Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe
Resource
win7-20240419-en
General
-
Target
65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe
-
Size
279KB
-
MD5
d5018dd648f3d30f30be13ccf753f0d5
-
SHA1
233590dab8a65e703f31aade6908345ca98f92fb
-
SHA256
65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6
-
SHA512
ed6ca78340745722725634325248f461c10a558c8f728a342a1d156c01d1f734c875a1de51550385067ef5b092694cbf5bc274f6230096c5a24def55ba6a501f
-
SSDEEP
6144:nG5KmhdFu+qQbdy5SahDbyLxoROmeOprx3v0:nP6JqQZy5SfOROj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2404 Logo1_.exe 2792 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe -
Loads dropped DLL 2 IoCs
pid Process 2660 cmd.exe 2660 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe File created C:\Windows\Logo1_.exe 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe 2404 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2108 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 28 PID 1732 wrote to memory of 2108 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 28 PID 1732 wrote to memory of 2108 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 28 PID 1732 wrote to memory of 2108 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 28 PID 2108 wrote to memory of 2636 2108 net.exe 30 PID 2108 wrote to memory of 2636 2108 net.exe 30 PID 2108 wrote to memory of 2636 2108 net.exe 30 PID 2108 wrote to memory of 2636 2108 net.exe 30 PID 1732 wrote to memory of 2660 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 31 PID 1732 wrote to memory of 2660 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 31 PID 1732 wrote to memory of 2660 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 31 PID 1732 wrote to memory of 2660 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 31 PID 1732 wrote to memory of 2404 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 33 PID 1732 wrote to memory of 2404 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 33 PID 1732 wrote to memory of 2404 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 33 PID 1732 wrote to memory of 2404 1732 65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe 33 PID 2404 wrote to memory of 2788 2404 Logo1_.exe 34 PID 2404 wrote to memory of 2788 2404 Logo1_.exe 34 PID 2404 wrote to memory of 2788 2404 Logo1_.exe 34 PID 2404 wrote to memory of 2788 2404 Logo1_.exe 34 PID 2660 wrote to memory of 2792 2660 cmd.exe 36 PID 2660 wrote to memory of 2792 2660 cmd.exe 36 PID 2660 wrote to memory of 2792 2660 cmd.exe 36 PID 2660 wrote to memory of 2792 2660 cmd.exe 36 PID 2788 wrote to memory of 2544 2788 net.exe 37 PID 2788 wrote to memory of 2544 2788 net.exe 37 PID 2788 wrote to memory of 2544 2788 net.exe 37 PID 2788 wrote to memory of 2544 2788 net.exe 37 PID 2404 wrote to memory of 2308 2404 Logo1_.exe 38 PID 2404 wrote to memory of 2308 2404 Logo1_.exe 38 PID 2404 wrote to memory of 2308 2404 Logo1_.exe 38 PID 2404 wrote to memory of 2308 2404 Logo1_.exe 38 PID 2308 wrote to memory of 2508 2308 net.exe 40 PID 2308 wrote to memory of 2508 2308 net.exe 40 PID 2308 wrote to memory of 2508 2308 net.exe 40 PID 2308 wrote to memory of 2508 2308 net.exe 40 PID 2404 wrote to memory of 1180 2404 Logo1_.exe 21 PID 2404 wrote to memory of 1180 2404 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe"C:\Users\Admin\AppData\Local\Temp\65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aACA.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe"C:\Users\Admin\AppData\Local\Temp\65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe"4⤵
- Executes dropped EXE
PID:2792
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2544
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2508
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD58a216d268fb4892b3af2e79a279a2a23
SHA151916b0eeb6d61280fac7de0363254427f245762
SHA256c7a2a1b862ba9fdf706edd930c09dd07af8fb44f3edcfe0a22b41899eebae31d
SHA51230adf4d918017584c668d9bacf0f6263a9f47087303aaa46ca6a0c9a1e96644fb54b7110ede95819e5782ca189909ce84af8bc80c2a5c1ac21cb62f33f729e93
-
Filesize
478KB
MD550cb47f0239e9a2044dfa0b0e6d92c14
SHA12b20d81a810449f5b994c3d785b6a8f7700a023f
SHA256fa436f5c793efd8b5908c7bb003a95e126a350f3c5e51edd18ccdaf28aaba7e3
SHA51227cdb9f9248870b1595fa8ff7f975fe225e80f43f47a6aac2867eadbad0dfea347c4ffa3bd6d52ba95d72d81cc12314b9ab9833d118b7a7bb0be707479371049
-
Filesize
721B
MD56147735fcb03b9c24af7a717979e99ad
SHA15e5b147b23277d0faf869e221a1ee2f965b7d432
SHA256cfdc56a12429b4d1dc1f0c1250c35e0b72779dbbd2bbf4e0785d391aac535397
SHA5123807e6d5d44738d89b274f820a573886c8ecf722c6a47b2428454579171fb8df50088e9375cba79bc06f7be019c322d653dc3c81b86809877fb14439cf05ba90
-
C:\Users\Admin\AppData\Local\Temp\65517ce5a8b60ab6a5386afdd85c4e71cbc957b885a51769e302d80151676ab6.exe.exe
Filesize245KB
MD5e84927bc7e4bef6af8daf8640d95325e
SHA1796cfbd54995d1340e3bdd9329e6d165af8c3859
SHA2567744d4c0da090157809e65259fb2682e8149b3fcf64a055607ab04f0cb732ea6
SHA512dd8c9e848100b8c67f8ac5a01e76bc11843e36824d501eca797c9560b0c99a1349ede26e5da0f57a1c66c817d0caf99284dbf968e9f5df442a7c64c88dffb261
-
Filesize
33KB
MD53905de443e3362c9a3cf7a99ec967853
SHA1fad6b90d31da3df8c885fac5d78de93bec539fec
SHA2564cfb758bc8d779a7e4f3f549286ac83c8b98d5104f3efa056d8729462bf1645c
SHA512151968a824d131913cec483882b9a636aaa1202647f703b376b495e09f3ac1377aed756e85a449613a9cea4487cf9522ec2951e00ecb095e709eb55d21fe4183
-
Filesize
9B
MD5e850d9ceb7ebcc619d731dc2f1377b2b
SHA1a45553c9057075c02e28f90d5e8ea57a0dddbacc
SHA256b682a6e85069777ca22f84b99607acd09640eaa80029d74363c0a5aabddead4c
SHA512be92bd8393d0fe69559ec55e1068fcd77ccc699361a9cb98d467bd51a029c371852b7a1196ad53fa8865e956582e6a4d35f6ac6fea3832058b7a427133b0048c