Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe
Resource
win7-20240221-en
General
-
Target
2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe
-
Size
717KB
-
MD5
dd37d9a76c03c9a2801542308a37d27e
-
SHA1
eaf5d0c872de895c96b655ad30384618a0d9c1d1
-
SHA256
2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6
-
SHA512
283930fb99a34aa881da0fa91e8761f79515507cf7551fd6c84cc17aafff5542ae002729734b80dc6a113092b58cb0fbf1c4df408d10cb3da73704e93e9901f9
-
SSDEEP
12288:73WFjJfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:73M9LOS2opPIXV
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe -
Deletes itself 1 IoCs
pid Process 3056 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2584 Logo1_.exe 2600 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1200 Explorer.EXE -
Loads dropped DLL 2 IoCs
pid Process 3056 cmd.exe 3056 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7z.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe File created C:\Windows\Logo1_.exe 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2228 wrote to memory of 776 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 28 PID 2228 wrote to memory of 776 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 28 PID 2228 wrote to memory of 776 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 28 PID 2228 wrote to memory of 776 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 28 PID 776 wrote to memory of 2392 776 net.exe 30 PID 776 wrote to memory of 2392 776 net.exe 30 PID 776 wrote to memory of 2392 776 net.exe 30 PID 776 wrote to memory of 2392 776 net.exe 30 PID 2228 wrote to memory of 3056 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 31 PID 2228 wrote to memory of 3056 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 31 PID 2228 wrote to memory of 3056 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 31 PID 2228 wrote to memory of 3056 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 31 PID 2228 wrote to memory of 2584 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 33 PID 2228 wrote to memory of 2584 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 33 PID 2228 wrote to memory of 2584 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 33 PID 2228 wrote to memory of 2584 2228 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 33 PID 2584 wrote to memory of 2572 2584 Logo1_.exe 34 PID 2584 wrote to memory of 2572 2584 Logo1_.exe 34 PID 2584 wrote to memory of 2572 2584 Logo1_.exe 34 PID 2584 wrote to memory of 2572 2584 Logo1_.exe 34 PID 3056 wrote to memory of 2600 3056 cmd.exe 36 PID 3056 wrote to memory of 2600 3056 cmd.exe 36 PID 3056 wrote to memory of 2600 3056 cmd.exe 36 PID 3056 wrote to memory of 2600 3056 cmd.exe 36 PID 2572 wrote to memory of 2728 2572 net.exe 37 PID 2572 wrote to memory of 2728 2572 net.exe 37 PID 2572 wrote to memory of 2728 2572 net.exe 37 PID 2572 wrote to memory of 2728 2572 net.exe 37 PID 2584 wrote to memory of 2464 2584 Logo1_.exe 38 PID 2584 wrote to memory of 2464 2584 Logo1_.exe 38 PID 2584 wrote to memory of 2464 2584 Logo1_.exe 38 PID 2584 wrote to memory of 2464 2584 Logo1_.exe 38 PID 2464 wrote to memory of 2604 2464 net.exe 40 PID 2464 wrote to memory of 2604 2464 net.exe 40 PID 2464 wrote to memory of 2604 2464 net.exe 40 PID 2464 wrote to memory of 2604 2464 net.exe 40 PID 2584 wrote to memory of 1200 2584 Logo1_.exe 21 PID 2584 wrote to memory of 1200 2584 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe"C:\Users\Admin\AppData\Local\Temp\2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a19F6.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe"C:\Users\Admin\AppData\Local\Temp\2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe"4⤵
- Executes dropped EXE
PID:2600
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2728
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2604
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD5e3ed025983edd3f0811b528d691f5aad
SHA1d4dba9af05f4499e9b7b9152b4b79fdc392fea0e
SHA256baabdc56c507e1820de6caf9cfd27eb3298c955fe5725460cfb9b2e833546005
SHA512f0c40858619b35c307a55ecb3647645717a05fc229dcf3af6562720305a38b4ed2e7f4000a50ba44d2644173a1c99c8781859236f497c4d79437d19043914567
-
Filesize
722B
MD59034ff88605dcf0514c0a593e5d5ee11
SHA1b20b6b1a1f5850fd1ec3246ff15170405f0049c4
SHA25680d454dbd38c33484de7c4ed6b22684deab9ff6b406501b753b7d6403d1ddd43
SHA512e8760d1b06ff0a002d898a9119cbeb128a365008d859b7cc3a88533fabb6ebe1cb7e4f48b424eb01e60831a474091a62faace40dfd0168b3bd062bae47f7bd02
-
C:\Users\Admin\AppData\Local\Temp\2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe.exe
Filesize684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
33KB
MD572524cf9b862c04eda809519e1ff803e
SHA131cb19b48f493554e3e8a6d8b8a41854698711e0
SHA256f602e3036944a0423d2c1fd94dea02cbd48e5f64bb346deddb8d8585c0cd2f94
SHA51266e3525b995b673f1b82d88679045379f18e16b10a53a00f4bef9175cb6980c4fce1eba62b92a9b6bb91752142572ee0f8ff3a1a317ddd7b7f7247e5d1059abb
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
9B
MD5ef2876ec14bdb3dc085fc3af9311b015
SHA168b64b46b1ff0fdc9f009d8fffb8ee87c597fa56
SHA256ac2a34b4f2d44d19ca4269caf9f4e71cdb0b95ba8eb89ed52c5bc56eeeb1971c
SHA512c9998caa062ad5b1da853fabb80e88e41d9f96109af89df0309be20469ca8f5be9dd1c08f3c97030e3a487732e82304f60ee2627462e017579da4204bc163c8f