Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe
Resource
win7-20240221-en
General
-
Target
1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe
-
Size
92KB
-
MD5
0d5e3dcf180d8839c227f3823c3e5dd8
-
SHA1
94270624c73dff91abf8e13d36af865bf9c6ba8d
-
SHA256
1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2
-
SHA512
8ea81e54a2a697597d99e94fa0410ee7df1038697fbdaa2b7471580955e6245d5e0f68b9846a3c4541e0f41dd94afcf6cbd9c437904562c2862b46eeeac8e357
-
SSDEEP
1536:6Hcx1aeg1v9OQZVUKM6+kKpdyapmebn4ddJZeY86iLflLJYEIs67rxo:6Hf9lOzKM5pMLK4ddJMY86ipmns6S
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2536 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2648 Logo1_.exe 2620 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe -
Loads dropped DLL 1 IoCs
pid Process 2536 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe File created C:\Windows\Logo1_.exe 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe 2648 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2488 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 28 PID 2336 wrote to memory of 2488 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 28 PID 2336 wrote to memory of 2488 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 28 PID 2336 wrote to memory of 2488 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 28 PID 2488 wrote to memory of 2688 2488 net.exe 30 PID 2488 wrote to memory of 2688 2488 net.exe 30 PID 2488 wrote to memory of 2688 2488 net.exe 30 PID 2488 wrote to memory of 2688 2488 net.exe 30 PID 2336 wrote to memory of 2536 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 31 PID 2336 wrote to memory of 2536 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 31 PID 2336 wrote to memory of 2536 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 31 PID 2336 wrote to memory of 2536 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 31 PID 2336 wrote to memory of 2648 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 33 PID 2336 wrote to memory of 2648 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 33 PID 2336 wrote to memory of 2648 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 33 PID 2336 wrote to memory of 2648 2336 1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe 33 PID 2648 wrote to memory of 2416 2648 Logo1_.exe 34 PID 2648 wrote to memory of 2416 2648 Logo1_.exe 34 PID 2648 wrote to memory of 2416 2648 Logo1_.exe 34 PID 2648 wrote to memory of 2416 2648 Logo1_.exe 34 PID 2536 wrote to memory of 2620 2536 cmd.exe 36 PID 2536 wrote to memory of 2620 2536 cmd.exe 36 PID 2536 wrote to memory of 2620 2536 cmd.exe 36 PID 2536 wrote to memory of 2620 2536 cmd.exe 36 PID 2416 wrote to memory of 2552 2416 net.exe 37 PID 2416 wrote to memory of 2552 2416 net.exe 37 PID 2416 wrote to memory of 2552 2416 net.exe 37 PID 2416 wrote to memory of 2552 2416 net.exe 37 PID 2648 wrote to memory of 2572 2648 Logo1_.exe 38 PID 2648 wrote to memory of 2572 2648 Logo1_.exe 38 PID 2648 wrote to memory of 2572 2648 Logo1_.exe 38 PID 2648 wrote to memory of 2572 2648 Logo1_.exe 38 PID 2572 wrote to memory of 2412 2572 net.exe 40 PID 2572 wrote to memory of 2412 2572 net.exe 40 PID 2572 wrote to memory of 2412 2572 net.exe 40 PID 2572 wrote to memory of 2412 2572 net.exe 40 PID 2648 wrote to memory of 1176 2648 Logo1_.exe 21 PID 2648 wrote to memory of 1176 2648 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe"C:\Users\Admin\AppData\Local\Temp\1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2378.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe"C:\Users\Admin\AppData\Local\Temp\1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe"4⤵
- Executes dropped EXE
PID:2620
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2552
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2412
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5c9badcb684862f516b396d44b56baceb
SHA10d8eabcdc92e05177e46da3ea05ae2f41b01416c
SHA25614c73a5bd721c24ebd8109d5d9a1e7dc8802c1bef0401cdd123ab41ae381c609
SHA512543671893e74c261f12be887a10669dae034fcacad4998ae5282fe102aa4bcdcfa0776a9667f32f60fae93acdc5c2ad23f11ad330354295e9e44a67bc1dddb68
-
Filesize
478KB
MD5c8b074fbff9452f981c52acd82c24918
SHA103ffff9c1f1e8da670c6c65b2d858a9ed7eae4fa
SHA256986587b92dc97769781c303bcf1c6e13dacd413cac927afb4462389b3204d888
SHA512fc282e5789ea88095cfd50a0aa1c38d63515f70b28c52c2d68da57119f4b8f5f5ba4216a3547fe5202939d0ca3c8ad6c1cd938831c5b0bb3fc6e96b6d834bf8c
-
Filesize
722B
MD54226462bf8ed258a1c092b91f2d544bd
SHA124636061d5aa031513cca2e1d50bf81cfaa550ba
SHA256fe1b3027ba5576647b9234210e112c6e21ec86ea2cf3629371839a5194d2182a
SHA51205e3192a07f076807a0f1b7f2ef24da91f3d37395fb133e32e3e4c44905ff51a3adde8d063aa168549482fee060936ff4eb223fdb90cf85600e8917414f9cb0c
-
C:\Users\Admin\AppData\Local\Temp\1c7d8b58c9bb761043fedde862f002afb7004fd94a8ee991f22edb97353f79f2.exe.exe
Filesize59KB
MD5dfc18f7068913dde25742b856788d7ca
SHA1cbaa23f782c2ddcd7c9ff024fd0b096952a2b387
SHA256ff4ac75c02247000da084de006c214d3dd3583867bd3533ba788e22734c7a2bf
SHA512d0c7ec1dae41a803325b51c12490c355ed779d297daa35247889950491e52427810132f0829fc7ffa3022f1a106f4e4ba78ed612223395313a6f267e9ab24945
-
Filesize
33KB
MD57a091274be36971fce58dba0c887a23e
SHA11dcc358a109927e63e11775b0f38cca741f8d230
SHA256308ea0a61b9625ffc055c1709dfa413e77ef4d9e01926435215044f6e9ab8757
SHA5129497df8f2d42a38e831fc72c1c0f57f9a120afce4cf93b5b0c7f4462ee3f3fed722ad02733b6919879733fb06136e925a8ab6e62aaad63bce02b1a6fd6858607
-
Filesize
9B
MD54b2b75605a65a6762ec4715de0a70902
SHA13b85993ef06d2d814abc405188fdd19a1bffea0c
SHA25677072cc5a7b394508cf5d819ff8cf4385a9b3cb15d8715a59845ccfa235ea34e
SHA512888361e75afd4308bdad817af543704a42ffdf2d798acef619459e9978ac68f1cf4d468c6e0b146ab738b0109fdf331c4380471aa83f637b0f6ab06164840c65