Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe
Resource
win7-20240508-en
General
-
Target
9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe
-
Size
66KB
-
MD5
9cb49d606f65613b8b10490ca2a7eb18
-
SHA1
c9ebd2a36356363334cb04ac8d7ba26e6a67707e
-
SHA256
9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377
-
SHA512
d78f09fcb409b65f1536ff8f9d0d004bd94dcf8234778fdfef01cb459d1b6cb1278ff7da81a8b52089993cbab4ec60763b8497e271f9dad0b4e9e50f4dff7ad7
-
SSDEEP
768:/WPcTO5RroZJ76739sBWsNscWlM3dN9N3ZjfPPNDp+Ozli4BaXP0dByt6O/AkHfB:/iSe+Zk78NR3dN5nPNDfzHa/iSfRmq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3036 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2840 Logo1_.exe 2648 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe -
Loads dropped DLL 1 IoCs
pid Process 3036 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sw\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe Logo1_.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe File created C:\Windows\Logo1_.exe 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1860 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 28 PID 2072 wrote to memory of 1860 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 28 PID 2072 wrote to memory of 1860 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 28 PID 2072 wrote to memory of 1860 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 28 PID 1860 wrote to memory of 2020 1860 net.exe 30 PID 1860 wrote to memory of 2020 1860 net.exe 30 PID 1860 wrote to memory of 2020 1860 net.exe 30 PID 1860 wrote to memory of 2020 1860 net.exe 30 PID 2072 wrote to memory of 3036 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 31 PID 2072 wrote to memory of 3036 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 31 PID 2072 wrote to memory of 3036 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 31 PID 2072 wrote to memory of 3036 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 31 PID 2072 wrote to memory of 2840 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 33 PID 2072 wrote to memory of 2840 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 33 PID 2072 wrote to memory of 2840 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 33 PID 2072 wrote to memory of 2840 2072 9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe 33 PID 2840 wrote to memory of 2852 2840 Logo1_.exe 34 PID 2840 wrote to memory of 2852 2840 Logo1_.exe 34 PID 2840 wrote to memory of 2852 2840 Logo1_.exe 34 PID 2840 wrote to memory of 2852 2840 Logo1_.exe 34 PID 2852 wrote to memory of 2656 2852 net.exe 36 PID 2852 wrote to memory of 2656 2852 net.exe 36 PID 2852 wrote to memory of 2656 2852 net.exe 36 PID 2852 wrote to memory of 2656 2852 net.exe 36 PID 3036 wrote to memory of 2648 3036 cmd.exe 37 PID 3036 wrote to memory of 2648 3036 cmd.exe 37 PID 3036 wrote to memory of 2648 3036 cmd.exe 37 PID 3036 wrote to memory of 2648 3036 cmd.exe 37 PID 2840 wrote to memory of 2588 2840 Logo1_.exe 38 PID 2840 wrote to memory of 2588 2840 Logo1_.exe 38 PID 2840 wrote to memory of 2588 2840 Logo1_.exe 38 PID 2840 wrote to memory of 2588 2840 Logo1_.exe 38 PID 2588 wrote to memory of 2688 2588 net.exe 40 PID 2588 wrote to memory of 2688 2588 net.exe 40 PID 2588 wrote to memory of 2688 2588 net.exe 40 PID 2588 wrote to memory of 2688 2588 net.exe 40 PID 2840 wrote to memory of 1180 2840 Logo1_.exe 21 PID 2840 wrote to memory of 1180 2840 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe"C:\Users\Admin\AppData\Local\Temp\9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2AE7.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe"C:\Users\Admin\AppData\Local\Temp\9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe"4⤵
- Executes dropped EXE
PID:2648
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2656
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2688
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD53e2d3392a9d3ae3ed27661f81e853478
SHA1fa8c023a3bff75e89ed39f5d4bfb5693d818ca8b
SHA25609da8a31b7f420b9e4ed6d02e698bcc12a4f3efa46a53d1492a241a5784d44a8
SHA51227652a29d728b92995b8ce46b150cd14baf5b65789591085ef3fa959dbc99efaa071b7a014ccaabeb6e84cdea642769dc98a7a1684afcda9be82dbb0b8d3fa17
-
Filesize
722B
MD569937fc0848e757643ee67216995e483
SHA10944bfc3d40ebc9a3069f58a8b925903a9979960
SHA2560293053c8337323540c64b0dcf8ae2d329e9d847dffdd9d4a4ee8426c0ad1baf
SHA512170b9d801dfe9d71e3b1e14cffc848cac11de36b0f2b64e7ca34008f5afe46d8d1463ab596e08adb7fe26c36d0990570ef9b16df230392f06f94c097ad34b86a
-
C:\Users\Admin\AppData\Local\Temp\9bc370a0d75b03abe343f84c01dd59afc3b5e6f1f3a4233a048da80bd8c93377.exe.exe
Filesize33KB
MD5aa8eced8b0c3b3722e8958b79a4c6296
SHA14ff7ef88e26a40675f194b7f07e1bf8f3350ba07
SHA25691e0b1b49ace92844e5a9afffcf2fb584cfec9f548e58ef57e3dd37dfd19f638
SHA5126f2f104befbeefa821b86d47ec256f7b13ae8f00a7cbd5d724a7bdfd20c94c5cb53c654b5637b3c7ae4fc3cd2f10d6332bf08d85af718201068a985214322698
-
Filesize
33KB
MD5f45e6c5efcb60796280b160b181a07dc
SHA18d175dae2c97edaedeb1693ab2f1b4a9b9d981d4
SHA2567447829ed8519dd4ee03c37defff6d9c5f2bf06e2ae605da9efece0c495f5844
SHA5121165d2d74f5a0dddd6d99f320c4563a1625da3b8125243baee289ce747c1665766e8dcdd6ae259e11efff5b27e572a8f432c3a85260d677874c7e1dbbcf5d088
-
Filesize
9B
MD5392ab9dcf5a9daf53626ea1f2e61d0b9
SHA10a2cdc7f8f9edf33f9fde3f8b90e0020190c8fb7
SHA2569bbc94aad502d7d7a7f502ddb9cbd93b1c89eff13e445971c94ac09215ada67d
SHA5125d1fea63a7793a65dc63c32cfe3ab2e1af941ded8e760f08fbe991e5b30433f86f920d717235a635020740c8f6f7996b4b8e8147e331b29141fcbb7bdc68144d