Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 16:35
Static task
static1
Behavioral task
behavioral1
Sample
e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe
Resource
win7-20240221-en
General
-
Target
e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe
-
Size
82KB
-
MD5
54670c8c8de3e14fa6a7c2c88a126637
-
SHA1
28f9c1afb9e3a42aa9834066bf44a5a6665d2866
-
SHA256
e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31
-
SHA512
1c0495fd48bd49dc37ac37b58de52a2de787e7df44b4028786071638f730b805d95f19576d452b437bef69916dc42386394363f3c5564eac9aff2865d7183e6f
-
SSDEEP
1536:/BVsrz8VuJlMXaDuiNJ2zHxvuS6YGJYjilZrPMC5V:/BY8ulMXaKH6Y0ZIC5V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2816 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2824 Logo1_.exe 3000 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe -
Loads dropped DLL 1 IoCs
pid Process 2816 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\wmpenc.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\QUAD\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe File created C:\Windows\Logo1_.exe e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe 2824 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1772 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 28 PID 1968 wrote to memory of 1772 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 28 PID 1968 wrote to memory of 1772 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 28 PID 1968 wrote to memory of 1772 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 28 PID 1772 wrote to memory of 2228 1772 net.exe 30 PID 1772 wrote to memory of 2228 1772 net.exe 30 PID 1772 wrote to memory of 2228 1772 net.exe 30 PID 1772 wrote to memory of 2228 1772 net.exe 30 PID 1968 wrote to memory of 2816 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 31 PID 1968 wrote to memory of 2816 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 31 PID 1968 wrote to memory of 2816 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 31 PID 1968 wrote to memory of 2816 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 31 PID 1968 wrote to memory of 2824 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 32 PID 1968 wrote to memory of 2824 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 32 PID 1968 wrote to memory of 2824 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 32 PID 1968 wrote to memory of 2824 1968 e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe 32 PID 2824 wrote to memory of 1844 2824 Logo1_.exe 34 PID 2824 wrote to memory of 1844 2824 Logo1_.exe 34 PID 2824 wrote to memory of 1844 2824 Logo1_.exe 34 PID 2824 wrote to memory of 1844 2824 Logo1_.exe 34 PID 1844 wrote to memory of 2288 1844 net.exe 36 PID 1844 wrote to memory of 2288 1844 net.exe 36 PID 1844 wrote to memory of 2288 1844 net.exe 36 PID 1844 wrote to memory of 2288 1844 net.exe 36 PID 2816 wrote to memory of 3000 2816 cmd.exe 37 PID 2816 wrote to memory of 3000 2816 cmd.exe 37 PID 2816 wrote to memory of 3000 2816 cmd.exe 37 PID 2816 wrote to memory of 3000 2816 cmd.exe 37 PID 2824 wrote to memory of 3040 2824 Logo1_.exe 38 PID 2824 wrote to memory of 3040 2824 Logo1_.exe 38 PID 2824 wrote to memory of 3040 2824 Logo1_.exe 38 PID 2824 wrote to memory of 3040 2824 Logo1_.exe 38 PID 3040 wrote to memory of 2972 3040 net.exe 40 PID 3040 wrote to memory of 2972 3040 net.exe 40 PID 3040 wrote to memory of 2972 3040 net.exe 40 PID 3040 wrote to memory of 2972 3040 net.exe 40 PID 2824 wrote to memory of 1368 2824 Logo1_.exe 21 PID 2824 wrote to memory of 1368 2824 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe"C:\Users\Admin\AppData\Local\Temp\e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aAA34.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe"C:\Users\Admin\AppData\Local\Temp\e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe"4⤵
- Executes dropped EXE
PID:3000
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2288
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2972
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5716cf04b905e9d25d89e76dd2b521b7a
SHA14464bc7b43656fce19a801c5a77f53027b5748fa
SHA25668c254e4a94926e48dda2811138fac91afef667c3da61e3838c104fd16397f81
SHA512cbebb128990ece59a3d052e5d6edfc8bacf33d74aad72f31bd6a98a91194088a5d9a460ac8000fec4cedbe019dc6bfca38912832be0e151bcd2e1f4984b4e578
-
Filesize
478KB
MD55264aab343fc1f53c29d1065346d0010
SHA1db43bc0b28b4ada0c5635db50fd0b64410ab76ad
SHA256d33d56847b353c8207a43aa01cc75527328ebf4bba669e90e29266d1b6fb57dd
SHA512bb4ba1f7c5cae56cef564dd99f1a1fd3e2c656f8004f689a22ea641d886cbb3a19dde3dce5be4cf8cee4ce190170fd8c5390cb9c7c40ae54109559685119a958
-
Filesize
722B
MD57337ed9bce19e7c588f7885505006659
SHA141be998da653e4996627327119e28607a6d98248
SHA2568811dd8ebf274d2e18e108b0baf9bc7ce3f97a9d207846560d445867f972c14b
SHA512044919f02e843a83e0a3f6744793c3fefad1bf919c298c854851d62ace603f54dd04c330999e0631a560268b612bddfa0843e42fe0fa6aa44ae52913752537e6
-
C:\Users\Admin\AppData\Local\Temp\e115e1add4e8c6039017b9cdeab079fccb7c5a0cfe8d2cb5cdad756d1556fa31.exe.exe
Filesize48KB
MD5422a02111fabd3e229ffd105d6054f56
SHA17930d07dbc89c1113eec7cbd492daf3a025939b2
SHA2562d6bd317e34216f318ce9fb34fbc24e6260b1472930a8c0f126792f8ff821a9e
SHA512a46b5f8b6cb3cf2cb9714a0708ff63dfe4b543ab4a651f2b8ab93ce54ae77e8c7f6d67a8d9d4481957ada966f778ac6d1cceb24b1d8bbad2a6bca77b0bc9ea59
-
Filesize
33KB
MD5696135503b001f31cb4cd7844c3e430c
SHA192344ef238d4e3e40fc6e7172d91f58d81bb088a
SHA256814446fb9e1cb93b974ec91e848733bb349d66dc7cc8d9220a98eec278613c8e
SHA512b0fdf9962a73ce5307fa7283767cc3a6909a02d36ac0776550499c0a81e160917c3e4dd907fa83e617138013107e59dba116f90e3500c13e60f3f0340ebc65ee
-
Filesize
9B
MD50e9e05c07df1bfb27555d84deb706050
SHA148ebafcf728d66a097bc66ad41b73d7a757c1a0c
SHA2568f1b205bcc3039e60fbcea0063608e012fd662abb41bba5469d530e2c305174d
SHA512d88c9a9bdf6f386278ba86cf3523334eeb5e9efefa9776bc92bdffa41f0c4937e64a7b5f3821b324e13372fa662aa4fb028676f7ed0a73c989edabd490bd05f5