Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe
Resource
win7-20240508-en
General
-
Target
da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe
-
Size
107KB
-
MD5
fb5ee83732a6d6163f7fbb70be1ee7f6
-
SHA1
76543f409a219eb6c69b3be4eb30849d21829969
-
SHA256
da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8
-
SHA512
adf05751b0b0dd4e42a093d7ea71ae6f2451b117b8a236d64a225724eaf068407d8de351219030708b1328910eb0a735c6b27e92b9b25f4f886099f0a1edfeab
-
SSDEEP
1536:/BFsrz8VuJlMXaDuiNtAIqneOsUJouGB1YiXlJYZhA2zOsvLZt5y0XWE:/Bo8ulMXaKkSexUJo9n1JkhIeLJmE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2700 Logo1_.exe 2668 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe -
Loads dropped DLL 1 IoCs
pid Process 2692 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sw\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\setup_wm.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\_desktop.ini Logo1_.exe File created C:\Program Files\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe File created C:\Windows\Logo1_.exe da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2760 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 28 PID 2400 wrote to memory of 2760 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 28 PID 2400 wrote to memory of 2760 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 28 PID 2400 wrote to memory of 2760 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 28 PID 2760 wrote to memory of 2584 2760 net.exe 30 PID 2760 wrote to memory of 2584 2760 net.exe 30 PID 2760 wrote to memory of 2584 2760 net.exe 30 PID 2760 wrote to memory of 2584 2760 net.exe 30 PID 2400 wrote to memory of 2692 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 31 PID 2400 wrote to memory of 2692 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 31 PID 2400 wrote to memory of 2692 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 31 PID 2400 wrote to memory of 2692 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 31 PID 2400 wrote to memory of 2700 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 33 PID 2400 wrote to memory of 2700 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 33 PID 2400 wrote to memory of 2700 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 33 PID 2400 wrote to memory of 2700 2400 da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe 33 PID 2700 wrote to memory of 2840 2700 Logo1_.exe 34 PID 2700 wrote to memory of 2840 2700 Logo1_.exe 34 PID 2700 wrote to memory of 2840 2700 Logo1_.exe 34 PID 2700 wrote to memory of 2840 2700 Logo1_.exe 34 PID 2840 wrote to memory of 2504 2840 net.exe 36 PID 2840 wrote to memory of 2504 2840 net.exe 36 PID 2840 wrote to memory of 2504 2840 net.exe 36 PID 2840 wrote to memory of 2504 2840 net.exe 36 PID 2692 wrote to memory of 2668 2692 cmd.exe 37 PID 2692 wrote to memory of 2668 2692 cmd.exe 37 PID 2692 wrote to memory of 2668 2692 cmd.exe 37 PID 2692 wrote to memory of 2668 2692 cmd.exe 37 PID 2700 wrote to memory of 2472 2700 Logo1_.exe 38 PID 2700 wrote to memory of 2472 2700 Logo1_.exe 38 PID 2700 wrote to memory of 2472 2700 Logo1_.exe 38 PID 2700 wrote to memory of 2472 2700 Logo1_.exe 38 PID 2472 wrote to memory of 2548 2472 net.exe 40 PID 2472 wrote to memory of 2548 2472 net.exe 40 PID 2472 wrote to memory of 2548 2472 net.exe 40 PID 2472 wrote to memory of 2548 2472 net.exe 40 PID 2700 wrote to memory of 1168 2700 Logo1_.exe 21 PID 2700 wrote to memory of 1168 2700 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe"C:\Users\Admin\AppData\Local\Temp\da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2BE1.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe"C:\Users\Admin\AppData\Local\Temp\da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe"4⤵
- Executes dropped EXE
PID:2668
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2504
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2548
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD502569885e9369db7f7e10caf1b50ba83
SHA110a6f75e80a9f81aa4c6143a31eb419ff252c667
SHA256f9fbd769b3a8bcc2a77241fa76adb574009dd443f0ebe5913450e2e9f21d87da
SHA512d18ea18d470cde35ac5f775b8f51d9d0bbaeea64312a30ea4ed7261174cdc3c8ac60e8f205004bcac90c937fa732851d3f5bdf5dde3417b624f1ee24e87640c3
-
Filesize
478KB
MD55264aab343fc1f53c29d1065346d0010
SHA1db43bc0b28b4ada0c5635db50fd0b64410ab76ad
SHA256d33d56847b353c8207a43aa01cc75527328ebf4bba669e90e29266d1b6fb57dd
SHA512bb4ba1f7c5cae56cef564dd99f1a1fd3e2c656f8004f689a22ea641d886cbb3a19dde3dce5be4cf8cee4ce190170fd8c5390cb9c7c40ae54109559685119a958
-
Filesize
722B
MD57c02a0c356b02159ba2f730da68f07f3
SHA14ff1f8ea0675bd511e011b46c1e15a17548bca0a
SHA25611400b53804c70a17fce55591615497c55d26e7ad2f65bf971cabc30b08f185b
SHA5123f27734e409315bc2858d5070c8262b3e05f6816ae3257d1bcfee74e8a63c6bf8f9bc732805cd4f933bc13deb74d7e8eec589c5a30c86fa92dd4e482fb391ce6
-
C:\Users\Admin\AppData\Local\Temp\da6597338202df1353d07657160df1bdc6fb497cc313a120c130946deccf10a8.exe.exe
Filesize74KB
MD517b9c8d17a708fefb05ab4aa1fdfc042
SHA1fe30739f0aefe686641c97bf6fbae86d2dd9b64f
SHA2564d61edeac9ba6e464cfb0b941935f47620d95adbadba759506937aaa5f715418
SHA5124307b139860d44eb80bf6aace37cbd576a06f7f073e245bb60e3cbe4ffb00f6c863fe5526c2a931bbe967867c7e281421f8d64f8593607e612a1c452c8ba4715
-
Filesize
33KB
MD5e88b528305eba2eaa41bd67d5be2f3e9
SHA146ab8f327b9ad592d6b6e2786ff0c5a5735acbfb
SHA2568549f3ecbe5d5d917c87472123a8ffc41b19b52c94b1fbc7089a971436dfe5ae
SHA5128437f856ced59ed9edb400139bcc5bb083164c52fd843d058d94bd40243b3314af75e3fd18380708561a00a80c7160153a40e768c493f08ea4afc102357252e7
-
Filesize
9B
MD5e850d9ceb7ebcc619d731dc2f1377b2b
SHA1a45553c9057075c02e28f90d5e8ea57a0dddbacc
SHA256b682a6e85069777ca22f84b99607acd09640eaa80029d74363c0a5aabddead4c
SHA512be92bd8393d0fe69559ec55e1068fcd77ccc699361a9cb98d467bd51a029c371852b7a1196ad53fa8865e956582e6a4d35f6ac6fea3832058b7a427133b0048c