Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe
Resource
win7-20240221-en
General
-
Target
86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe
-
Size
74KB
-
MD5
b34193e981ef61d9e0005a6a19eedf84
-
SHA1
f8095cbf39092fb306002cd4f58146cc50a81985
-
SHA256
86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18
-
SHA512
47db1bbfc19948f06c53eb2ce68ae89b309a3fe4d6f5c20b1c11ea2f3b8b6c4b09fe797610a6f814e147172b11ea46ecc65786a5fa9f0632f63663aa9c0bda4e
-
SSDEEP
1536:6Hcx1aeg1v9OQZVUKM6+kKpNEToa9D4ZQKbgZi1dst7x9PxQ:6Hf9lOzKM5p9lZQKbgZi1St7xQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1612 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1252 Logo1_.exe 2324 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe -
Loads dropped DLL 1 IoCs
pid Process 1612 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.0\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe File created C:\Windows\Logo1_.exe 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe 1252 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2220 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 30 PID 2236 wrote to memory of 2220 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 30 PID 2236 wrote to memory of 2220 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 30 PID 2236 wrote to memory of 2220 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 30 PID 2220 wrote to memory of 2040 2220 net.exe 32 PID 2220 wrote to memory of 2040 2220 net.exe 32 PID 2220 wrote to memory of 2040 2220 net.exe 32 PID 2220 wrote to memory of 2040 2220 net.exe 32 PID 2236 wrote to memory of 1612 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 33 PID 2236 wrote to memory of 1612 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 33 PID 2236 wrote to memory of 1612 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 33 PID 2236 wrote to memory of 1612 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 33 PID 2236 wrote to memory of 1252 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 34 PID 2236 wrote to memory of 1252 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 34 PID 2236 wrote to memory of 1252 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 34 PID 2236 wrote to memory of 1252 2236 86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe 34 PID 1252 wrote to memory of 1160 1252 Logo1_.exe 36 PID 1252 wrote to memory of 1160 1252 Logo1_.exe 36 PID 1252 wrote to memory of 1160 1252 Logo1_.exe 36 PID 1252 wrote to memory of 1160 1252 Logo1_.exe 36 PID 1160 wrote to memory of 2248 1160 net.exe 38 PID 1160 wrote to memory of 2248 1160 net.exe 38 PID 1160 wrote to memory of 2248 1160 net.exe 38 PID 1160 wrote to memory of 2248 1160 net.exe 38 PID 1612 wrote to memory of 2324 1612 cmd.exe 39 PID 1612 wrote to memory of 2324 1612 cmd.exe 39 PID 1612 wrote to memory of 2324 1612 cmd.exe 39 PID 1612 wrote to memory of 2324 1612 cmd.exe 39 PID 1252 wrote to memory of 1992 1252 Logo1_.exe 40 PID 1252 wrote to memory of 1992 1252 Logo1_.exe 40 PID 1252 wrote to memory of 1992 1252 Logo1_.exe 40 PID 1252 wrote to memory of 1992 1252 Logo1_.exe 40 PID 1992 wrote to memory of 2016 1992 net.exe 42 PID 1992 wrote to memory of 2016 1992 net.exe 42 PID 1992 wrote to memory of 2016 1992 net.exe 42 PID 1992 wrote to memory of 2016 1992 net.exe 42 PID 1252 wrote to memory of 1212 1252 Logo1_.exe 21 PID 1252 wrote to memory of 1212 1252 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe"C:\Users\Admin\AppData\Local\Temp\86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2040
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a5783.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe"C:\Users\Admin\AppData\Local\Temp\86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe"4⤵
- Executes dropped EXE
PID:2324
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2248
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2016
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5c9badcb684862f516b396d44b56baceb
SHA10d8eabcdc92e05177e46da3ea05ae2f41b01416c
SHA25614c73a5bd721c24ebd8109d5d9a1e7dc8802c1bef0401cdd123ab41ae381c609
SHA512543671893e74c261f12be887a10669dae034fcacad4998ae5282fe102aa4bcdcfa0776a9667f32f60fae93acdc5c2ad23f11ad330354295e9e44a67bc1dddb68
-
Filesize
478KB
MD5c8b074fbff9452f981c52acd82c24918
SHA103ffff9c1f1e8da670c6c65b2d858a9ed7eae4fa
SHA256986587b92dc97769781c303bcf1c6e13dacd413cac927afb4462389b3204d888
SHA512fc282e5789ea88095cfd50a0aa1c38d63515f70b28c52c2d68da57119f4b8f5f5ba4216a3547fe5202939d0ca3c8ad6c1cd938831c5b0bb3fc6e96b6d834bf8c
-
Filesize
722B
MD59201878c3d261bba241e5dd2302a2be8
SHA12dbcaac7c2a5b492f1151d53531eb3f8cf879c26
SHA256459c1906e00c7609f4797eb605b7bd1ddf741f573c00d548eb801ea9102f3d87
SHA51286b1d9189d66884faaa46e2e2026ecc409994d1148d7e728c9e5f3d74472f6af675f7f40c364de48e7d1058890a3689991e5f081e8c6cc11781cc2c654cf9153
-
C:\Users\Admin\AppData\Local\Temp\86c881b8328c04c0c0c38b1208ec4b4ddefc628470ae4e50b80b191e87ed5e18.exe.exe
Filesize41KB
MD5977e405c109268909fd24a94cc23d4f0
SHA1af5d032c2b6caa2164cf298e95b09060665c4188
SHA256cd24c61fe7dc3896c6c928c92a2adc58fab0a3ff61ef7ddcac1ba794182ab12f
SHA51212b4b59c1a8e65e72aa07ee4b6b6cd9fdedead01d5ce8e30f16ca26b5d733655e23a71c1d273a950a5b1a6cce810b696612de4a1148ac5f468ddf05d4549eed5
-
Filesize
33KB
MD57a091274be36971fce58dba0c887a23e
SHA11dcc358a109927e63e11775b0f38cca741f8d230
SHA256308ea0a61b9625ffc055c1709dfa413e77ef4d9e01926435215044f6e9ab8757
SHA5129497df8f2d42a38e831fc72c1c0f57f9a120afce4cf93b5b0c7f4462ee3f3fed722ad02733b6919879733fb06136e925a8ab6e62aaad63bce02b1a6fd6858607
-
Filesize
9B
MD54b2b75605a65a6762ec4715de0a70902
SHA13b85993ef06d2d814abc405188fdd19a1bffea0c
SHA25677072cc5a7b394508cf5d819ff8cf4385a9b3cb15d8715a59845ccfa235ea34e
SHA512888361e75afd4308bdad817af543704a42ffdf2d798acef619459e9978ac68f1cf4d468c6e0b146ab738b0109fdf331c4380471aa83f637b0f6ab06164840c65