Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 21:19
Static task
static1
Behavioral task
behavioral1
Sample
814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe
Resource
win7-20240220-en
General
-
Target
814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe
-
Size
5.7MB
-
MD5
c34e10dee5409f323017af08a3adb3b0
-
SHA1
f69c0a1099d6e1c7df2d97022fbc374a9a234727
-
SHA256
814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9
-
SHA512
0d8edf87c7601368b9d25dda9be0b81152ec8db86b5fd9297f5b85fb32d107262a69860524316a9e316399d9e04bbc930543a57c2eb385beaced6f614eba52ea
-
SSDEEP
49152:sBBPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTP:s7KUgTH2M2m9UMpu1QfLczqssnKSk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2616 Logo1_.exe 2500 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe -
Loads dropped DLL 1 IoCs
pid Process 2540 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1042\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENFR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe File created C:\Windows\Logo1_.exe 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2704 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 28 PID 2912 wrote to memory of 2704 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 28 PID 2912 wrote to memory of 2704 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 28 PID 2912 wrote to memory of 2704 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 28 PID 2704 wrote to memory of 2888 2704 net.exe 30 PID 2704 wrote to memory of 2888 2704 net.exe 30 PID 2704 wrote to memory of 2888 2704 net.exe 30 PID 2704 wrote to memory of 2888 2704 net.exe 30 PID 2912 wrote to memory of 2540 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 31 PID 2912 wrote to memory of 2540 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 31 PID 2912 wrote to memory of 2540 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 31 PID 2912 wrote to memory of 2540 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 31 PID 2912 wrote to memory of 2616 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 33 PID 2912 wrote to memory of 2616 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 33 PID 2912 wrote to memory of 2616 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 33 PID 2912 wrote to memory of 2616 2912 814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe 33 PID 2616 wrote to memory of 2720 2616 Logo1_.exe 34 PID 2616 wrote to memory of 2720 2616 Logo1_.exe 34 PID 2616 wrote to memory of 2720 2616 Logo1_.exe 34 PID 2616 wrote to memory of 2720 2616 Logo1_.exe 34 PID 2720 wrote to memory of 2456 2720 net.exe 36 PID 2720 wrote to memory of 2456 2720 net.exe 36 PID 2720 wrote to memory of 2456 2720 net.exe 36 PID 2720 wrote to memory of 2456 2720 net.exe 36 PID 2616 wrote to memory of 2364 2616 Logo1_.exe 38 PID 2616 wrote to memory of 2364 2616 Logo1_.exe 38 PID 2616 wrote to memory of 2364 2616 Logo1_.exe 38 PID 2616 wrote to memory of 2364 2616 Logo1_.exe 38 PID 2364 wrote to memory of 2512 2364 net.exe 40 PID 2364 wrote to memory of 2512 2364 net.exe 40 PID 2364 wrote to memory of 2512 2364 net.exe 40 PID 2364 wrote to memory of 2512 2364 net.exe 40 PID 2616 wrote to memory of 1064 2616 Logo1_.exe 18 PID 2616 wrote to memory of 1064 2616 Logo1_.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe"C:\Users\Admin\AppData\Local\Temp\814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a15A3.bat3⤵
- Deletes itself
- Loads dropped DLL
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe"C:\Users\Admin\AppData\Local\Temp\814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe"4⤵
- Executes dropped EXE
PID:2500
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2456
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2512
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5ed07588854ba117151a141b0a96bda37
SHA178c58f4e85e9d9d4e39c230f1354e183f87bdd9e
SHA256fb97be2678ad28fef1f9f5a651fe12123ebea998adbb7f96b7073612990aa7d8
SHA51245487252c6da9155a3a017c5030425e80dc6fb44d88efd470179f4c9b5b7e91d0785be70d458c5c64247abf2763e514bf07989608f9307084306e65f3d76f579
-
Filesize
722B
MD5a43a292ccceed565220460c943bd6c1f
SHA137e8f2fa55214492d0d57290dc5ef9d870c6ca4f
SHA256a2973c5c35748fe74853b9567b7bdf1dab8438feb4a2c8828db94ebea62434bc
SHA5124a7bcb69eda44e5517589d38fd0f6b327d430c8483fc4bbb977eabd66a8dea305c3c86111558634f678795cc6e0ab1777e2902df5a6a91facb2360a8e3959ea5
-
C:\Users\Admin\AppData\Local\Temp\814f3b407e405fa49141fce100527e3f507c8f2151eade1811474dedb51e7fc9.exe.exe
Filesize5.7MB
MD5ba18e99b3e17adb5b029eaebc457dd89
SHA1ec0458f3c00d35b323f08d4e1cc2e72899429c38
SHA256f5ee36de8edf9be2ac2752b219cfdcb7ca1677071b8e116cb876306e9f1b6628
SHA5121f41929e6f5b555b60c411c7810cbf14e3af26100df5ac4533ec3739a278c1b925687284660efb4868e3741305098e2737836229efc9fe46c97a6057c10e677c
-
Filesize
39KB
MD5f4768631d279965f7060d71d3b9c858f
SHA12bccced94b3cc81ae22931489a3c8b57c2a6f8df
SHA256c025ab0b3651689d4a9d3e4d8a428b219c887d9ca72532962b812bf4c091beaa
SHA512bc8aabea17286c99265055794fad2831ab11d012d6835a9a2e6974722346c95a300a9610ee704c9b531b29680fdae19bdd1d0e60c889a7c2e2723779b88da891
-
Filesize
9B
MD5a4e284afce5c2e93b509543e6064da82
SHA177a7ae3e38b05410dcf335f8abe1df4d7f0b141c
SHA256f4460d1a85b2980fa2b8d329adda0fd330f8157d7afc2d7b1bad62453ff1dfe8
SHA5128f2147ca54c96b0b05bf69a7919b5bf54b20036ba8336f6ba379c2abb0d31139a91d315130040ef1d06450dd624d8a8661396eb082407b8f7455be4d61351821