Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe
Resource
win7-20240221-en
General
-
Target
f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe
-
Size
5.7MB
-
MD5
a87bee4da1eef368e329fd35e2284611
-
SHA1
15202f6d9b2bf752df98b529786ae9540dcb22a7
-
SHA256
f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655
-
SHA512
a31fa0144c41620746363734e48d7bc082a38190feefcf46292399f21417a09c340e05451aac742b8f751346f7d983d4c81835cff41dc914962d6022129f7024
-
SSDEEP
49152:2BBPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTP:27KUgTH2M2m9UMpu1QfLczqssnKSk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2572 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2612 Logo1_.exe 2396 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe -
Loads dropped DLL 1 IoCs
pid Process 2572 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe File created C:\Windows\Logo1_.exe f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe 2612 Logo1_.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1732 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 28 PID 1936 wrote to memory of 1732 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 28 PID 1936 wrote to memory of 1732 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 28 PID 1936 wrote to memory of 1732 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 28 PID 1732 wrote to memory of 1752 1732 net.exe 30 PID 1732 wrote to memory of 1752 1732 net.exe 30 PID 1732 wrote to memory of 1752 1732 net.exe 30 PID 1732 wrote to memory of 1752 1732 net.exe 30 PID 1936 wrote to memory of 2572 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 31 PID 1936 wrote to memory of 2572 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 31 PID 1936 wrote to memory of 2572 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 31 PID 1936 wrote to memory of 2572 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 31 PID 1936 wrote to memory of 2612 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 33 PID 1936 wrote to memory of 2612 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 33 PID 1936 wrote to memory of 2612 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 33 PID 1936 wrote to memory of 2612 1936 f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe 33 PID 2612 wrote to memory of 2588 2612 Logo1_.exe 34 PID 2612 wrote to memory of 2588 2612 Logo1_.exe 34 PID 2612 wrote to memory of 2588 2612 Logo1_.exe 34 PID 2612 wrote to memory of 2588 2612 Logo1_.exe 34 PID 2588 wrote to memory of 2624 2588 net.exe 36 PID 2588 wrote to memory of 2624 2588 net.exe 36 PID 2588 wrote to memory of 2624 2588 net.exe 36 PID 2588 wrote to memory of 2624 2588 net.exe 36 PID 2612 wrote to memory of 2792 2612 Logo1_.exe 38 PID 2612 wrote to memory of 2792 2612 Logo1_.exe 38 PID 2612 wrote to memory of 2792 2612 Logo1_.exe 38 PID 2612 wrote to memory of 2792 2612 Logo1_.exe 38 PID 2792 wrote to memory of 2536 2792 net.exe 40 PID 2792 wrote to memory of 2536 2792 net.exe 40 PID 2792 wrote to memory of 2536 2792 net.exe 40 PID 2792 wrote to memory of 2536 2792 net.exe 40 PID 2612 wrote to memory of 1192 2612 Logo1_.exe 21 PID 2612 wrote to memory of 1192 2612 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe"C:\Users\Admin\AppData\Local\Temp\f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2DF3.bat3⤵
- Deletes itself
- Loads dropped DLL
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe"C:\Users\Admin\AppData\Local\Temp\f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe"4⤵
- Executes dropped EXE
PID:2396
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2624
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2536
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5e8dfde7841362df3fdcfa0c2231e2bde
SHA115c8028cf6ea8bb199a8e47f0afa51f752e97c7e
SHA256987d9deb2936759b6e1ff836693bb39edccac7ed049642f9b7f9a2407c29c3a7
SHA5123bf1bbcc34b10371c390fbfd8d9be881149c5ed722113272eb44b5d72ad5fb5c4859d6bb5e2dfcae3c43ea5c895b7fb7de229bbbfe3a6cbbdc576ab2d7dd4367
-
Filesize
484KB
MD51ca6cdb4a39c3c4e5697068cfc802a6f
SHA1cc270899de7664dd49aeb83109890434b4a659cd
SHA256ef407033e521f030ce9dd54de17bdfb95487780201385c04e15d1406d7454834
SHA512fd29cdf191414a67921ffd329ffeb989ed0d7c61c22629833f4fc40ae9592bc25b5f3370e6e2c16d427fb8de9c7672bd741c3b81af340fed7fcab3ccaddc62aa
-
Filesize
722B
MD5808ff1d676991f357286e82ed575359e
SHA161374fc936824279e3c74e779ebe53c3d3e4ecbf
SHA256c4b5d00a1d2d7cd81481e8902df2e3dae6f370768f5392db34c20ccb28e60c65
SHA5127d450cbb21cfe06a8647fa20b78b6d2d3afd37f2a1e02cd32c1cdd4369b29e2c888af072ca091543767d33a2343b7c02b362e80d58657102495d1e90b88666d8
-
C:\Users\Admin\AppData\Local\Temp\f3a583e1a14257aa4f48db018981f0cbabdca3e70e2c0315313203ce08ccb655.exe.exe
Filesize5.7MB
MD5ba18e99b3e17adb5b029eaebc457dd89
SHA1ec0458f3c00d35b323f08d4e1cc2e72899429c38
SHA256f5ee36de8edf9be2ac2752b219cfdcb7ca1677071b8e116cb876306e9f1b6628
SHA5121f41929e6f5b555b60c411c7810cbf14e3af26100df5ac4533ec3739a278c1b925687284660efb4868e3741305098e2737836229efc9fe46c97a6057c10e677c
-
Filesize
39KB
MD56b310f4f06625eea7e7dc0d202b54785
SHA13bbe4c3438f73714d8b65175c3c23073203ab92e
SHA256d294d9d69493d6af1c4d0eb5e4be608389e22699590fe8a366974ef278f9ffbd
SHA5126bfd6711e2308b08e35a6976be0aa90de4a0bbabd4602f07cba8854de445d2e0c1198956183a58e4a69c97e54fae9b57f7962422b129b2d0b14eb872564fc29c
-
Filesize
8B
MD535a8ee2041a708d5071bff39818311c3
SHA131114ee16a39b8ada4130a94c1c36ed74a563d2a
SHA256b2405b086204a9155a2dabf58717e53695089ece5d0af208cb960473ba350f8b
SHA512f17fa8c794a47b0134ac4d8e83010e8dce1a0f2ab74a400c571d6470737e386f4eb1351be6c5b153dc063c49d333b69ddf67871d2e0ffb3c02d243be0015f1f0