Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 07:17
Static task
static1
Behavioral task
behavioral1
Sample
c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe
Resource
win7-20240221-en
General
-
Target
c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe
-
Size
970KB
-
MD5
44f37bcb6733e5d1acb25855354d2329
-
SHA1
d66c4a19017aaa034e34446c9d7d5dade358e2aa
-
SHA256
c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288
-
SHA512
9209798230c8ed49bfe8b3f6f9db76f75f80db2fd1977754bceb8090834dde62e46e75582cfcabaf8a8283cb9a3588a970d970f41465b4d1116852e64012b6ab
-
SSDEEP
12288:W+azbvURKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:WBzbRBpDRmi78gkPXlyo0G/jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2888 Logo1_.exe 2696 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe -
Loads dropped DLL 2 IoCs
pid Process 2564 cmd.exe 2564 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\images\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\Skins\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe File created C:\Windows\Logo1_.exe c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe 2888 Logo1_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2696 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2696 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe Token: 35 2696 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3036 wrote to memory of 3040 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 28 PID 3036 wrote to memory of 3040 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 28 PID 3036 wrote to memory of 3040 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 28 PID 3036 wrote to memory of 3040 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 28 PID 3040 wrote to memory of 3032 3040 net.exe 30 PID 3040 wrote to memory of 3032 3040 net.exe 30 PID 3040 wrote to memory of 3032 3040 net.exe 30 PID 3040 wrote to memory of 3032 3040 net.exe 30 PID 3036 wrote to memory of 2564 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 31 PID 3036 wrote to memory of 2564 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 31 PID 3036 wrote to memory of 2564 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 31 PID 3036 wrote to memory of 2564 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 31 PID 3036 wrote to memory of 2888 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 33 PID 3036 wrote to memory of 2888 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 33 PID 3036 wrote to memory of 2888 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 33 PID 3036 wrote to memory of 2888 3036 c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe 33 PID 2564 wrote to memory of 2696 2564 cmd.exe 34 PID 2564 wrote to memory of 2696 2564 cmd.exe 34 PID 2564 wrote to memory of 2696 2564 cmd.exe 34 PID 2564 wrote to memory of 2696 2564 cmd.exe 34 PID 2888 wrote to memory of 2828 2888 Logo1_.exe 35 PID 2888 wrote to memory of 2828 2888 Logo1_.exe 35 PID 2888 wrote to memory of 2828 2888 Logo1_.exe 35 PID 2888 wrote to memory of 2828 2888 Logo1_.exe 35 PID 2828 wrote to memory of 2584 2828 net.exe 37 PID 2828 wrote to memory of 2584 2828 net.exe 37 PID 2828 wrote to memory of 2584 2828 net.exe 37 PID 2828 wrote to memory of 2584 2828 net.exe 37 PID 2888 wrote to memory of 2408 2888 Logo1_.exe 38 PID 2888 wrote to memory of 2408 2888 Logo1_.exe 38 PID 2888 wrote to memory of 2408 2888 Logo1_.exe 38 PID 2888 wrote to memory of 2408 2888 Logo1_.exe 38 PID 2408 wrote to memory of 2476 2408 net.exe 40 PID 2408 wrote to memory of 2476 2408 net.exe 40 PID 2408 wrote to memory of 2476 2408 net.exe 40 PID 2408 wrote to memory of 2476 2408 net.exe 40 PID 2888 wrote to memory of 1392 2888 Logo1_.exe 21 PID 2888 wrote to memory of 1392 2888 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe"C:\Users\Admin\AppData\Local\Temp\c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:3032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a71E5.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe"C:\Users\Admin\AppData\Local\Temp\c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2584
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2476
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD579d4fd1cb70f3844796aa1ea18a238e2
SHA178d207a7de2aeb85eefc185d894b0b7626e1e1f3
SHA256ccaacc3965c1bdfce8cd1e934895a4563dddf082016e56846966c250bed87d5b
SHA5127a0167cbce49f09ea39e490862b8c371eacf8ce3d74d6a6054e7f0e1df4b307019f5adee03603fcb9d4db2b17841cbc9cf129e9480d70b20c266fe82b3979b33
-
Filesize
722B
MD5d995dc88ec2c9a92d361bd6c8431fdc3
SHA18383e50a97b8994371bb5698f875fdc0a4c26162
SHA256e28fe0ee70ce1a718d7dc8b58a1467ed9f9e942967476aff83424c165606c775
SHA51282aed792c9151ab64979668bfd1109afbc204c8334bae878dd26ee199ec58b4a2a8c722decb498254a857805b78e5cf42d8fc37509ae16f1152961ce98729d28
-
C:\Users\Admin\AppData\Local\Temp\c9e46f72c3fc30e8a87c150084525271024e303ae86c69f3781a11aca4275288.exe.exe
Filesize930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
39KB
MD5b358a6cac10ccc8c0ba6d33b809eb77a
SHA14b662ed65f5af865bf40925e0aacafc9a6e3a2cb
SHA256b4c9ed18a1f2124fcc393b4779ebd601b36eba3bc6acaa565c532bab3aec694d
SHA512a7d8b81673b74bafc0251a4a291b15774807612b566b7b5909369f964d08ce9e5671fab5ba5da0e1b479b4838d04d159ca7231da47f3b8d19b1d3b88ce6e85c1
-
Filesize
8B
MD535a8ee2041a708d5071bff39818311c3
SHA131114ee16a39b8ada4130a94c1c36ed74a563d2a
SHA256b2405b086204a9155a2dabf58717e53695089ece5d0af208cb960473ba350f8b
SHA512f17fa8c794a47b0134ac4d8e83010e8dce1a0f2ab74a400c571d6470737e386f4eb1351be6c5b153dc063c49d333b69ddf67871d2e0ffb3c02d243be0015f1f0