Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 15:32
Static task
static1
Behavioral task
behavioral1
Sample
86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe
Resource
win7-20240508-en
General
-
Target
86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe
-
Size
75KB
-
MD5
4b989924ddf40b0da23a40de83bd2b8e
-
SHA1
a0a6811bf05d38b8bce3b8f86de9574f330a124a
-
SHA256
86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d
-
SHA512
c5e030a2a1818a2db968885be31e7913162dc56df495a0a42ac1fb1b9305e846199ce8e6173c377c105bb9ffc85b00d540801385e0c134ba4d1cb2b541a1155f
-
SSDEEP
1536:/BVsrz8VuJlMXaDuiN/EToa9D4ZQKbgZi1dst7x9PxQ:/BY8ulMXaKYlZQKbgZi1St7xQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2996 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2604 Logo1_.exe 2616 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe -
Loads dropped DLL 1 IoCs
pid Process 2996 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\extensions\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe File created C:\Windows\Logo1_.exe 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1508 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 28 PID 1368 wrote to memory of 1508 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 28 PID 1368 wrote to memory of 1508 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 28 PID 1368 wrote to memory of 1508 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 28 PID 1508 wrote to memory of 1912 1508 net.exe 30 PID 1508 wrote to memory of 1912 1508 net.exe 30 PID 1508 wrote to memory of 1912 1508 net.exe 30 PID 1508 wrote to memory of 1912 1508 net.exe 30 PID 1368 wrote to memory of 2996 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 31 PID 1368 wrote to memory of 2996 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 31 PID 1368 wrote to memory of 2996 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 31 PID 1368 wrote to memory of 2996 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 31 PID 1368 wrote to memory of 2604 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 33 PID 1368 wrote to memory of 2604 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 33 PID 1368 wrote to memory of 2604 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 33 PID 1368 wrote to memory of 2604 1368 86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe 33 PID 2604 wrote to memory of 2816 2604 Logo1_.exe 34 PID 2604 wrote to memory of 2816 2604 Logo1_.exe 34 PID 2604 wrote to memory of 2816 2604 Logo1_.exe 34 PID 2604 wrote to memory of 2816 2604 Logo1_.exe 34 PID 2816 wrote to memory of 2620 2816 net.exe 36 PID 2816 wrote to memory of 2620 2816 net.exe 36 PID 2816 wrote to memory of 2620 2816 net.exe 36 PID 2816 wrote to memory of 2620 2816 net.exe 36 PID 2996 wrote to memory of 2616 2996 cmd.exe 37 PID 2996 wrote to memory of 2616 2996 cmd.exe 37 PID 2996 wrote to memory of 2616 2996 cmd.exe 37 PID 2996 wrote to memory of 2616 2996 cmd.exe 37 PID 2604 wrote to memory of 3032 2604 Logo1_.exe 38 PID 2604 wrote to memory of 3032 2604 Logo1_.exe 38 PID 2604 wrote to memory of 3032 2604 Logo1_.exe 38 PID 2604 wrote to memory of 3032 2604 Logo1_.exe 38 PID 3032 wrote to memory of 2648 3032 net.exe 40 PID 3032 wrote to memory of 2648 3032 net.exe 40 PID 3032 wrote to memory of 2648 3032 net.exe 40 PID 3032 wrote to memory of 2648 3032 net.exe 40 PID 2604 wrote to memory of 1224 2604 Logo1_.exe 21 PID 2604 wrote to memory of 1224 2604 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe"C:\Users\Admin\AppData\Local\Temp\86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1912
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a35EF.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe"C:\Users\Admin\AppData\Local\Temp\86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe"4⤵
- Executes dropped EXE
PID:2616
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2620
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2648
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5716cf04b905e9d25d89e76dd2b521b7a
SHA14464bc7b43656fce19a801c5a77f53027b5748fa
SHA25668c254e4a94926e48dda2811138fac91afef667c3da61e3838c104fd16397f81
SHA512cbebb128990ece59a3d052e5d6edfc8bacf33d74aad72f31bd6a98a91194088a5d9a460ac8000fec4cedbe019dc6bfca38912832be0e151bcd2e1f4984b4e578
-
Filesize
478KB
MD55264aab343fc1f53c29d1065346d0010
SHA1db43bc0b28b4ada0c5635db50fd0b64410ab76ad
SHA256d33d56847b353c8207a43aa01cc75527328ebf4bba669e90e29266d1b6fb57dd
SHA512bb4ba1f7c5cae56cef564dd99f1a1fd3e2c656f8004f689a22ea641d886cbb3a19dde3dce5be4cf8cee4ce190170fd8c5390cb9c7c40ae54109559685119a958
-
Filesize
722B
MD5a6b72342419fffe530c8ab9592000303
SHA1b890a21a253b41ba882cd59b39d7dccb9bbe19d7
SHA256dfb9757db72efd210f87404cda54b730d908ed3e524d24cc458ce2b0c1b537ab
SHA512e5f3c1f3452df7bf9997aaaed964dbfa663f8167bc0f03179337907548a791893d7654dcd04e9474b933c2023c99bf5d527b374e78546280a2301dc750d95557
-
C:\Users\Admin\AppData\Local\Temp\86ebdd99de03c4329fb377700a143e431063593235a5988bbd8d3010eefa059d.exe.exe
Filesize41KB
MD5977e405c109268909fd24a94cc23d4f0
SHA1af5d032c2b6caa2164cf298e95b09060665c4188
SHA256cd24c61fe7dc3896c6c928c92a2adc58fab0a3ff61ef7ddcac1ba794182ab12f
SHA51212b4b59c1a8e65e72aa07ee4b6b6cd9fdedead01d5ce8e30f16ca26b5d733655e23a71c1d273a950a5b1a6cce810b696612de4a1148ac5f468ddf05d4549eed5
-
Filesize
33KB
MD5696135503b001f31cb4cd7844c3e430c
SHA192344ef238d4e3e40fc6e7172d91f58d81bb088a
SHA256814446fb9e1cb93b974ec91e848733bb349d66dc7cc8d9220a98eec278613c8e
SHA512b0fdf9962a73ce5307fa7283767cc3a6909a02d36ac0776550499c0a81e160917c3e4dd907fa83e617138013107e59dba116f90e3500c13e60f3f0340ebc65ee
-
Filesize
9B
MD50e9e05c07df1bfb27555d84deb706050
SHA148ebafcf728d66a097bc66ad41b73d7a757c1a0c
SHA2568f1b205bcc3039e60fbcea0063608e012fd662abb41bba5469d530e2c305174d
SHA512d88c9a9bdf6f386278ba86cf3523334eeb5e9efefa9776bc92bdffa41f0c4937e64a7b5f3821b324e13372fa662aa4fb028676f7ed0a73c989edabd490bd05f5