Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 11:22
Static task
static1
Behavioral task
behavioral1
Sample
ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe
Resource
win7-20240215-en
General
-
Target
ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe
-
Size
258KB
-
MD5
607348aab4e70fc28cf10668b0a736ac
-
SHA1
cf1960317bd7ca0851fab8b297338ff16e4bbf32
-
SHA256
ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af
-
SHA512
33c6b5f0b9a379cfeac73443aa68d57a929a87108dab65d4399e935db4b812b8030549c9aad544b72688ca66e6e05fce2aec222575eba40981d1e590e608035e
-
SSDEEP
6144:t+aX3xFEgiC4bXqsTk90qC1AOb7eswf1Px++fD8PJ:t+axpitXqsTkiR7twRx+gD8PJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2208 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2828 Logo1_.exe 1580 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe -
Loads dropped DLL 1 IoCs
pid Process 2208 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe File created C:\Windows\Logo1_.exe ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2244 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 28 PID 2272 wrote to memory of 2244 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 28 PID 2272 wrote to memory of 2244 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 28 PID 2272 wrote to memory of 2244 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 28 PID 2244 wrote to memory of 2084 2244 net.exe 30 PID 2244 wrote to memory of 2084 2244 net.exe 30 PID 2244 wrote to memory of 2084 2244 net.exe 30 PID 2244 wrote to memory of 2084 2244 net.exe 30 PID 2272 wrote to memory of 2208 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 31 PID 2272 wrote to memory of 2208 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 31 PID 2272 wrote to memory of 2208 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 31 PID 2272 wrote to memory of 2208 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 31 PID 2272 wrote to memory of 2828 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 33 PID 2272 wrote to memory of 2828 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 33 PID 2272 wrote to memory of 2828 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 33 PID 2272 wrote to memory of 2828 2272 ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe 33 PID 2828 wrote to memory of 2932 2828 Logo1_.exe 34 PID 2828 wrote to memory of 2932 2828 Logo1_.exe 34 PID 2828 wrote to memory of 2932 2828 Logo1_.exe 34 PID 2828 wrote to memory of 2932 2828 Logo1_.exe 34 PID 2932 wrote to memory of 2596 2932 net.exe 36 PID 2932 wrote to memory of 2596 2932 net.exe 36 PID 2932 wrote to memory of 2596 2932 net.exe 36 PID 2932 wrote to memory of 2596 2932 net.exe 36 PID 2208 wrote to memory of 1580 2208 cmd.exe 37 PID 2208 wrote to memory of 1580 2208 cmd.exe 37 PID 2208 wrote to memory of 1580 2208 cmd.exe 37 PID 2208 wrote to memory of 1580 2208 cmd.exe 37 PID 2208 wrote to memory of 1580 2208 cmd.exe 37 PID 2208 wrote to memory of 1580 2208 cmd.exe 37 PID 2208 wrote to memory of 1580 2208 cmd.exe 37 PID 2828 wrote to memory of 2524 2828 Logo1_.exe 38 PID 2828 wrote to memory of 2524 2828 Logo1_.exe 38 PID 2828 wrote to memory of 2524 2828 Logo1_.exe 38 PID 2828 wrote to memory of 2524 2828 Logo1_.exe 38 PID 2524 wrote to memory of 2696 2524 net.exe 40 PID 2524 wrote to memory of 2696 2524 net.exe 40 PID 2524 wrote to memory of 2696 2524 net.exe 40 PID 2524 wrote to memory of 2696 2524 net.exe 40 PID 2828 wrote to memory of 1092 2828 Logo1_.exe 18 PID 2828 wrote to memory of 1092 2828 Logo1_.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe"C:\Users\Admin\AppData\Local\Temp\ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1526.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe"C:\Users\Admin\AppData\Local\Temp\ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe"4⤵
- Executes dropped EXE
PID:1580
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2596
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2696
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD55e01f5e16d8a2c1aa7aaf3bc93e86217
SHA1e82b89ec82a105bfc6b9bc1e866c8f002d69eeea
SHA2561f3c7ec1ef6da3e46c879fd2402e553fc1383d88a35f999a5db58cacec00ab39
SHA51204b102ee281653d424f45dfd495d2122e6f5de412f8b32b945ba83d6d95740a928065d8aa2b7a60a51ac5523889ea5aee5f3c00e2a31d5ad5d9ed50bca3e47e2
-
Filesize
722B
MD509d3b7d38e43cdcfaee2412984a71587
SHA18eec0d28b3c52813000f8c64e43b4fc672caf1ab
SHA256e9f2f20069cad2e0dd4e762697c5fb980b11dad12c06f2aaecad58f0fef01684
SHA5124bd1ae56c0667f642483e0ec148a4bcb0e14695676a4d9dfb7a73a819c59d832caeec11cd0b2211fcd14ced3864a79b815e190ee723bd0a182003e06f58a4eda
-
C:\Users\Admin\AppData\Local\Temp\ab3eead3adf05d30705ac1b104e1b16207cec33ca87c37e9eabc4b454f1063af.exe.exe
Filesize224KB
MD5d4b257c01bbaa68d15d8368475a4e227
SHA1fafae083a882e163cfa8c77258baaab891c17df2
SHA256dd6dd981c7f1a6673dc8cc3a0fe1fc8a54e059a9fdb0545b0dc9258299c0c546
SHA512167494ecb32196e8e199d7d14a1c0498eee45ab8e8862e5441539fa569313bb602b9e979935c7cc5ba39300e54e8bdbdf2f502e4ea24b5e8339fd2c3685ca502
-
Filesize
33KB
MD5fff1c0106e76fffebabed9d814d46a2c
SHA1a7004deff995cc01c355485b705436391e89e4de
SHA256d794474c27287dd4a38dd471be2813f297c94f501b45e0a3b1534d73888a5606
SHA51218b9a28eb01f06d0d6593dd4de673140125d38609873938eede683a3f6c9ebba6e43a01ced2e298268b745bf4bdb808cb4070c33449686e770292301a41f5d7e
-
Filesize
9B
MD57ef570b2b21e58fd906ef1a980d64425
SHA118502489f652e74f8972bbfa100d5c163d719ab7
SHA256c3ce1b9216b58ac7d9ed3b93e5e3a1d6a2473b53b5bc1f008a621def49517055
SHA512e1175d861a79d62b85cd18661375f1c956dcc97e958765dc225f3aa4b0f0100ca9e17b9c61f5e18fc2a96e5167c0563f60645033aff1be1ec2f372c1b9a8b35f