Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe
Resource
win7-20231129-en
General
-
Target
a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe
-
Size
264KB
-
MD5
12fd9a9b45f37d850cdb0bbef4db0777
-
SHA1
7c44fd6168c42782eedec33a646d6417ef9bf0c1
-
SHA256
a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9
-
SHA512
19f968c2f0458b88a84848a51e12006ad15972382b96a3f80a9a5a2018d54fc78872e3c0da0df1cc26849bb6bd67abb14c6f1c53338e3afd8d4f2231a4670101
-
SSDEEP
3072:Oh+ke+aX3zX8QBD1pLRkgUA1nQZwFGVO4Mqg+WDY:D+aX3zJBXLRp1nQ4QLd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2872 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2924 Logo1_.exe 2648 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe Logo1_.exe File created C:\Program Files\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe File created C:\Windows\Logo1_.exe a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe 2924 Logo1_.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1364 wrote to memory of 3064 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 28 PID 1364 wrote to memory of 3064 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 28 PID 1364 wrote to memory of 3064 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 28 PID 1364 wrote to memory of 3064 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 28 PID 3064 wrote to memory of 2268 3064 net.exe 30 PID 3064 wrote to memory of 2268 3064 net.exe 30 PID 3064 wrote to memory of 2268 3064 net.exe 30 PID 3064 wrote to memory of 2268 3064 net.exe 30 PID 1364 wrote to memory of 2872 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 31 PID 1364 wrote to memory of 2872 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 31 PID 1364 wrote to memory of 2872 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 31 PID 1364 wrote to memory of 2872 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 31 PID 1364 wrote to memory of 2924 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 33 PID 1364 wrote to memory of 2924 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 33 PID 1364 wrote to memory of 2924 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 33 PID 1364 wrote to memory of 2924 1364 a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe 33 PID 2924 wrote to memory of 2632 2924 Logo1_.exe 34 PID 2924 wrote to memory of 2632 2924 Logo1_.exe 34 PID 2924 wrote to memory of 2632 2924 Logo1_.exe 34 PID 2924 wrote to memory of 2632 2924 Logo1_.exe 34 PID 2872 wrote to memory of 2648 2872 cmd.exe 35 PID 2872 wrote to memory of 2648 2872 cmd.exe 35 PID 2872 wrote to memory of 2648 2872 cmd.exe 35 PID 2872 wrote to memory of 2648 2872 cmd.exe 35 PID 2872 wrote to memory of 2648 2872 cmd.exe 35 PID 2872 wrote to memory of 2648 2872 cmd.exe 35 PID 2872 wrote to memory of 2648 2872 cmd.exe 35 PID 2632 wrote to memory of 2636 2632 net.exe 37 PID 2632 wrote to memory of 2636 2632 net.exe 37 PID 2632 wrote to memory of 2636 2632 net.exe 37 PID 2632 wrote to memory of 2636 2632 net.exe 37 PID 2924 wrote to memory of 2468 2924 Logo1_.exe 38 PID 2924 wrote to memory of 2468 2924 Logo1_.exe 38 PID 2924 wrote to memory of 2468 2924 Logo1_.exe 38 PID 2924 wrote to memory of 2468 2924 Logo1_.exe 38 PID 2468 wrote to memory of 2616 2468 net.exe 40 PID 2468 wrote to memory of 2616 2468 net.exe 40 PID 2468 wrote to memory of 2616 2468 net.exe 40 PID 2468 wrote to memory of 2616 2468 net.exe 40 PID 2924 wrote to memory of 1372 2924 Logo1_.exe 21 PID 2924 wrote to memory of 1372 2924 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe"C:\Users\Admin\AppData\Local\Temp\a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1BCA.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe"C:\Users\Admin\AppData\Local\Temp\a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe"4⤵
- Executes dropped EXE
PID:2648
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2616
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5d8db94d08b248211444185e6ef24fe61
SHA1d933c595dee275b8d126122efd567d7d62a7d1cf
SHA256fbaf522161a297910167730a207631c12ab0eeec07988685bf2e4d3e53a0b860
SHA51226f0d7dbe438e3559fdd11235f6aeb30357e985b8d21034f49b913c420a07c9db27d7dcabea10ce0c1f1b7fb5daf3ba6a99a5e335e2e0f2e9bd50bf08989d524
-
Filesize
477KB
MD51c63906fc40ff10a8fbf01fbae77302e
SHA1497a9c5c135a88248f3bde815a168ac69d0c9cd4
SHA25656929e5c86458a536633649510475af879c50ba6ebb1e91ac29948ae7896b462
SHA5124de8c3ee67b0749e944d4bcbb22236576a740a8211115ccfe222acf3268ed68ad7c61839f8c5fcc8e0925f1b33c6a08d9c091f328d9dbb7b1cff684a7e366aaa
-
Filesize
722B
MD526ecfaa03351d695c420292baa2449f2
SHA1c84c00fea9277e98476917ae6693cce7aa5806e8
SHA25640dc74261a1031ba6dcc7f3f7021e85a09a7f7830e11cecfc55426757c114b5e
SHA51277461c2a18c3fef204fa41027ec96b81ce49bd69d2bf44ff3c4cebb0d4dbfb150e6d491370f53666bf6bb37db113ecc5a0fc60d83a72592435f54e35c3b0d2f1
-
C:\Users\Admin\AppData\Local\Temp\a0147682b27f52290a0c4743d072f99f9fb84acfc494a5288fcacd68dac292b9.exe.exe
Filesize231KB
MD56f581a41167d2d484fcba20e6fc3c39a
SHA1d48de48d24101b9baaa24f674066577e38e6b75c
SHA2563eb8d53778eab9fb13b4c97aeab56e4bad2a6ea3748d342f22eaf4d7aa3185a7
SHA512e1177b6cea89445d58307b3327c78909adff225497f9abb8de571cdd114b547a8f515ec3ab038b583bf752a085b231f6329d6ca82fbe6be8a58cd97a1dbaf0f6
-
Filesize
33KB
MD5889b263aa6dca72c5b323bb3b4900aa4
SHA1f3b4d4b6e721c17271e49473b327c1c74141ebcb
SHA256749c032c705049445dcb20bc3a92ee321c8d3fa9c0c188d584274dfd313d9afe
SHA512cc86401682ec6349837d005b99b4ccbb856820a168de76c98fae57b1145b3543fedea4525612136f94ba63351a36df0890f7fc6ed25a060894da1cdd63f29f72
-
Filesize
8B
MD5d970a2bfcaa076939c06270d1a48dec8
SHA17a558f4d64c3e98bcfd2af83f28e6fbd207a39e1
SHA256bdc6872f9a0a011a670907f0fedad9b88e283c5af545cf9f6bd73c3709967d44
SHA512ea4c16930628455852ce343f8ae248b6df869b8da10b10928ebb802129f73d9761971811de317c7d3121b815340027782ec15d385d1d2d7df8fd0a46b62974c2