Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe
Resource
win7-20240215-en
General
-
Target
0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe
-
Size
563KB
-
MD5
50a7b06f3853ddf8a3770f10c2dd03d1
-
SHA1
29de6d7d2fb62b3396583b64cf2331a17da418f6
-
SHA256
0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da
-
SHA512
9b4b1fec3fa3d9c981b3c2bca3dd1464d9360a7da4c0d88b7ba057ec6baa8a6de9300c4ef125d50132452d668d809b0d5238d59f595ef7e3326c77a2fb6155e2
-
SSDEEP
12288:e3NKc9iJafmm2VYK+UNo0RweQfoAxHv9sN4A4H9J618UtQ43iUa:e3NCVm2VZQwy9E1Vf3M
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
pid Process 1968 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2572 Logo1_.exe 2576 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe -
Loads dropped DLL 2 IoCs
pid Process 1968 cmd.exe 1968 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\DAO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\PROOF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe File created C:\Windows\Logo1_.exe 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2328 wrote to memory of 500 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 28 PID 2328 wrote to memory of 500 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 28 PID 2328 wrote to memory of 500 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 28 PID 2328 wrote to memory of 500 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 28 PID 500 wrote to memory of 2428 500 net.exe 30 PID 500 wrote to memory of 2428 500 net.exe 30 PID 500 wrote to memory of 2428 500 net.exe 30 PID 500 wrote to memory of 2428 500 net.exe 30 PID 2328 wrote to memory of 1968 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 31 PID 2328 wrote to memory of 1968 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 31 PID 2328 wrote to memory of 1968 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 31 PID 2328 wrote to memory of 1968 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 31 PID 2328 wrote to memory of 2572 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 33 PID 2328 wrote to memory of 2572 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 33 PID 2328 wrote to memory of 2572 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 33 PID 2328 wrote to memory of 2572 2328 0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe 33 PID 2572 wrote to memory of 2620 2572 Logo1_.exe 34 PID 2572 wrote to memory of 2620 2572 Logo1_.exe 34 PID 2572 wrote to memory of 2620 2572 Logo1_.exe 34 PID 2572 wrote to memory of 2620 2572 Logo1_.exe 34 PID 1968 wrote to memory of 2576 1968 cmd.exe 35 PID 1968 wrote to memory of 2576 1968 cmd.exe 35 PID 1968 wrote to memory of 2576 1968 cmd.exe 35 PID 1968 wrote to memory of 2576 1968 cmd.exe 35 PID 2620 wrote to memory of 2584 2620 net.exe 37 PID 2620 wrote to memory of 2584 2620 net.exe 37 PID 2620 wrote to memory of 2584 2620 net.exe 37 PID 2620 wrote to memory of 2584 2620 net.exe 37 PID 2572 wrote to memory of 2504 2572 Logo1_.exe 38 PID 2572 wrote to memory of 2504 2572 Logo1_.exe 38 PID 2572 wrote to memory of 2504 2572 Logo1_.exe 38 PID 2572 wrote to memory of 2504 2572 Logo1_.exe 38 PID 2504 wrote to memory of 2580 2504 net.exe 40 PID 2504 wrote to memory of 2580 2504 net.exe 40 PID 2504 wrote to memory of 2580 2504 net.exe 40 PID 2504 wrote to memory of 2580 2504 net.exe 40 PID 2572 wrote to memory of 1204 2572 Logo1_.exe 21 PID 2572 wrote to memory of 1204 2572 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe"C:\Users\Admin\AppData\Local\Temp\0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2428
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a13B0.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe"C:\Users\Admin\AppData\Local\Temp\0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe"4⤵
- Executes dropped EXE
PID:2576
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2584
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2580
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD557613a0bf037dbaa054046d8f4f66293
SHA1f214da75c0330d3d0af36de2f787d5de5d618d33
SHA2569b8a4462b2ff424cc543be6811037234af9e665fe2d0c182a2c49cb279f658ce
SHA5128e0883d3f66f38c99a213bdfa1b6a2e7caba04577b23ff84727e9ee3b7ad3ab544ac8497667d6da83121afca64ec7dbcc55f45e1b7d7cfefa9e7dce8f5c0095a
-
Filesize
478KB
MD5db30f5e16c744915af12c09f1ccf3e41
SHA1d5feb47e0ca1c47b0a4cfc90be501e97f613ce90
SHA256cfc87b2273f90e5125ca09d4fed15c56a82dabc54e418301f8ce23476201950e
SHA512ff466c60abd62f72cbe687d48fcc485855e0df65599da37112d3872324176bf68428c312d8fbfaf20deba2295b2c7fc51129436a73ba8bdc58836289f6a47f6b
-
Filesize
722B
MD5b71d3f4c413e78f98358272f3e076715
SHA19cc436271dccbe12a846c87761063c6086b1ceae
SHA2561e31080e053366d93083323d70d8e6e5664c08421b20de055dea1b96e3e4da11
SHA512db52abec12bfcc4b0c77070f4ef65817e894e9dc8423310f11243352387cda30d50a3d460599a05c05b463bf258eb70db4af60b4c8a97db6166ee8e0c0ebfba0
-
C:\Users\Admin\AppData\Local\Temp\0860aa8aa27afd81c6b7500e3f11e1320045f2880976b38a2d06a5efbff394da.exe.exe
Filesize529KB
MD5cca0c5482b8a6a275d9d49433f435dfa
SHA1a72ae8621386e13c34055f612ae7612b8a18a39e
SHA2566ea08bbcedf7cb51cfbe4896ef8c589a4568b1d5240265b1dcfda83dc8b55365
SHA512b88f5cdb4bc08429ca40d24cef490128d341e10615d1d93d084b3247c2b28573d177d878c1385d3941e16a8bcc8a9f6b7870c152f4a43d02e69c05defcc9196e
-
Filesize
33KB
MD5c6b1299bf74d10873fcd4c1c137f1f57
SHA15e1fa89cb83ef4395a42783da9a7eb397224dc4d
SHA256b42be509cecca65453f15d6f60a9c2e78efeedaaf08c2d021d8353e3aea7a675
SHA5124ba21ec9e3cd17f7274578fd2953b91f902ddd539b078aab36f3fe8ca24398e478d218ef949710f81b225c2d20fc4317784302a42132e23be03fbc128cdef925
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
9B
MD5e850d9ceb7ebcc619d731dc2f1377b2b
SHA1a45553c9057075c02e28f90d5e8ea57a0dddbacc
SHA256b682a6e85069777ca22f84b99607acd09640eaa80029d74363c0a5aabddead4c
SHA512be92bd8393d0fe69559ec55e1068fcd77ccc699361a9cb98d467bd51a029c371852b7a1196ad53fa8865e956582e6a4d35f6ac6fea3832058b7a427133b0048c