Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe
Resource
win7-20240508-en
General
-
Target
552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe
-
Size
224KB
-
MD5
c5e99e9517172376c06c1d1522fb109d
-
SHA1
f8ab43be3e3859ce7ae05e7d3b9d9c53a5e90325
-
SHA256
552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232
-
SHA512
24ef3a3f940860d0e33be027924157fc78ed892e155dacf0d9b06c265368b2dcf2a660032dab8048c13480af462b55f957dcabf2b1bbc1efb20ea5d2c9cd0e26
-
SSDEEP
3072:/Pe+a+3dN5iJw8KYg5zA5GsMYSxSJiN/vGss9kTBf9pAXAtPOYQwT:++aM0035iMhL/vGsbTBl2wOsT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2128 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2136 Logo1_.exe 2648 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe -
Loads dropped DLL 1 IoCs
pid Process 2128 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lo\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\QUAD\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe File created C:\Windows\Logo1_.exe 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe 2136 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2188 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 28 PID 2424 wrote to memory of 2188 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 28 PID 2424 wrote to memory of 2188 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 28 PID 2424 wrote to memory of 2188 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 28 PID 2188 wrote to memory of 2600 2188 net.exe 30 PID 2188 wrote to memory of 2600 2188 net.exe 30 PID 2188 wrote to memory of 2600 2188 net.exe 30 PID 2188 wrote to memory of 2600 2188 net.exe 30 PID 2424 wrote to memory of 2128 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 31 PID 2424 wrote to memory of 2128 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 31 PID 2424 wrote to memory of 2128 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 31 PID 2424 wrote to memory of 2128 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 31 PID 2424 wrote to memory of 2136 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 32 PID 2424 wrote to memory of 2136 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 32 PID 2424 wrote to memory of 2136 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 32 PID 2424 wrote to memory of 2136 2424 552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe 32 PID 2136 wrote to memory of 2748 2136 Logo1_.exe 34 PID 2136 wrote to memory of 2748 2136 Logo1_.exe 34 PID 2136 wrote to memory of 2748 2136 Logo1_.exe 34 PID 2136 wrote to memory of 2748 2136 Logo1_.exe 34 PID 2748 wrote to memory of 2900 2748 net.exe 36 PID 2748 wrote to memory of 2900 2748 net.exe 36 PID 2748 wrote to memory of 2900 2748 net.exe 36 PID 2748 wrote to memory of 2900 2748 net.exe 36 PID 2128 wrote to memory of 2648 2128 cmd.exe 37 PID 2128 wrote to memory of 2648 2128 cmd.exe 37 PID 2128 wrote to memory of 2648 2128 cmd.exe 37 PID 2128 wrote to memory of 2648 2128 cmd.exe 37 PID 2136 wrote to memory of 2540 2136 Logo1_.exe 38 PID 2136 wrote to memory of 2540 2136 Logo1_.exe 38 PID 2136 wrote to memory of 2540 2136 Logo1_.exe 38 PID 2136 wrote to memory of 2540 2136 Logo1_.exe 38 PID 2540 wrote to memory of 2688 2540 net.exe 40 PID 2540 wrote to memory of 2688 2540 net.exe 40 PID 2540 wrote to memory of 2688 2540 net.exe 40 PID 2540 wrote to memory of 2688 2540 net.exe 40 PID 2136 wrote to memory of 1188 2136 Logo1_.exe 21 PID 2136 wrote to memory of 1188 2136 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe"C:\Users\Admin\AppData\Local\Temp\552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a23F5.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe"C:\Users\Admin\AppData\Local\Temp\552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe"4⤵
- Executes dropped EXE
PID:2648
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2900
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2688
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD53e2d3392a9d3ae3ed27661f81e853478
SHA1fa8c023a3bff75e89ed39f5d4bfb5693d818ca8b
SHA25609da8a31b7f420b9e4ed6d02e698bcc12a4f3efa46a53d1492a241a5784d44a8
SHA51227652a29d728b92995b8ce46b150cd14baf5b65789591085ef3fa959dbc99efaa071b7a014ccaabeb6e84cdea642769dc98a7a1684afcda9be82dbb0b8d3fa17
-
Filesize
722B
MD586b4f5fdf4300c8f6a152e4c40062495
SHA187ba55b9fb72fa0ec6be6aa110c85d073b203901
SHA256ba2e7b4af1565a6a309b1b18a5e0815277a90326cfeb2c196549aaf48b9c9ce6
SHA5126e62c784feae38dbb4870ba21417f5826c24ed100232a27ede35a6fee3d2fad45bbed9a1f4d428ae4c8862e82405851cf4d6d69e29821a12569e450d4ab84d79
-
C:\Users\Admin\AppData\Local\Temp\552ac4adca38528389c36c814aa754c59e5f33354abad1dd3417ea823333d232.exe.exe
Filesize191KB
MD58aa98031128ef0c81d34207e3c60d003
SHA1182164292e382455f00349625dd5fd1e41dcc0c8
SHA25652def964142be6891054d2f95256a3b05d66887964fcd66b34abfe32477e8965
SHA5128ba615af6d4cad84c57c20e318d6277e4bc114c07c14b72088c526a01d414fe719a43551582ecbc38bd352979720d182efc1f639c2c3e91c78b180449bcf2c12
-
Filesize
33KB
MD5f45e6c5efcb60796280b160b181a07dc
SHA18d175dae2c97edaedeb1693ab2f1b4a9b9d981d4
SHA2567447829ed8519dd4ee03c37defff6d9c5f2bf06e2ae605da9efece0c495f5844
SHA5121165d2d74f5a0dddd6d99f320c4563a1625da3b8125243baee289ce747c1665766e8dcdd6ae259e11efff5b27e572a8f432c3a85260d677874c7e1dbbcf5d088
-
Filesize
9B
MD5392ab9dcf5a9daf53626ea1f2e61d0b9
SHA10a2cdc7f8f9edf33f9fde3f8b90e0020190c8fb7
SHA2569bbc94aad502d7d7a7f502ddb9cbd93b1c89eff13e445971c94ac09215ada67d
SHA5125d1fea63a7793a65dc63c32cfe3ab2e1af941ded8e760f08fbe991e5b30433f86f920d717235a635020740c8f6f7996b4b8e8147e331b29141fcbb7bdc68144d