Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 18:14
Static task
static1
Behavioral task
behavioral1
Sample
d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe
Resource
win7-20240221-en
General
-
Target
d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe
-
Size
66KB
-
MD5
3f9c2a945b4cc81d677874066edc4ef5
-
SHA1
2944b7ae1df1e60a83dc148b577647fbf6c20987
-
SHA256
d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6
-
SHA512
9a4d19be4755145b8efdea55a8439126abd9b96fa78d9892b7099655ab087d278871ee2e66b906e3c8282535754898593dfe7ff83a97b43f2203470f61f953d9
-
SSDEEP
1536:Ig8Ze+Zk77RNzLiTOwiS4qz0XSW3iG47fy:Igae+aX3zvZS4qz3G47a
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 840 Logo1_.exe 2732 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe -
Loads dropped DLL 1 IoCs
pid Process 2804 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\PROOF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1042\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe File created C:\Windows\Logo1_.exe d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe 840 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2216 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 28 PID 1612 wrote to memory of 2216 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 28 PID 1612 wrote to memory of 2216 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 28 PID 1612 wrote to memory of 2216 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 28 PID 2216 wrote to memory of 2084 2216 net.exe 30 PID 2216 wrote to memory of 2084 2216 net.exe 30 PID 2216 wrote to memory of 2084 2216 net.exe 30 PID 2216 wrote to memory of 2084 2216 net.exe 30 PID 1612 wrote to memory of 2804 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 31 PID 1612 wrote to memory of 2804 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 31 PID 1612 wrote to memory of 2804 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 31 PID 1612 wrote to memory of 2804 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 31 PID 1612 wrote to memory of 840 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 33 PID 1612 wrote to memory of 840 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 33 PID 1612 wrote to memory of 840 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 33 PID 1612 wrote to memory of 840 1612 d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe 33 PID 840 wrote to memory of 2592 840 Logo1_.exe 34 PID 840 wrote to memory of 2592 840 Logo1_.exe 34 PID 840 wrote to memory of 2592 840 Logo1_.exe 34 PID 840 wrote to memory of 2592 840 Logo1_.exe 34 PID 2592 wrote to memory of 2744 2592 net.exe 36 PID 2592 wrote to memory of 2744 2592 net.exe 36 PID 2592 wrote to memory of 2744 2592 net.exe 36 PID 2592 wrote to memory of 2744 2592 net.exe 36 PID 2804 wrote to memory of 2732 2804 cmd.exe 37 PID 2804 wrote to memory of 2732 2804 cmd.exe 37 PID 2804 wrote to memory of 2732 2804 cmd.exe 37 PID 2804 wrote to memory of 2732 2804 cmd.exe 37 PID 840 wrote to memory of 2884 840 Logo1_.exe 38 PID 840 wrote to memory of 2884 840 Logo1_.exe 38 PID 840 wrote to memory of 2884 840 Logo1_.exe 38 PID 840 wrote to memory of 2884 840 Logo1_.exe 38 PID 2884 wrote to memory of 2664 2884 net.exe 40 PID 2884 wrote to memory of 2664 2884 net.exe 40 PID 2884 wrote to memory of 2664 2884 net.exe 40 PID 2884 wrote to memory of 2664 2884 net.exe 40 PID 840 wrote to memory of 1192 840 Logo1_.exe 21 PID 840 wrote to memory of 1192 840 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe"C:\Users\Admin\AppData\Local\Temp\d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a864F.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe"C:\Users\Admin\AppData\Local\Temp\d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe"4⤵
- Executes dropped EXE
PID:2732
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2744
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2664
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD581a0e302bbfd88e0fa1e7a21dec03386
SHA1423f9191a497994c2fb959806c9ad0ef5b678d0c
SHA2568f8b833c8ee99eb2bdcf44ae370ed5505681331b52adc56815d96a263e60cbe7
SHA512b4b05481f1026a2aff43ae42416c943902f87ddab8941fab5c8f4875956fcc67e8ce66acb4a7e98d705769b75c01beb0a9be279b29c8a2e9dfe5ae96bb742d00
-
Filesize
478KB
MD558e981aa689693f5695bae5cb00cfa39
SHA1d8d4575dd3f2aaed503388aae63b3a947f7a7e82
SHA2560947128e04349f2829e54dad392e85b448539782dfcc666e382b361e9489a488
SHA512e41d12ba89eac143445597ddbc7bab2945b273acc26a49ea7982864be31ae3c3ec6838b3f237b6285e8c1ba6cd15161736bcb88a75dde093f9a1916e7c938661
-
Filesize
722B
MD5e7bb0bd7f55ceb604e8c94e120f8b901
SHA1fb926f4310e9c1b19de49a86fd0c733fea987660
SHA2565ec91b2ca8ea283537a80a6bfe6de2179adc7080c4f32d1a9d720e179f1f98c8
SHA512d3e7025a4cb23e3872130dde8083aea64b2572676f458100d0286192c1e1ebe6a09b930a8f02714832ed76f1fb9a9c3c7fb6879fdbf6c1ce046d4dcdcca85073
-
C:\Users\Admin\AppData\Local\Temp\d4f43c5616ce0695d303103e4e9e446a6a756b4f1b8c569aa2e20da2a47ab7b6.exe
Filesize33KB
MD58d8e70465b638a0fbef479bb1f9a50be
SHA1c39e2a1b7712f6edb3ab8da7add41102bbc2646a
SHA2567152bd71bfdf164229ec3664980fd0f5389790fb2fb852c770ffa901a3087ff6
SHA51211ad37a481f65d48e522d035ffa7cd0ac0a4c4258dff97de738ad4dccec025c4e408af9917f807313ee98169387661f0e0446df187180d36ea8cbfcd1f21ddac
-
Filesize
33KB
MD5420f125d677f0bf19d6130ea59dfb694
SHA1c26ae0c439982374d7ed6db90761cdb1d4f2f617
SHA2564784cbb5bf5947b0729e72958deb0c4f12222523aee7f3c19856e16f9e2068d2
SHA51223cc499e39b347ecd15b6ba5eafd3455295bcf0508b14e65c24928cb9e6d90d5c324ae3687186b954d4549dccce2087f08fda10bbf1205b19df74ef6b1a773ee
-
Filesize
8B
MD50282826728a8bfe9c3f290391e4f323c
SHA1ab69946ecc2824015e04a669b8434e8eb2a658aa
SHA2560c3ddb95f5308286721e2d55c16a3170674b54fc8d17c1f02bee1b6850ce2ee9
SHA512fde2cb3a9b14fa79fdb7615c094a85aee3baf100511872c0b3986349edefe5a2dc4513929587852c1672e9632c8a6c95284fab82397133dec597bb8fe618fb0e