Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe
Resource
win7-20240221-en
General
-
Target
0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe
-
Size
577KB
-
MD5
65321b45c11d2f1ae2ef5b3e508e99db
-
SHA1
6ab49fa25966d5dbb6e6209ad3a4686cf6aad44d
-
SHA256
0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9
-
SHA512
f3f868de4a43973d232b6f54f2b15cf7643a48c80dac64be08c5ba2e0e6ca31c8c1843cabdb7fd48c2a2b798a03cd7c80fe86d8fed9035f5553df195cdbd5488
-
SSDEEP
6144:yf46tGdye419E7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQC:e3NbI7a3iwbihym2g7XO3LWUQfh4Co
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
pid Process 2584 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2632 Logo1_.exe 2560 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe -
Loads dropped DLL 1 IoCs
pid Process 2584 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Portal\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\deploy\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DAO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ckb\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1672 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 28 PID 1628 wrote to memory of 1672 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 28 PID 1628 wrote to memory of 1672 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 28 PID 1628 wrote to memory of 1672 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 28 PID 1672 wrote to memory of 1852 1672 net.exe 30 PID 1672 wrote to memory of 1852 1672 net.exe 30 PID 1672 wrote to memory of 1852 1672 net.exe 30 PID 1672 wrote to memory of 1852 1672 net.exe 30 PID 1628 wrote to memory of 2584 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 31 PID 1628 wrote to memory of 2584 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 31 PID 1628 wrote to memory of 2584 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 31 PID 1628 wrote to memory of 2584 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 31 PID 1628 wrote to memory of 2632 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 33 PID 1628 wrote to memory of 2632 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 33 PID 1628 wrote to memory of 2632 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 33 PID 1628 wrote to memory of 2632 1628 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 33 PID 2632 wrote to memory of 2552 2632 Logo1_.exe 34 PID 2632 wrote to memory of 2552 2632 Logo1_.exe 34 PID 2632 wrote to memory of 2552 2632 Logo1_.exe 34 PID 2632 wrote to memory of 2552 2632 Logo1_.exe 34 PID 2552 wrote to memory of 2748 2552 net.exe 37 PID 2552 wrote to memory of 2748 2552 net.exe 37 PID 2552 wrote to memory of 2748 2552 net.exe 37 PID 2552 wrote to memory of 2748 2552 net.exe 37 PID 2584 wrote to memory of 2560 2584 cmd.exe 36 PID 2584 wrote to memory of 2560 2584 cmd.exe 36 PID 2584 wrote to memory of 2560 2584 cmd.exe 36 PID 2584 wrote to memory of 2560 2584 cmd.exe 36 PID 2632 wrote to memory of 2616 2632 Logo1_.exe 38 PID 2632 wrote to memory of 2616 2632 Logo1_.exe 38 PID 2632 wrote to memory of 2616 2632 Logo1_.exe 38 PID 2632 wrote to memory of 2616 2632 Logo1_.exe 38 PID 2616 wrote to memory of 2492 2616 net.exe 40 PID 2616 wrote to memory of 2492 2616 net.exe 40 PID 2616 wrote to memory of 2492 2616 net.exe 40 PID 2616 wrote to memory of 2492 2616 net.exe 40 PID 2632 wrote to memory of 1196 2632 Logo1_.exe 21 PID 2632 wrote to memory of 1196 2632 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe"C:\Users\Admin\AppData\Local\Temp\0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a22EC.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe"C:\Users\Admin\AppData\Local\Temp\0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe"4⤵
- Executes dropped EXE
PID:2560
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2748
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2492
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD50a2f7bc5d2f3b1abbf852f12ac72d39f
SHA13ed5d15e03f4a79247638844b8e938794445bfde
SHA256c2eadf7bc1b2c55782d5307c4bfdc59f4c900494b9a624e199c675b582a13d7c
SHA5128c47195b5c79359b6e7c5088d1a2c757ce6a1f16dd61c4c4d0bb7baafba4135c7a64541ce7a3af55b65f83af3df2677ff6f63f9c80fdfb1f7696d54c4609d63d
-
Filesize
722B
MD51e4d3fc006b9a79f0dff103344f0c457
SHA114e03648923a7cc2d88ae61d1f2a75c3add0e4b0
SHA256034bc65b783c936e5d00000c17019270d1dfa1c3cc6b8a2b64385ad07c742b22
SHA512e7c9a2b72be94a8715d74befa8d85f3f9a9ba59cf83abe8f725b54c4353d6c1a63ba001d53422449e756d8e2552002f1dedf158986fc3fd8128eab99fdda82dd
-
C:\Users\Admin\AppData\Local\Temp\0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe.exe
Filesize544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
33KB
MD58c9e7eefdd62f19108ae9e444ad2c208
SHA1e40870610792bb8e4e835787634a0ac9a8daff3e
SHA2561cffa0d883a8763fd15280a4148775ddf3789857a2df269c9425f41095b83a92
SHA51292e4fb044d706550c0e833318e8d732ee3130c78ea198530fbbc604f34ef41cfc9b53b8fc60bfdbbe61afde60fbf3a9e528fbc1ae14eac6226d9b5966367b292
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
8B
MD54b4dbd7e2fe4189c8136069a10e1698a
SHA1e4e6e1e80d1fe41d20456173c522d8e7affc4579
SHA256f00f66ba8f3341c7ae8e3c7741a1ff31e522c75580afa9793dcaee17488ccf5b
SHA5122be5b324ef5d951c5e66d692c26f813e0fdd76cb4ef01a9abf38e5f7837f649e0194f7f5c55b1cfd79a9d253031ace5b270fc50f6c11f1885e85f9a874380d8c