Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe
Resource
win7-20240419-en
General
-
Target
453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe
-
Size
1.4MB
-
MD5
098bafba016c54de4e4da3806a1815bf
-
SHA1
8b458a9943f3e57807955d894525384d966135c6
-
SHA256
453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806
-
SHA512
01a6c9cce804e168c4595cbfaa904b21bafc04f64c7d8f41af44e647b404311eb282eb4ca04240b8aa45e34b3b8dc0ee5971d41c9e619a4d6f1194d6fcb77357
-
SSDEEP
24576:i3NmLZmQR3caJZLZmvNzc0TDZodoSRsfHMbvmQakU:idiZmQyaJ1ZmFcqi+SRAG+J
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2668 Logo1_.exe 2500 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe -
Loads dropped DLL 1 IoCs
pid Process 2616 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\extensions\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kab\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmprph.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe File created C:\Windows\Logo1_.exe 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1708 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 28 PID 2248 wrote to memory of 1708 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 28 PID 2248 wrote to memory of 1708 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 28 PID 2248 wrote to memory of 1708 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 28 PID 1708 wrote to memory of 1444 1708 net.exe 30 PID 1708 wrote to memory of 1444 1708 net.exe 30 PID 1708 wrote to memory of 1444 1708 net.exe 30 PID 1708 wrote to memory of 1444 1708 net.exe 30 PID 2248 wrote to memory of 2616 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 31 PID 2248 wrote to memory of 2616 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 31 PID 2248 wrote to memory of 2616 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 31 PID 2248 wrote to memory of 2616 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 31 PID 2248 wrote to memory of 2668 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 33 PID 2248 wrote to memory of 2668 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 33 PID 2248 wrote to memory of 2668 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 33 PID 2248 wrote to memory of 2668 2248 453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe 33 PID 2668 wrote to memory of 2176 2668 Logo1_.exe 34 PID 2668 wrote to memory of 2176 2668 Logo1_.exe 34 PID 2668 wrote to memory of 2176 2668 Logo1_.exe 34 PID 2668 wrote to memory of 2176 2668 Logo1_.exe 34 PID 2616 wrote to memory of 2500 2616 cmd.exe 36 PID 2616 wrote to memory of 2500 2616 cmd.exe 36 PID 2616 wrote to memory of 2500 2616 cmd.exe 36 PID 2616 wrote to memory of 2500 2616 cmd.exe 36 PID 2176 wrote to memory of 2488 2176 net.exe 37 PID 2176 wrote to memory of 2488 2176 net.exe 37 PID 2176 wrote to memory of 2488 2176 net.exe 37 PID 2176 wrote to memory of 2488 2176 net.exe 37 PID 2668 wrote to memory of 2684 2668 Logo1_.exe 38 PID 2668 wrote to memory of 2684 2668 Logo1_.exe 38 PID 2668 wrote to memory of 2684 2668 Logo1_.exe 38 PID 2668 wrote to memory of 2684 2668 Logo1_.exe 38 PID 2684 wrote to memory of 2512 2684 net.exe 40 PID 2684 wrote to memory of 2512 2684 net.exe 40 PID 2684 wrote to memory of 2512 2684 net.exe 40 PID 2684 wrote to memory of 2512 2684 net.exe 40 PID 2668 wrote to memory of 1116 2668 Logo1_.exe 20 PID 2668 wrote to memory of 1116 2668 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe"C:\Users\Admin\AppData\Local\Temp\453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1444
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a9B1.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe"C:\Users\Admin\AppData\Local\Temp\453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe"4⤵
- Executes dropped EXE
PID:2500
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2488
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2512
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5a389cb0f00dfd2e48dd91b2bd099de9a
SHA14714e5c470a195516170b13ba41d6d54ee79f37c
SHA256e30b8c7f851994e28ece48dc0ddeb66bb97e096eb7212812d66631e3b48246cc
SHA512c7d2e9f190cdaf6bb69ea19d7993d816d609c8e7ab7d217d9df33be3563239e299d18499f345b2393778b0f8afa4e9be660fc57dae62f2b7434b9cb90b9ad6b7
-
Filesize
478KB
MD55a4669bf1382e7b9672b287ef6a5d990
SHA1582120da714e9bd8783dcb8fa5218260f35e7399
SHA2564b4df892d26fed910b2a4556a21b9da130c9af659b79b0411a30fe6c90b74820
SHA512c9b970be0d22e5c8b94bcc6569fbf8570b924ce7dfe1a36b0cc5ee221448af4a1b6016a8891c1bd421040d3cdf8b3b79dae693b4003fac90354f2bea5361b1da
-
Filesize
721B
MD58770d8da33ddcfb2588d047f7b1578ca
SHA1b1c0893c446d9461359f275ccdcc63edc3f7766e
SHA2563775ce503033c1c371f22b8aa6affb9551b26c3bb0a67f81cc8853e66c30a3b2
SHA51206247241eabf3b9ce304fbff18c5dfab7dfca2441de589e9e7b49a4123a75787487f9e1458188551cb641ce917b94bb375763a6cab6bbd0cce9017e96ba9ef1d
-
C:\Users\Admin\AppData\Local\Temp\453372644a62bd510b86cb5da7c7591833df095280aa9650287359fa5967a806.exe.exe
Filesize1.4MB
MD515e52f52ed2b8ed122fae897119687c4
SHA16e35ae1d5b6f192109d7a752acd939f5ca2b97a6
SHA2568cfb55087fa8e4c1e7bcc580d767cf2c884c1b8c890ad240c1e7009810af6736
SHA512338c12af5af509c19932619007ab058e0e97b65fe32609f14d29f6cc7818814dbdbb8613f81146a10a78197b3f6fbc435fab9fe1537d1eb83c30b9f4487b6aea
-
Filesize
33KB
MD5433a682a57f792e39d4cefb612d5a4ba
SHA120e44932ad602cf24e2556797b88b065296f4f23
SHA2569b80ad539947f80b714bf1c2fca19441f6b2529eade8938a45ad84b82b4c8bf9
SHA512f3dedeeb30f9c8bdeb331961a498fca00b273f17920b760455ad5fae17a20d17f474b73d24097fc8241dacfeb7113a0c4570eaa000a41ffd98673f935f8bec14
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
9B
MD531874817e0fb055be8d2c971c0e3bbde
SHA1ee8a35d6a86cb6d13f354d67d912e194bb09c74b
SHA25694de8b492bc2db9a9592f7c9433547eb7f80826ed67f48d2bb7e22db9d49f544
SHA51255747c69ae50fa212576d095f60cf33b42e26789cf8c34fc5120a45b1988aae95f91d9e37cb17298c5ac5243b2e4c40e1d0e084ce7fe14bceb4ebb318c65c944