Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe
Resource
win7-20240221-en
General
-
Target
6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe
-
Size
583KB
-
MD5
612c71f176cbb3a987994ef9d580f372
-
SHA1
ab77fb255f0b3da4d50e3cdbf649c87188373a62
-
SHA256
6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2
-
SHA512
57a5d59e2b2892b17d769053ffc44957b7a119c43bab4528f9ea744b7df146dd0db25c82420e97515811c8a3e0dd8b6caf90b100a3a3dc2fb0fb0fe42cadbd9e
-
SSDEEP
12288:td+azbvt7a3iwbihym2g7XO3LWUQfh4Co:nBzbA+gkE2fh4Co
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2536 Logo1_.exe 2436 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe -
Loads dropped DLL 1 IoCs
pid Process 2564 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe File created C:\Windows\Logo1_.exe 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2832 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 28 PID 2656 wrote to memory of 2832 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 28 PID 2656 wrote to memory of 2832 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 28 PID 2656 wrote to memory of 2832 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 28 PID 2832 wrote to memory of 2932 2832 net.exe 30 PID 2832 wrote to memory of 2932 2832 net.exe 30 PID 2832 wrote to memory of 2932 2832 net.exe 30 PID 2832 wrote to memory of 2932 2832 net.exe 30 PID 2656 wrote to memory of 2564 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 31 PID 2656 wrote to memory of 2564 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 31 PID 2656 wrote to memory of 2564 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 31 PID 2656 wrote to memory of 2564 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 31 PID 2656 wrote to memory of 2536 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 33 PID 2656 wrote to memory of 2536 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 33 PID 2656 wrote to memory of 2536 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 33 PID 2656 wrote to memory of 2536 2656 6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe 33 PID 2536 wrote to memory of 2940 2536 Logo1_.exe 34 PID 2536 wrote to memory of 2940 2536 Logo1_.exe 34 PID 2536 wrote to memory of 2940 2536 Logo1_.exe 34 PID 2536 wrote to memory of 2940 2536 Logo1_.exe 34 PID 2940 wrote to memory of 2740 2940 net.exe 36 PID 2940 wrote to memory of 2740 2940 net.exe 36 PID 2940 wrote to memory of 2740 2940 net.exe 36 PID 2940 wrote to memory of 2740 2940 net.exe 36 PID 2564 wrote to memory of 2436 2564 cmd.exe 37 PID 2564 wrote to memory of 2436 2564 cmd.exe 37 PID 2564 wrote to memory of 2436 2564 cmd.exe 37 PID 2564 wrote to memory of 2436 2564 cmd.exe 37 PID 2536 wrote to memory of 2584 2536 Logo1_.exe 38 PID 2536 wrote to memory of 2584 2536 Logo1_.exe 38 PID 2536 wrote to memory of 2584 2536 Logo1_.exe 38 PID 2536 wrote to memory of 2584 2536 Logo1_.exe 38 PID 2584 wrote to memory of 936 2584 net.exe 40 PID 2584 wrote to memory of 936 2584 net.exe 40 PID 2584 wrote to memory of 936 2584 net.exe 40 PID 2584 wrote to memory of 936 2584 net.exe 40 PID 2536 wrote to memory of 1368 2536 Logo1_.exe 21 PID 2536 wrote to memory of 1368 2536 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe"C:\Users\Admin\AppData\Local\Temp\6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a8141.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe"C:\Users\Admin\AppData\Local\Temp\6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe"4⤵
- Executes dropped EXE
PID:2436
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2740
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:936
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5ab6e14fd3b3b82a74d70dd03d0a8e116
SHA1e8263c09ed7968ab04e1459ad46041ccdd9ff5e9
SHA25603dda7016a22dd98411b67875e2fe461c960b068fbcb019579d8392530b41571
SHA512851e9288ba102d5eabd34d887b70a883307bce31ccb4c7eeaf2b3010cb6bb9435a9c0261bfdafb4a0bf4046b6bc7928cbfb62599269a9c197ec2f83efaf258e8
-
Filesize
722B
MD53d5d33cea25372d9edfcd985a43b7ca2
SHA1ac29837a749ffec97770f13246941415f92d59d9
SHA256b8bb2fbb391a84e890044ce607024d8adcae66caf689e7bc89ab0698c26f37a1
SHA512c20acf937602dccc8dc85e3d4fb9e1f757e20bf2c8f2c421027c22ef6e6c86c54a52169cd77ffba290b56c3462a29294cb291bfd7bbe0559579698102b413c4f
-
C:\Users\Admin\AppData\Local\Temp\6ad09d061abc19754e50e37200a4c935dda0d4a33b03f4ff9c16bf58bf8f1be2.exe.exe
Filesize544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
39KB
MD5bc43e3c481e7fbe3ee697f9017cf4c1b
SHA16a76534a3a4bd72437b06bdccf1475846d7a308d
SHA256c33f277a3cea2a938fc05fda7bf9b9a0ae89474eaacf6b0b6223e07eb4ec3b6a
SHA512e5c2f3485b7573a6638f6d5ea2907371efc68b35655739e8e0c8f841de9c2d302b246eacb9627912cee5dd7ab0a9f7f652e73eb7d1925ddde20bb92e29310ce1
-
Filesize
9B
MD58c34dc99037d2222f90612d7a5e52499
SHA1fda1121fbbb4ed65e2bbf0b7d7c9847d6f47fe7c
SHA2565b74167b62086b62f2f1540c9601d4c70c005e86ff72d5d514f87c82df3cb468
SHA512999a3f71583131a044764079e1d6c447190f81bdb3b32d3f423f97ea6f5a4cf431ddf0b5ad61a2f72e9aa280a859555c131c9b89a4713cdaf955a7f90b6258cf