-
MD5
017de9183d3b48cadd3a0fe82bf0dc6a
-
SHA1
b64e2d081360e58ba113cf8c535c927cdf82a4c5
-
SHA256
6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa
-
SHA512
1001c655665e592571c332dc3b19e53d12e8130afc403d21fc26e0651d701f554ee95129fc18710a420037322ddc040e77e826939b9ec3b8b94f16cb3a570079
-
SSDEEP
1536:j+fejdMv0stxLSikn5ivVfLx1F2vH1cigK0dl222222222UgiaucigK0dl22222B:jGej0ntxLS8vlLxWmiglZaTiglZaTp
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe -
Deletes itself 1 IoCs
pid Process 2956 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2988 Logo1_.exe 2548 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe -
Loads dropped DLL 2 IoCs
pid Process 2956 cmd.exe 2956 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TempCom = "C:\\WINDOWS\\FONTS\\9A3A9.com" 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PrivateAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\InfoPath.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\rundl132.exe 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe File created C:\Windows\Logo1_.exe 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\WINDOWS\FONTS\9A3A9.com 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe File opened for modification C:\WINDOWS\FONTS\9A3A9.com 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2548 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2956 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 28 PID 1980 wrote to memory of 2956 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 28 PID 1980 wrote to memory of 2956 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 28 PID 1980 wrote to memory of 2956 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 28 PID 1980 wrote to memory of 2988 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 30 PID 1980 wrote to memory of 2988 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 30 PID 1980 wrote to memory of 2988 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 30 PID 1980 wrote to memory of 2988 1980 6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe 30 PID 2988 wrote to memory of 2632 2988 Logo1_.exe 31 PID 2988 wrote to memory of 2632 2988 Logo1_.exe 31 PID 2988 wrote to memory of 2632 2988 Logo1_.exe 31 PID 2988 wrote to memory of 2632 2988 Logo1_.exe 31 PID 2632 wrote to memory of 2572 2632 net.exe 33 PID 2632 wrote to memory of 2572 2632 net.exe 33 PID 2632 wrote to memory of 2572 2632 net.exe 33 PID 2632 wrote to memory of 2572 2632 net.exe 33 PID 2956 wrote to memory of 2548 2956 cmd.exe 34 PID 2956 wrote to memory of 2548 2956 cmd.exe 34 PID 2956 wrote to memory of 2548 2956 cmd.exe 34 PID 2956 wrote to memory of 2548 2956 cmd.exe 34 PID 2988 wrote to memory of 1208 2988 Logo1_.exe 21 PID 2988 wrote to memory of 1208 2988 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe"C:\Users\Admin\AppData\Local\Temp\6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a3F51.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe"C:\Users\Admin\AppData\Local\Temp\6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe"4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2572
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD52d09076afe7635955b8f2170199420f9
SHA128065845fcbb1ba19d167a3870a372e243225923
SHA2562835917ef4973f48cf14d59b4692d875eecd838980f47ca0f13236dea4f711b5
SHA5127f196de72c7f8ed049ebf64f8501d8a2d3e5a4d0f1b5b2b3ccb6420b406c7a42e931f5dd4fb7f74fa9ef5c0b9004c62ca079d61c8a67f61a8d61dd30e8f29552
-
C:\Users\Admin\AppData\Local\Temp\6112e6f882c52e02766b9cbc62fe0c30f9db5261b6c1083d68b39f86bf20e6fa.exe.exe
Filesize1.1MB
MD546d2b1d328321c194da464004b097ad2
SHA1cae29c03b33eb60aa806df51419e6d757135b436
SHA256a12e2f46dbafea8dcc3cdd8340635374a3d2bf710e172d16a9a1bc7f0f154809
SHA5121a35c9719d3e9738878026eef1a20467c83f7efd740c4b3d25f9f9b8386b0ab56244921edf1f65eaeeb538cfbf592a8106813d7f262ce85fec0de3b9e24dc42d
-
Filesize
42KB
MD5d42da36a94a22a4878e91a25341b16c2
SHA183af016b774674b1db5a4b60b46fe4d2914606bb
SHA256736b504b4e171f75c5690b224b2136ed502949657ad5723035931c4275265c5f
SHA5126ce1e27f72df62826d3e5c6e48f63dc0923937eb287685463a44738914ece0754703bab8cf8d12f1d9ce4260600db65a266ccbf9ba044ffde3c40599463014a8
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0