Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe
Resource
win7-20240221-en
General
-
Target
c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe
-
Size
577KB
-
MD5
45f6db1ec72be2ae72124871996da724
-
SHA1
859058aaee81af4e9b64f1e4308d6ec13e53e9d3
-
SHA256
c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b
-
SHA512
c41395aa00a4e6d40708a7ace7f4f19c99b13c8f04e296cae41d24721388ec27e1f824e372700754ab7dbbe0d87001fb34c26e3b157e2e4b9e34cf4cc87d9619
-
SSDEEP
6144:Q+aMKE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQG:Q+aMR7a3iwbihym2g7XO3LWUQfh4Co
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1980 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1340 Logo1_.exe 3060 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe -
Loads dropped DLL 1 IoCs
pid Process 1980 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{5CF72A45-AD68-472B-BBFF-38A947BD74EE}\chrome_installer.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\WMPDMC.exe Logo1_.exe File created C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe File created C:\Windows\Logo1_.exe c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe 1340 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1796 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 28 PID 3008 wrote to memory of 1796 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 28 PID 3008 wrote to memory of 1796 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 28 PID 3008 wrote to memory of 1796 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 28 PID 1796 wrote to memory of 2184 1796 net.exe 30 PID 1796 wrote to memory of 2184 1796 net.exe 30 PID 1796 wrote to memory of 2184 1796 net.exe 30 PID 1796 wrote to memory of 2184 1796 net.exe 30 PID 3008 wrote to memory of 1980 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 31 PID 3008 wrote to memory of 1980 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 31 PID 3008 wrote to memory of 1980 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 31 PID 3008 wrote to memory of 1980 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 31 PID 3008 wrote to memory of 1340 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 32 PID 3008 wrote to memory of 1340 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 32 PID 3008 wrote to memory of 1340 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 32 PID 3008 wrote to memory of 1340 3008 c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe 32 PID 1340 wrote to memory of 2720 1340 Logo1_.exe 34 PID 1340 wrote to memory of 2720 1340 Logo1_.exe 34 PID 1340 wrote to memory of 2720 1340 Logo1_.exe 34 PID 1340 wrote to memory of 2720 1340 Logo1_.exe 34 PID 1980 wrote to memory of 3060 1980 cmd.exe 37 PID 1980 wrote to memory of 3060 1980 cmd.exe 37 PID 1980 wrote to memory of 3060 1980 cmd.exe 37 PID 1980 wrote to memory of 3060 1980 cmd.exe 37 PID 2720 wrote to memory of 2432 2720 net.exe 36 PID 2720 wrote to memory of 2432 2720 net.exe 36 PID 2720 wrote to memory of 2432 2720 net.exe 36 PID 2720 wrote to memory of 2432 2720 net.exe 36 PID 1340 wrote to memory of 2744 1340 Logo1_.exe 38 PID 1340 wrote to memory of 2744 1340 Logo1_.exe 38 PID 1340 wrote to memory of 2744 1340 Logo1_.exe 38 PID 1340 wrote to memory of 2744 1340 Logo1_.exe 38 PID 2744 wrote to memory of 2704 2744 net.exe 40 PID 2744 wrote to memory of 2704 2744 net.exe 40 PID 2744 wrote to memory of 2704 2744 net.exe 40 PID 2744 wrote to memory of 2704 2744 net.exe 40 PID 1340 wrote to memory of 1196 1340 Logo1_.exe 21 PID 1340 wrote to memory of 1196 1340 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe"C:\Users\Admin\AppData\Local\Temp\c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2184
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a257B.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe"C:\Users\Admin\AppData\Local\Temp\c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe"4⤵
- Executes dropped EXE
PID:3060
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2432
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2704
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD51cf9715a389ba4876cab7d395df4d645
SHA10a448c44716a1d819889dabbb4eb0300535a716f
SHA256bac5d6a06de485f137512023b413935335ddb109b8c5ecc38972fcaa4a7de491
SHA512c59f4a9f9a05c67c10a42ba3a33fa15106d844088ea38b598dfb6a75f2c031aaf6e0c63bc5c03fa5899da11872df2a04b8c8dc18073f101f49cc0fc3b82ac7be
-
Filesize
478KB
MD53e2d3392a9d3ae3ed27661f81e853478
SHA1fa8c023a3bff75e89ed39f5d4bfb5693d818ca8b
SHA25609da8a31b7f420b9e4ed6d02e698bcc12a4f3efa46a53d1492a241a5784d44a8
SHA51227652a29d728b92995b8ce46b150cd14baf5b65789591085ef3fa959dbc99efaa071b7a014ccaabeb6e84cdea642769dc98a7a1684afcda9be82dbb0b8d3fa17
-
Filesize
722B
MD562483dfb098774f686e2b9e9f63db27c
SHA1da227945dc1dadd869da6b4af167b5b1886bb853
SHA2561ca9e5ebc094c71552d2a549950af03d7ce9a9166b58faefc28ed371bd6ed085
SHA51277542d07e503ef82be83e5bf7916e9558bb01d042a4bc2dd1dd40f6d372c324ecfe11a1fa546b423983b7aa32c8803ac63c677ce155b37d603cf1bcd247869c4
-
C:\Users\Admin\AppData\Local\Temp\c720359aeb64cad64544b51dc032579ba42c1ce337ebc58bacb0a8c61092ab5b.exe.exe
Filesize544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
33KB
MD5030c9aac5dcb76c5a06bf0ac2cdecfb0
SHA118f137b0ad656c47efffbc845449b5e80294bfd2
SHA256815990d99ef2e24393dfdaac82ed03ab38096386d327ae3a8f670c63e02dbf79
SHA5124db5e2a3c0e3d70003437fd15eebe90bb4574450b600bcac0fb52842c646fe5c098912ad479cf3ec4a490c985ba837e37ed5bdeec5db2ca57b16360290e0cce5
-
Filesize
8B
MD51b16d2dbd4281ce4e4e5729c608dcb0b
SHA1851e624080ba5598edb808d4b30fe2d74999ce18
SHA256c9e46fb51d0588ca1e48ca66731e11992770b9b74a982f9bdbb6ce5b5b75d549
SHA512cd1c4cf7c7871cb48ce735226b25f689b340037e6c992441e566161de7fca7410762d1a0c2670ee4b6546f7ee854d3219e0e2315c3e0387d9bbe3f08076b5a59