Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe
Resource
win7-20240215-en
General
-
Target
9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe
-
Size
96KB
-
MD5
9bdf0654c011c9bc298f3f1056cbb4ba
-
SHA1
bf68ac2e43de63dff313e9329752cbc7b7a9d6b3
-
SHA256
9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952
-
SHA512
4ddca742115f3dc19e397156e88139d35918f36dcf1c041476c6b5050df32659d3dc9f1543b9a102c370dda199ce0fbd4c4550207fadd61053b694430a894e8e
-
SSDEEP
1536:rGFaYzMXqtGNtty1yVumRTTChUzS40nWzpXVP/XVXDEiC04pmI+Wy:rGFaY46tGNtty1X0+WzpX9XVXDnj4ry
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
pid Process 2584 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2648 Logo1_.exe 2576 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe -
Loads dropped DLL 1 IoCs
pid Process 2584 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{F6AFA7E0-7C65-4C06-9D81-8A9FA89DB845}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe File created C:\Windows\Logo1_.exe 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1792 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 28 PID 2040 wrote to memory of 1792 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 28 PID 2040 wrote to memory of 1792 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 28 PID 2040 wrote to memory of 1792 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 28 PID 1792 wrote to memory of 2028 1792 net.exe 30 PID 1792 wrote to memory of 2028 1792 net.exe 30 PID 1792 wrote to memory of 2028 1792 net.exe 30 PID 1792 wrote to memory of 2028 1792 net.exe 30 PID 2040 wrote to memory of 2584 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 31 PID 2040 wrote to memory of 2584 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 31 PID 2040 wrote to memory of 2584 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 31 PID 2040 wrote to memory of 2584 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 31 PID 2040 wrote to memory of 2648 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 33 PID 2040 wrote to memory of 2648 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 33 PID 2040 wrote to memory of 2648 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 33 PID 2040 wrote to memory of 2648 2040 9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe 33 PID 2648 wrote to memory of 2960 2648 Logo1_.exe 34 PID 2648 wrote to memory of 2960 2648 Logo1_.exe 34 PID 2648 wrote to memory of 2960 2648 Logo1_.exe 34 PID 2648 wrote to memory of 2960 2648 Logo1_.exe 34 PID 2584 wrote to memory of 2576 2584 cmd.exe 36 PID 2584 wrote to memory of 2576 2584 cmd.exe 36 PID 2584 wrote to memory of 2576 2584 cmd.exe 36 PID 2584 wrote to memory of 2576 2584 cmd.exe 36 PID 2960 wrote to memory of 2732 2960 net.exe 37 PID 2960 wrote to memory of 2732 2960 net.exe 37 PID 2960 wrote to memory of 2732 2960 net.exe 37 PID 2960 wrote to memory of 2732 2960 net.exe 37 PID 2648 wrote to memory of 2620 2648 Logo1_.exe 38 PID 2648 wrote to memory of 2620 2648 Logo1_.exe 38 PID 2648 wrote to memory of 2620 2648 Logo1_.exe 38 PID 2648 wrote to memory of 2620 2648 Logo1_.exe 38 PID 2620 wrote to memory of 2608 2620 net.exe 40 PID 2620 wrote to memory of 2608 2620 net.exe 40 PID 2620 wrote to memory of 2608 2620 net.exe 40 PID 2620 wrote to memory of 2608 2620 net.exe 40 PID 2648 wrote to memory of 1208 2648 Logo1_.exe 21 PID 2648 wrote to memory of 1208 2648 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe"C:\Users\Admin\AppData\Local\Temp\9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a14C8.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe"C:\Users\Admin\AppData\Local\Temp\9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe"4⤵
- Executes dropped EXE
PID:2576
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2732
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2608
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5e194e3f599f585b521b00ba7d99c03a5
SHA12ade918605a7a60bcc840819b52c6fb5f470921b
SHA256b70334eb15d0c19fcb70b2d250e32a01f1a17bd230401155d3c4fe3065242aa9
SHA512b7e3c0741cc3ac540da389b2fa66501e1a6c433ab0b22c99b38f40dc57d940d81979b08859d8daa67cd002b02ead5daac4ad9cafce5186bf35b536f6de4b7957
-
Filesize
478KB
MD55a4669bf1382e7b9672b287ef6a5d990
SHA1582120da714e9bd8783dcb8fa5218260f35e7399
SHA2564b4df892d26fed910b2a4556a21b9da130c9af659b79b0411a30fe6c90b74820
SHA512c9b970be0d22e5c8b94bcc6569fbf8570b924ce7dfe1a36b0cc5ee221448af4a1b6016a8891c1bd421040d3cdf8b3b79dae693b4003fac90354f2bea5361b1da
-
Filesize
722B
MD54eec4a9020b4bb0dee8b392a54ecaa91
SHA1d4157eab400b120764d33946eeeccbf84b741153
SHA256e41f9175e41cbc1f9cfc71238807a4e4044bf65590a1a5116765aeaf4e9fc7f7
SHA5128c3b62f7297c444f47f6094d809c24ea54786509585f7ff7db59a0dc491c92ac4a5606556d1581659dce693d699d4fa7ff55efc9f792680011a6f8a418478b3d
-
C:\Users\Admin\AppData\Local\Temp\9331432fdb2f0c092fa43877927f8551a8c7cdeb13a515376aff69accfec5952.exe.exe
Filesize62KB
MD5c54f1fc981737d618eaab97ba5df6614
SHA17d4422e8c078f2699093effe564854748b62bc7b
SHA2562a96aa7b2e19c2f7970c258a7760e5cd503442ef5375edca947488fc2d8374c4
SHA51285a454cc272fb6bbe69d833a22a16c3882b899c8dc92b2ae54423c75758c8fd5df683d1deb82bc5de859e96c72b52cc9aec7699cb90f621e9cdc5852e931d65a
-
Filesize
33KB
MD50c024d12adef144def06e6f299357485
SHA1896f33f1c0bc5c6644094f07d44e2bcc377958bb
SHA256df70e984201f34822e49a6da9037e738e596a51d3e190cf4b76b8c64ebd3c30d
SHA512072a920b5fd0373d40947b9410becd9df1bfdff8913bb0650272a3e4c46b29b826b42998b61426b7eb6fa8d081066d0b0aa183dbf0044e9119b10f9a3faae09d
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
9B
MD531874817e0fb055be8d2c971c0e3bbde
SHA1ee8a35d6a86cb6d13f354d67d912e194bb09c74b
SHA25694de8b492bc2db9a9592f7c9433547eb7f80826ed67f48d2bb7e22db9d49f544
SHA51255747c69ae50fa212576d095f60cf33b42e26789cf8c34fc5120a45b1988aae95f91d9e37cb17298c5ac5243b2e4c40e1d0e084ce7fe14bceb4ebb318c65c944