Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe
Resource
win7-20240221-en
General
-
Target
6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe
-
Size
577KB
-
MD5
08c40dde032cfcc3eb7e939668d2dc81
-
SHA1
e24fcb6d53c54a747d4b06eb01f5a93ea1667e5a
-
SHA256
6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f
-
SHA512
90b7d5269180146c90b2328a61e65ec140bfdd0935294f662e86f0ba66cbce45718beb2968d214dec42e931e835560800487b55982fbf399a4815b8d0cb4372a
-
SSDEEP
12288:kI1quIh7a3iwbihym2g7XO3LWUQfh4Co:kI1qa+gkE2fh4Co
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2620 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2772 Logo1_.exe 2756 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe -
Loads dropped DLL 1 IoCs
pid Process 2620 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpenc.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\or\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\PublicAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe File created C:\Windows\Logo1_.exe 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2684 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 28 PID 1532 wrote to memory of 2684 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 28 PID 1532 wrote to memory of 2684 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 28 PID 1532 wrote to memory of 2684 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 28 PID 2684 wrote to memory of 2164 2684 net.exe 30 PID 2684 wrote to memory of 2164 2684 net.exe 30 PID 2684 wrote to memory of 2164 2684 net.exe 30 PID 2684 wrote to memory of 2164 2684 net.exe 30 PID 1532 wrote to memory of 2620 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 31 PID 1532 wrote to memory of 2620 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 31 PID 1532 wrote to memory of 2620 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 31 PID 1532 wrote to memory of 2620 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 31 PID 1532 wrote to memory of 2772 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 33 PID 1532 wrote to memory of 2772 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 33 PID 1532 wrote to memory of 2772 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 33 PID 1532 wrote to memory of 2772 1532 6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe 33 PID 2772 wrote to memory of 2596 2772 Logo1_.exe 34 PID 2772 wrote to memory of 2596 2772 Logo1_.exe 34 PID 2772 wrote to memory of 2596 2772 Logo1_.exe 34 PID 2772 wrote to memory of 2596 2772 Logo1_.exe 34 PID 2596 wrote to memory of 2528 2596 net.exe 36 PID 2596 wrote to memory of 2528 2596 net.exe 36 PID 2596 wrote to memory of 2528 2596 net.exe 36 PID 2596 wrote to memory of 2528 2596 net.exe 36 PID 2620 wrote to memory of 2756 2620 cmd.exe 37 PID 2620 wrote to memory of 2756 2620 cmd.exe 37 PID 2620 wrote to memory of 2756 2620 cmd.exe 37 PID 2620 wrote to memory of 2756 2620 cmd.exe 37 PID 2772 wrote to memory of 2732 2772 Logo1_.exe 38 PID 2772 wrote to memory of 2732 2772 Logo1_.exe 38 PID 2772 wrote to memory of 2732 2772 Logo1_.exe 38 PID 2772 wrote to memory of 2732 2772 Logo1_.exe 38 PID 2732 wrote to memory of 2872 2732 net.exe 40 PID 2732 wrote to memory of 2872 2732 net.exe 40 PID 2732 wrote to memory of 2872 2732 net.exe 40 PID 2732 wrote to memory of 2872 2732 net.exe 40 PID 2772 wrote to memory of 1284 2772 Logo1_.exe 21 PID 2772 wrote to memory of 1284 2772 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe"C:\Users\Admin\AppData\Local\Temp\6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2164
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a91B5.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe"C:\Users\Admin\AppData\Local\Temp\6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe"4⤵
- Executes dropped EXE
PID:2756
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2528
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2872
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD522f843576d7f955e6adfc871b32f1c4e
SHA10f619c169809e25776e5662048ef43b75105c749
SHA2564743495c4403ccae771b3e2b4f9bca13336c3df8a7adda3b912f06b5e509f88a
SHA512dc3f8688869ab9f35ad02f8b7c217fa93fc6dbe00a13a4a81e7b725b6dcaa8080c4731ffb165f070889f08b43e0a365e58955682c46623b85a0b4aca644b9fbf
-
Filesize
722B
MD591e674937fdbbc330e418bd8fed384b1
SHA163405fff5d54a555b6597c908d8cc89feff2f489
SHA256771f263f34cd34122cab812403402a8bafe4d9e6336b475d21bebf1bf41d8958
SHA512ade84f8dee13c4689f8169d456a567e3e81556f6f4564aa78b8f40ac84c9058d25708b58297c2314f5a8b637df35e1571147b39bd3231620398fa0a22246bb9a
-
C:\Users\Admin\AppData\Local\Temp\6e0dd195f9f9bceb5b53fe49e207fe0d64714b60c2f08a1733aac7ae13e4a17f.exe.exe
Filesize544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
33KB
MD579ddd31ec12dcac372128d6324c29631
SHA1d4629a5ff6608ffe5e6732e39508b26d9b8291cd
SHA256fbe0b835b3c535dc32227041810d143b2976303c3a46d926aca38537e2520404
SHA512231338271e15166c55e203cd6aa3369a2220e5e01d74cb7c4729b4f4fd36a27a9e3a2a8d7deaac2559a5226bb6695ad9946e2a6e2c3500e089c47376a251d601
-
Filesize
9B
MD55e45e0c42537212b4bfef35112ec91ba
SHA110c59c091fd35facc82bbc96938f118ce5a60546
SHA2569f6b7a83161db36757e96dc40936aec1e5a9a41f9fca089f9cf5a4d695dd5ed5
SHA512ee964e08687daa53fdc8e063402791acb104bd59f5d0f8a6d11d3e889db476315641c38032ade4177cd794b060f9fc4e6fd161989e452aae828c875c747e4bfb