Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 06:15
Static task
static1
Behavioral task
behavioral1
Sample
548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe
Resource
win7-20240221-en
General
-
Target
548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe
-
Size
375KB
-
MD5
8a53e55f848e6ceb13afddbcbb9b39f8
-
SHA1
d50aa4841036b1aa887f1d90169d57e7d1c6dc11
-
SHA256
548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194
-
SHA512
c21fc22494e883caea6b9f1608514c3805dd08ae0cb37734af0e639bc74b4017149e574ad32bdda43cce6d0e5b3c71381349015d47f95c85b4a7f69a06838d5b
-
SSDEEP
6144:3+azbRZvUzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:3+azbv8U66b5zhVymA/XSRh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2556 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2536 Logo1_.exe 2744 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe -
Loads dropped DLL 1 IoCs
pid Process 2556 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE Logo1_.exe File created C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe File created C:\Windows\Logo1_.exe 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2508 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 28 PID 2856 wrote to memory of 2508 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 28 PID 2856 wrote to memory of 2508 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 28 PID 2856 wrote to memory of 2508 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 28 PID 2508 wrote to memory of 2160 2508 net.exe 30 PID 2508 wrote to memory of 2160 2508 net.exe 30 PID 2508 wrote to memory of 2160 2508 net.exe 30 PID 2508 wrote to memory of 2160 2508 net.exe 30 PID 2856 wrote to memory of 2556 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 31 PID 2856 wrote to memory of 2556 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 31 PID 2856 wrote to memory of 2556 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 31 PID 2856 wrote to memory of 2556 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 31 PID 2856 wrote to memory of 2536 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 33 PID 2856 wrote to memory of 2536 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 33 PID 2856 wrote to memory of 2536 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 33 PID 2856 wrote to memory of 2536 2856 548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe 33 PID 2536 wrote to memory of 2532 2536 Logo1_.exe 34 PID 2536 wrote to memory of 2532 2536 Logo1_.exe 34 PID 2536 wrote to memory of 2532 2536 Logo1_.exe 34 PID 2536 wrote to memory of 2532 2536 Logo1_.exe 34 PID 2532 wrote to memory of 2436 2532 net.exe 36 PID 2532 wrote to memory of 2436 2532 net.exe 36 PID 2532 wrote to memory of 2436 2532 net.exe 36 PID 2532 wrote to memory of 2436 2532 net.exe 36 PID 2556 wrote to memory of 2744 2556 cmd.exe 37 PID 2556 wrote to memory of 2744 2556 cmd.exe 37 PID 2556 wrote to memory of 2744 2556 cmd.exe 37 PID 2556 wrote to memory of 2744 2556 cmd.exe 37 PID 2536 wrote to memory of 2296 2536 Logo1_.exe 38 PID 2536 wrote to memory of 2296 2536 Logo1_.exe 38 PID 2536 wrote to memory of 2296 2536 Logo1_.exe 38 PID 2536 wrote to memory of 2296 2536 Logo1_.exe 38 PID 2296 wrote to memory of 2452 2296 net.exe 40 PID 2296 wrote to memory of 2452 2296 net.exe 40 PID 2296 wrote to memory of 2452 2296 net.exe 40 PID 2296 wrote to memory of 2452 2296 net.exe 40 PID 2536 wrote to memory of 1204 2536 Logo1_.exe 21 PID 2536 wrote to memory of 1204 2536 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe"C:\Users\Admin\AppData\Local\Temp\548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a21B4.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe"C:\Users\Admin\AppData\Local\Temp\548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe"4⤵
- Executes dropped EXE
PID:2744
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2452
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD57e8d260b6f6d3e2ed90a45ad6e671cfd
SHA12f02e8344b8d67c341718f8a7cc1a6d823292f65
SHA2567d6114b9b8de59192679b62096eff3ba7d218f77b481c0e48f04571da1836ae9
SHA5122cf1c2894b0f6dd5c6d16af22ef36bd09cf357aba32150394cac1c40e19e31f8408e31fa5525561cbcf93eae996b2ca4778c95ff6439303981df3be212a7878e
-
Filesize
484KB
MD579d4fd1cb70f3844796aa1ea18a238e2
SHA178d207a7de2aeb85eefc185d894b0b7626e1e1f3
SHA256ccaacc3965c1bdfce8cd1e934895a4563dddf082016e56846966c250bed87d5b
SHA5127a0167cbce49f09ea39e490862b8c371eacf8ce3d74d6a6054e7f0e1df4b307019f5adee03603fcb9d4db2b17841cbc9cf129e9480d70b20c266fe82b3979b33
-
Filesize
722B
MD554abfa14e491b218c6ded47782baca33
SHA160a162f5fcdf041864e50b3e0c17f06451f53394
SHA2565798fa0db30904ffb8ca12e57a5b145f16da4eec674a0b2a0fa47eb27eacf13e
SHA512c6e12066c1eabe502131376602d06266a97241b8719b086ad0c85968938baab65edc19856a2bc52b9bbdaf552dd07d7b109cccddf3f126b08091ed4617917d92
-
C:\Users\Admin\AppData\Local\Temp\548573315a92fb81472044a8a3befd16db41b74e1380c4854e1f80eb4af47194.exe.exe
Filesize335KB
MD540ac62c087648ccc2c58dae066d34c98
SHA10e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA5120c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f
-
Filesize
39KB
MD547ec98bc87cb912543336ed8e6046f36
SHA172ef5db4c258a4b74bfa2049178a007f4eed7731
SHA25657bfa721e69f4e1a59b6b0c14c0f1b60b5c67b1a2f90dcb14ff4c6f2d9ec9df4
SHA512e5f03aa980594cbca251eb2723514096ee8cc9b65327d37df3794cb6768666ca848a32d47d8992647cace51ba1f96fa38f9329da346148092230af3fe3f7b8e5
-
Filesize
8B
MD5ec89b9cba2f5e7b9394fdd901d6c3977
SHA163b0db3abcd08b863a9a3944799b41efa264db40
SHA2562b4efa4e113d3044c8e47f59a7b75225cc7736c2fa28f9e52949b9441f3d77ca
SHA512901f7d44754e59fba0b1b90341927744f670463f4d18e2694617f74fe4e3f456e9088530bccc16e758fc67a23f91380a3655121ba911e8ff5173f3ac4cb0f1d2