Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 20:14 UTC
Static task
static1
Behavioral task
behavioral1
Sample
e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe
Resource
win7-20240215-en
General
-
Target
e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe
-
Size
66KB
-
MD5
006ad69be27d59f1a0fd5b886f6ae00d
-
SHA1
7f09c46bc6accbf3e6c556ebc59cd312d5448b6e
-
SHA256
e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2
-
SHA512
42eca31e40e76d7b4a867a1f29a4ff0e4ba81672d06ba8c516cd23fc14d50362a167f1898db696921ae468d3c2f6ee1cff880b92ae3d138872f8cab7f8988d51
-
SSDEEP
768:/qLPcTO5RroZJ76739sBWsNscWlM3dN9N3ZjfPPNC4OMMwP3Sy6EGyI4t6a9AkHu:/qbSe+Zk78NR3dN5nPNC4ayFGyHNXk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2700 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2816 Logo1_.exe 2708 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe -
Loads dropped DLL 1 IoCs
pid Process 2700 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FRAR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ckb\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe File created C:\Windows\Logo1_.exe e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2124 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 28 PID 2484 wrote to memory of 2124 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 28 PID 2484 wrote to memory of 2124 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 28 PID 2484 wrote to memory of 2124 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 28 PID 2124 wrote to memory of 1932 2124 net.exe 30 PID 2124 wrote to memory of 1932 2124 net.exe 30 PID 2124 wrote to memory of 1932 2124 net.exe 30 PID 2124 wrote to memory of 1932 2124 net.exe 30 PID 2484 wrote to memory of 2700 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 31 PID 2484 wrote to memory of 2700 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 31 PID 2484 wrote to memory of 2700 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 31 PID 2484 wrote to memory of 2700 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 31 PID 2484 wrote to memory of 2816 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 33 PID 2484 wrote to memory of 2816 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 33 PID 2484 wrote to memory of 2816 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 33 PID 2484 wrote to memory of 2816 2484 e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe 33 PID 2700 wrote to memory of 2708 2700 cmd.exe 34 PID 2700 wrote to memory of 2708 2700 cmd.exe 34 PID 2700 wrote to memory of 2708 2700 cmd.exe 34 PID 2700 wrote to memory of 2708 2700 cmd.exe 34 PID 2816 wrote to memory of 2812 2816 Logo1_.exe 35 PID 2816 wrote to memory of 2812 2816 Logo1_.exe 35 PID 2816 wrote to memory of 2812 2816 Logo1_.exe 35 PID 2816 wrote to memory of 2812 2816 Logo1_.exe 35 PID 2812 wrote to memory of 384 2812 net.exe 37 PID 2812 wrote to memory of 384 2812 net.exe 37 PID 2812 wrote to memory of 384 2812 net.exe 37 PID 2812 wrote to memory of 384 2812 net.exe 37 PID 2816 wrote to memory of 2444 2816 Logo1_.exe 38 PID 2816 wrote to memory of 2444 2816 Logo1_.exe 38 PID 2816 wrote to memory of 2444 2816 Logo1_.exe 38 PID 2816 wrote to memory of 2444 2816 Logo1_.exe 38 PID 2444 wrote to memory of 2400 2444 net.exe 40 PID 2444 wrote to memory of 2400 2444 net.exe 40 PID 2444 wrote to memory of 2400 2444 net.exe 40 PID 2444 wrote to memory of 2400 2444 net.exe 40 PID 2816 wrote to memory of 1132 2816 Logo1_.exe 20 PID 2816 wrote to memory of 1132 2816 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe"C:\Users\Admin\AppData\Local\Temp\e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1DBE.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe"C:\Users\Admin\AppData\Local\Temp\e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe"4⤵
- Executes dropped EXE
PID:2708
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:384
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2400
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD53e2d3392a9d3ae3ed27661f81e853478
SHA1fa8c023a3bff75e89ed39f5d4bfb5693d818ca8b
SHA25609da8a31b7f420b9e4ed6d02e698bcc12a4f3efa46a53d1492a241a5784d44a8
SHA51227652a29d728b92995b8ce46b150cd14baf5b65789591085ef3fa959dbc99efaa071b7a014ccaabeb6e84cdea642769dc98a7a1684afcda9be82dbb0b8d3fa17
-
Filesize
722B
MD50c48fe189ea0e0df3061354f10e1c3eb
SHA1b55895a35a585c9972460807fbbd8905ebac9fbc
SHA25624b00353c3a4d80c3b2201d45ba1cd6b2d0517a129661304a02e50db71c15e56
SHA512b5ee812de5a8708566723c22cbfd050b6d1dcc87e0d139a44f17bb7e0aea8fda29be6c77efe86c3da92159fb2e383e9ea01497f505b9bd18f370cc867da22247
-
C:\Users\Admin\AppData\Local\Temp\e754d98314486475bcb77110ad6b8b63f1ebccd68fa0319f65d0a2cd4d7c8ce2.exe.exe
Filesize33KB
MD5bdbce90ce74990df3b2c7c8484dde146
SHA1ae6aadaf5467b97779d4c1a81b5cd3dfb9d8ecb4
SHA256f4a3c012f2859ead10af1298d9b20fbd8ca2257f73d530a2b0c25937cb16f6eb
SHA51278e2f31759ce490f38e898ef17a700dd0898cc32b526325e8d7230b4ff119c39124cd2abf30038f70318931cc995abee523b334a29812bf875302dc126c9f958
-
Filesize
33KB
MD53659e75ad8a2bdeef5f1d74aae41c2af
SHA195b2fa7bc2afbc1f412fc4285dbb6a15cc658a8a
SHA256dbb4fdb10597cfb189203f72e75a2f2769a6960ed1acc1baa901742a344ae52d
SHA512f19bbad48af80437f083d21cf89839bee9d30d50162df60a0d7c8205b646739332e55371f5d6c005f69681e41f00df936942c06f94f1a38c25084e438cac61e2
-
Filesize
9B
MD5e7957b9f3d9556c996418169821a7993
SHA1b7028de0f91d2e50a8d5f6d23613331a2784a142
SHA25671a21a13d7822776d52d9a6146651dc9155db9f0bfbd978acf43d12dea2a8539
SHA51272bc8552047095449fa4c3c21300183acfc7b33e6ab69c11435542e2862cb9e896bbfdedaeb97ec6edac8ed68220507a302d1ed2217624c97f6e9a83c0d3a285