Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-04-2024 18:24
Static task
static1
Behavioral task
behavioral1
Sample
8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe
Resource
win7-20240221-en
General
-
Target
8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe
-
Size
672KB
-
MD5
83aed82d2917a8c44e20c34d873113d7
-
SHA1
d4e81dec9e95ed58af8e0d85a9fdb7e44a0c8250
-
SHA256
8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7
-
SHA512
6ad9c8109965b86dd4ebb8a82d975ee2ea86257e15086b9a5e88c630d4446a1f00a9e8b3501dc1de724fb307b2e64c61f21f224d069909a6a95bd22559d53984
-
SSDEEP
6144:td+azbRZvSC9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcdEf:td+azbvnPFlTz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2544 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2616 Logo1_.exe 2532 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe -
Loads dropped DLL 1 IoCs
pid Process 2544 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Temp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\PROOF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EURO\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe File created C:\Windows\Logo1_.exe 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1580 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 28 PID 2176 wrote to memory of 1580 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 28 PID 2176 wrote to memory of 1580 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 28 PID 2176 wrote to memory of 1580 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 28 PID 1580 wrote to memory of 2036 1580 net.exe 30 PID 1580 wrote to memory of 2036 1580 net.exe 30 PID 1580 wrote to memory of 2036 1580 net.exe 30 PID 1580 wrote to memory of 2036 1580 net.exe 30 PID 2176 wrote to memory of 2544 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 31 PID 2176 wrote to memory of 2544 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 31 PID 2176 wrote to memory of 2544 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 31 PID 2176 wrote to memory of 2544 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 31 PID 2176 wrote to memory of 2616 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 33 PID 2176 wrote to memory of 2616 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 33 PID 2176 wrote to memory of 2616 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 33 PID 2176 wrote to memory of 2616 2176 8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe 33 PID 2616 wrote to memory of 2564 2616 Logo1_.exe 34 PID 2616 wrote to memory of 2564 2616 Logo1_.exe 34 PID 2616 wrote to memory of 2564 2616 Logo1_.exe 34 PID 2616 wrote to memory of 2564 2616 Logo1_.exe 34 PID 2564 wrote to memory of 2024 2564 net.exe 36 PID 2564 wrote to memory of 2024 2564 net.exe 36 PID 2564 wrote to memory of 2024 2564 net.exe 36 PID 2564 wrote to memory of 2024 2564 net.exe 36 PID 2544 wrote to memory of 2532 2544 cmd.exe 37 PID 2544 wrote to memory of 2532 2544 cmd.exe 37 PID 2544 wrote to memory of 2532 2544 cmd.exe 37 PID 2544 wrote to memory of 2532 2544 cmd.exe 37 PID 2616 wrote to memory of 2456 2616 Logo1_.exe 38 PID 2616 wrote to memory of 2456 2616 Logo1_.exe 38 PID 2616 wrote to memory of 2456 2616 Logo1_.exe 38 PID 2616 wrote to memory of 2456 2616 Logo1_.exe 38 PID 2456 wrote to memory of 2412 2456 net.exe 40 PID 2456 wrote to memory of 2412 2456 net.exe 40 PID 2456 wrote to memory of 2412 2456 net.exe 40 PID 2456 wrote to memory of 2412 2456 net.exe 40 PID 2616 wrote to memory of 1180 2616 Logo1_.exe 21 PID 2616 wrote to memory of 1180 2616 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe"C:\Users\Admin\AppData\Local\Temp\8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a14D8.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe"C:\Users\Admin\AppData\Local\Temp\8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe"4⤵
- Executes dropped EXE
PID:2532
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2024
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2412
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5ab6e14fd3b3b82a74d70dd03d0a8e116
SHA1e8263c09ed7968ab04e1459ad46041ccdd9ff5e9
SHA25603dda7016a22dd98411b67875e2fe461c960b068fbcb019579d8392530b41571
SHA512851e9288ba102d5eabd34d887b70a883307bce31ccb4c7eeaf2b3010cb6bb9435a9c0261bfdafb4a0bf4046b6bc7928cbfb62599269a9c197ec2f83efaf258e8
-
Filesize
722B
MD587385c1db7056304e86dc0f8737b25e8
SHA149c580a0ea73c9c15624ca01390104f9a2cdffa9
SHA256689951438c138a4a6467bc3e34b7399c56f75e46275fbc0a1e0a54ef9bdcd863
SHA5123735a2e924302777f4bdaddcb7649c31df20e6acc178ae467ab829265ec53e55aaaf2bd5d132be25f90a745a005e1ba30eebb8e4d27fd0dd356c2bf6392b7ee7
-
C:\Users\Admin\AppData\Local\Temp\8616e9e846edda062df0e822b09dcb79beead209194841d6a4c5c99ecb1b8db7.exe.exe
Filesize633KB
MD52e0d056ad62b6ef87a091003714fd512
SHA173150bddb5671c36413d9fbc94a668f132a2edc5
SHA256cb83f04591cc1d602e650dd5c12f4470cf21b04328477bd6a52081f37c04bd7c
SHA512b8e920f8b7547aec6f5771e3e6119b01157e5e36a92c67142b0d73ffe0d501d933581e1fc752e5bba9ce819e3897be9c146bebfc0018e91318b0c99d188a2580
-
Filesize
39KB
MD5bc43e3c481e7fbe3ee697f9017cf4c1b
SHA16a76534a3a4bd72437b06bdccf1475846d7a308d
SHA256c33f277a3cea2a938fc05fda7bf9b9a0ae89474eaacf6b0b6223e07eb4ec3b6a
SHA512e5c2f3485b7573a6638f6d5ea2907371efc68b35655739e8e0c8f841de9c2d302b246eacb9627912cee5dd7ab0a9f7f652e73eb7d1925ddde20bb92e29310ce1
-
Filesize
9B
MD5f29b71f66ac42a28a8d1e12a13d61861
SHA1bd61fbc8b6eed4cae3fa29d7b950784258be10cd
SHA2569a5e4ff44f8f5bb21798074ea03e493911b59680e37191522562dece826da1cf
SHA51290c31cda60a9a63e3fa78e99f1104d1a9c9f811e11b62f75063b6007ae284c8c233b5d1235defab7ae0deec3b7892c85af9319219405c44d16fa29a3215f50e0