Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe
Resource
win7-20240508-en
General
-
Target
d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe
-
Size
368KB
-
MD5
994328b11a007d758b8847fb02b81468
-
SHA1
b33b8d95fae04e70693a0294571cc708d15e06f8
-
SHA256
d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d
-
SHA512
0423bc3ee4a302364b3e83921e89e0f56199ada840b9cd5a422865a2880f32848ee99d8e080d42b777c866b867204356ed9212b34f7ff60be860e506dee4ce0a
-
SSDEEP
6144:M1mzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:M1uU66b5zhVymA/XSRh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2016 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2152 Logo1_.exe 1272 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe -
Loads dropped DLL 1 IoCs
pid Process 2016 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Analysis Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca@valencia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sw\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe 2152 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1228 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 28 PID 2248 wrote to memory of 1228 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 28 PID 2248 wrote to memory of 1228 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 28 PID 2248 wrote to memory of 1228 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 28 PID 1228 wrote to memory of 2200 1228 net.exe 30 PID 1228 wrote to memory of 2200 1228 net.exe 30 PID 1228 wrote to memory of 2200 1228 net.exe 30 PID 1228 wrote to memory of 2200 1228 net.exe 30 PID 2248 wrote to memory of 2016 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 31 PID 2248 wrote to memory of 2016 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 31 PID 2248 wrote to memory of 2016 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 31 PID 2248 wrote to memory of 2016 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 31 PID 2248 wrote to memory of 2152 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 33 PID 2248 wrote to memory of 2152 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 33 PID 2248 wrote to memory of 2152 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 33 PID 2248 wrote to memory of 2152 2248 d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe 33 PID 2152 wrote to memory of 2352 2152 Logo1_.exe 34 PID 2152 wrote to memory of 2352 2152 Logo1_.exe 34 PID 2152 wrote to memory of 2352 2152 Logo1_.exe 34 PID 2152 wrote to memory of 2352 2152 Logo1_.exe 34 PID 2016 wrote to memory of 1272 2016 cmd.exe 36 PID 2016 wrote to memory of 1272 2016 cmd.exe 36 PID 2016 wrote to memory of 1272 2016 cmd.exe 36 PID 2016 wrote to memory of 1272 2016 cmd.exe 36 PID 2352 wrote to memory of 2660 2352 net.exe 37 PID 2352 wrote to memory of 2660 2352 net.exe 37 PID 2352 wrote to memory of 2660 2352 net.exe 37 PID 2352 wrote to memory of 2660 2352 net.exe 37 PID 2152 wrote to memory of 2940 2152 Logo1_.exe 38 PID 2152 wrote to memory of 2940 2152 Logo1_.exe 38 PID 2152 wrote to memory of 2940 2152 Logo1_.exe 38 PID 2152 wrote to memory of 2940 2152 Logo1_.exe 38 PID 2940 wrote to memory of 2628 2940 net.exe 40 PID 2940 wrote to memory of 2628 2940 net.exe 40 PID 2940 wrote to memory of 2628 2940 net.exe 40 PID 2940 wrote to memory of 2628 2940 net.exe 40 PID 2152 wrote to memory of 1204 2152 Logo1_.exe 21 PID 2152 wrote to memory of 1204 2152 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe"C:\Users\Admin\AppData\Local\Temp\d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2200
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1BBB.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe"C:\Users\Admin\AppData\Local\Temp\d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe"4⤵
- Executes dropped EXE
PID:1272
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2660
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2628
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD570869c207f3a67470417ed76a8cc4735
SHA1e9e84c30b2cca82e93d507eeace7b33eac862a61
SHA2560de9fa997f757c78ba0675e7ba54c1e7b1a39c88cebded15b2a0ede357679428
SHA512193067577ab3f4c7a7798d61b1c0d4a40ef6fabfa4ebf28709d7f226327e9f3f329ed635f83baf5b90eaeabc45df3ae68a7fa247ff0d123df3dd06eee369cfdc
-
Filesize
722B
MD5d28fb8f9f61399d47c4516bc829cfeee
SHA12fa94646f600afb13bff7ae6027b192d23b40ac3
SHA256fa3bac04b68f36242ad422b995088a6c67adf169a326b3ec2824846a27258587
SHA5120ea47bc66b53864f092e39e2d7fc702ca3281e8dd76d0e72e74870253d0377f5a378e4c1390e785ba2d88f80fc1e97720c436247cc4545312236bd58712e2c61
-
C:\Users\Admin\AppData\Local\Temp\d1c7ed57191524d4625024b6fc0eb7ebbcabbc1602f54538cf3cd8ce54918c1d.exe.exe
Filesize335KB
MD540ac62c087648ccc2c58dae066d34c98
SHA10e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA5120c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f
-
Filesize
33KB
MD5726937f6d8546adf90a8ccc396c9568b
SHA1562a243cad15148d094b1a79493cceecbc0358b7
SHA25632ff9d1250cf6ed2d3bdbe31c9c733f2dca643ecc4fe816d83aa33c6736b4ee4
SHA512d0864bc167728f211c9add8c35824301b630f8e682213b5c02fdb0333416551604b92d7120b4ce4b6028497893ed155c719adaff769f0d2b17d44a32c3be4b81
-
Filesize
9B
MD5588b2065b2adfd8dfd688104d02aad5a
SHA1263f0ca294d728a13f51220aea8123aa257cc6e2
SHA256f9ab49edf14c6bda17287f7caa63d3b3bb20a65215f1462cf05577a5c1c472e6
SHA51299106035ac4547c81fd737f5f79ddd32ea10fde9e3ea97102472c871aa9f94ee3f68823bcc4bb308e92265a9c3cacd4b1f5c9f52f8d3e630cdf6bdcd3c737e2d