Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe
Resource
win7-20240221-en
General
-
Target
d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe
-
Size
81KB
-
MD5
b39f34573e21c7a4cf1441db26d724e5
-
SHA1
871a97da79e858816beb3a767b9d496332f4df4f
-
SHA256
d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e
-
SHA512
c6a1e83d7b64c280321015884061a8c9a7811316e16bc012392a556921e705631ee603ba90a42093b0fbede9e710bffa48e54f5d2c2c7f73c3a897ee44b8b3a9
-
SSDEEP
1536:84KFe+Zk7VJbwlYXjPrsqrZMYR5p8wwEToa9D4ZQKbgZi1dst7x9PxQ:84Ye+azbRPrlr9RXFIlZQKbgZi1St7xQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2568 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2600 Logo1_.exe 2576 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe -
Loads dropped DLL 1 IoCs
pid Process 2568 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PrivateAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe File created C:\Windows\Logo1_.exe d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1396 wrote to memory of 2344 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 28 PID 1396 wrote to memory of 2344 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 28 PID 1396 wrote to memory of 2344 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 28 PID 1396 wrote to memory of 2344 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 28 PID 2344 wrote to memory of 2076 2344 net.exe 30 PID 2344 wrote to memory of 2076 2344 net.exe 30 PID 2344 wrote to memory of 2076 2344 net.exe 30 PID 2344 wrote to memory of 2076 2344 net.exe 30 PID 1396 wrote to memory of 2568 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 31 PID 1396 wrote to memory of 2568 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 31 PID 1396 wrote to memory of 2568 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 31 PID 1396 wrote to memory of 2568 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 31 PID 1396 wrote to memory of 2600 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 33 PID 1396 wrote to memory of 2600 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 33 PID 1396 wrote to memory of 2600 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 33 PID 1396 wrote to memory of 2600 1396 d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe 33 PID 2600 wrote to memory of 2828 2600 Logo1_.exe 34 PID 2600 wrote to memory of 2828 2600 Logo1_.exe 34 PID 2600 wrote to memory of 2828 2600 Logo1_.exe 34 PID 2600 wrote to memory of 2828 2600 Logo1_.exe 34 PID 2828 wrote to memory of 2256 2828 net.exe 36 PID 2828 wrote to memory of 2256 2828 net.exe 36 PID 2828 wrote to memory of 2256 2828 net.exe 36 PID 2828 wrote to memory of 2256 2828 net.exe 36 PID 2568 wrote to memory of 2576 2568 cmd.exe 37 PID 2568 wrote to memory of 2576 2568 cmd.exe 37 PID 2568 wrote to memory of 2576 2568 cmd.exe 37 PID 2568 wrote to memory of 2576 2568 cmd.exe 37 PID 2600 wrote to memory of 2212 2600 Logo1_.exe 38 PID 2600 wrote to memory of 2212 2600 Logo1_.exe 38 PID 2600 wrote to memory of 2212 2600 Logo1_.exe 38 PID 2600 wrote to memory of 2212 2600 Logo1_.exe 38 PID 2212 wrote to memory of 2764 2212 net.exe 40 PID 2212 wrote to memory of 2764 2212 net.exe 40 PID 2212 wrote to memory of 2764 2212 net.exe 40 PID 2212 wrote to memory of 2764 2212 net.exe 40 PID 2600 wrote to memory of 1204 2600 Logo1_.exe 21 PID 2600 wrote to memory of 1204 2600 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe"C:\Users\Admin\AppData\Local\Temp\d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1017.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe"C:\Users\Admin\AppData\Local\Temp\d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe"4⤵
- Executes dropped EXE
PID:2576
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2256
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2764
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD532b6aa604bd02727e84d7952721f055a
SHA13cf3d7eb354b0dac52465fc69071e90a4412607c
SHA256cf99dc814df2ed704b1676e80f7a219474ac8b95c64d28b84b206a6bf7ed9bca
SHA512b1e1c29ce4589a5e30932c7543e1ea80b52faac234f352081a40d57e68ef385b563874ed5b142ed94c4accf889615b8c0678f43df50dca04195429014ce6df1e
-
Filesize
484KB
MD579d4fd1cb70f3844796aa1ea18a238e2
SHA178d207a7de2aeb85eefc185d894b0b7626e1e1f3
SHA256ccaacc3965c1bdfce8cd1e934895a4563dddf082016e56846966c250bed87d5b
SHA5127a0167cbce49f09ea39e490862b8c371eacf8ce3d74d6a6054e7f0e1df4b307019f5adee03603fcb9d4db2b17841cbc9cf129e9480d70b20c266fe82b3979b33
-
Filesize
722B
MD5ddfa22b09d2b0b3e369e2c6ca99ef9d8
SHA1adc7960b863cc1d16a86fc9ddc9b5ccb146eb396
SHA2565682fb58fc902ee8deff61fb8aa6d0dfbf762bf4c0bc73f5f39ddeeeb1435f41
SHA5122a2996a8b0225156f40ed1f5257783f96bd41f9908bd2725aec8efa466929abb6a1212260a86de418d418f76b85be5c25ca9367db2e91a84c32ef6554f99ef74
-
C:\Users\Admin\AppData\Local\Temp\d0764a0ce2f685c53c0cd8d7d98ff032f627806eb762e89d7d4c0cffe18fc59e.exe.exe
Filesize41KB
MD5977e405c109268909fd24a94cc23d4f0
SHA1af5d032c2b6caa2164cf298e95b09060665c4188
SHA256cd24c61fe7dc3896c6c928c92a2adc58fab0a3ff61ef7ddcac1ba794182ab12f
SHA51212b4b59c1a8e65e72aa07ee4b6b6cd9fdedead01d5ce8e30f16ca26b5d733655e23a71c1d273a950a5b1a6cce810b696612de4a1148ac5f468ddf05d4549eed5
-
Filesize
39KB
MD53db42405aac4c2f3aee890c3c249f126
SHA18d92453ccd9af94d51702bfd28b191b295d1c4c8
SHA2561f48a0595daf780a6e51817d85f7ca6c0d4257c1bb74682f3be2676ab1d0461d
SHA512d555cd0ef14d2f3ef38282244ec1e674fdc3a73ea56e791d7795a78b465486dda3697cdbeab1d2c11e3ea1a000eabb7f92258ac93dfc7d43aa5b85f054ff11a7
-
Filesize
9B
MD5f29b71f66ac42a28a8d1e12a13d61861
SHA1bd61fbc8b6eed4cae3fa29d7b950784258be10cd
SHA2569a5e4ff44f8f5bb21798074ea03e493911b59680e37191522562dece826da1cf
SHA51290c31cda60a9a63e3fa78e99f1104d1a9c9f811e11b62f75063b6007ae284c8c233b5d1235defab7ae0deec3b7892c85af9319219405c44d16fa29a3215f50e0