Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe
Resource
win7-20240221-en
General
-
Target
26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe
-
Size
400KB
-
MD5
744bc1b9a04f5a72e7f26638ac5740bb
-
SHA1
1858151a3d1365a06f3ef71fd8320ab9d2d6c875
-
SHA256
26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6
-
SHA512
40c2a9ac8bb6fe0045f8642d2f56a9f5a2ee53a3d562c3b2b9be0e1938a52d0cc22e35e1f6bd199b170118c288ee05578f2d300600558e5007e893f99efc612d
-
SSDEEP
6144:k/KW+aezsP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYFk:HW+aQahVy41
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2536 Logo1_.exe 2500 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe -
Loads dropped DLL 1 IoCs
pid Process 2616 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe File created C:\Windows\Logo1_.exe 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2956 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 28 PID 2120 wrote to memory of 2956 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 28 PID 2120 wrote to memory of 2956 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 28 PID 2120 wrote to memory of 2956 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 28 PID 2956 wrote to memory of 2556 2956 net.exe 30 PID 2956 wrote to memory of 2556 2956 net.exe 30 PID 2956 wrote to memory of 2556 2956 net.exe 30 PID 2956 wrote to memory of 2556 2956 net.exe 30 PID 2120 wrote to memory of 2616 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 31 PID 2120 wrote to memory of 2616 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 31 PID 2120 wrote to memory of 2616 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 31 PID 2120 wrote to memory of 2616 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 31 PID 2120 wrote to memory of 2536 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 33 PID 2120 wrote to memory of 2536 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 33 PID 2120 wrote to memory of 2536 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 33 PID 2120 wrote to memory of 2536 2120 26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe 33 PID 2536 wrote to memory of 2608 2536 Logo1_.exe 34 PID 2536 wrote to memory of 2608 2536 Logo1_.exe 34 PID 2536 wrote to memory of 2608 2536 Logo1_.exe 34 PID 2536 wrote to memory of 2608 2536 Logo1_.exe 34 PID 2616 wrote to memory of 2500 2616 cmd.exe 36 PID 2616 wrote to memory of 2500 2616 cmd.exe 36 PID 2616 wrote to memory of 2500 2616 cmd.exe 36 PID 2616 wrote to memory of 2500 2616 cmd.exe 36 PID 2608 wrote to memory of 2988 2608 net.exe 37 PID 2608 wrote to memory of 2988 2608 net.exe 37 PID 2608 wrote to memory of 2988 2608 net.exe 37 PID 2608 wrote to memory of 2988 2608 net.exe 37 PID 2536 wrote to memory of 2580 2536 Logo1_.exe 38 PID 2536 wrote to memory of 2580 2536 Logo1_.exe 38 PID 2536 wrote to memory of 2580 2536 Logo1_.exe 38 PID 2536 wrote to memory of 2580 2536 Logo1_.exe 38 PID 2580 wrote to memory of 2416 2580 net.exe 40 PID 2580 wrote to memory of 2416 2580 net.exe 40 PID 2580 wrote to memory of 2416 2580 net.exe 40 PID 2580 wrote to memory of 2416 2580 net.exe 40 PID 2536 wrote to memory of 1392 2536 Logo1_.exe 21 PID 2536 wrote to memory of 1392 2536 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe"C:\Users\Admin\AppData\Local\Temp\26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a732D.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe"C:\Users\Admin\AppData\Local\Temp\26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe"4⤵
- Executes dropped EXE
PID:2500
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2988
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2416
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD59dedb1a7eef99feed2af3fb8c73297b0
SHA1fa03da28428dcfb50fce06b34745dbd9f1c31143
SHA2561def99dc66bb41bb916f73bb75499d0a72900e77c0a62c85c475526384b89cd4
SHA512b1994704303dc932cf601bf0bb4ffca7e49f317dc1f9194c79262aadb1ecc35ff9ce40518f4064a97d7893c0418216cc4ede0b4bf6c40e6891f12d5bf49d01d3
-
Filesize
484KB
MD5edc9d968c214a944e019fad26d1a18a5
SHA128dacfbfe9840c27f5af05343af82338786b1f36
SHA256b0f8dc8ea8e999b6c25e460e2f644f2ed41b2e481f57f5800de9c0c93c9ef275
SHA512f381ea38921a0163ced1feb11a9748010b2bf76f8eaf66ae326e98eb5d5ff75bc4b4342b4d3acf27a5177393c5b05cf43bb007ceb1d7799498e8429c8efb86a7
-
Filesize
722B
MD56207123ed4a49ac36861ff0cc4e1d6fb
SHA189029b492b0488c5553944b60dd8dccb3dce6154
SHA2565afb7ceea24059cafa8dc58b37d67155009a7e0b966aa29ce8b0113af5007040
SHA51207a9c6cb350db1d3b438ed0badb47539b70e2379ff3b332a17953ec8e4d890dd383dd53967fbed847d3cc829504fc4f697f1184be26685e3226a0b594103a7b7
-
C:\Users\Admin\AppData\Local\Temp\26e27eb7b21105bd43a9c76e1855c9957b48fda96b9f1803cdc2a80643870df6.exe.exe
Filesize360KB
MD55fbd45261a2de3bb42f489e825a9a935
SHA1ff388f6e9efe651ec62c4152c1739783e7899293
SHA2569e63701598199d5c47217e23b44d0e3ec5d53f5419166b1b6c68a7e9e8fc47a4
SHA5127f22b1995a07016adb342c551454d602bfbe511525139aee8581b62116608e9e278fd81c26382f1333c7eccded4474196e73c093bb5cbf8e8f203e865024c058
-
Filesize
39KB
MD5a526b8c1dae7728e93d5ba5eeae7b353
SHA1bb0c23e0b0a3cfa0ae52854c14e0adce7c439a33
SHA25657253ef09f37588bafc2dd017b0ad6f27f5d6a6b526d5ca90bae19f25fcfe616
SHA5124577203ad19ef23357f96091f8d621db5fb42ad4f6f2fdce68f3ec51fea248fbc38deb5d13865097d2c7cbca1db8ae9f18a42b6aac1fedc81a479d2ebbf20926
-
Filesize
8B
MD5af485d3db9f82d3e5bdc8c6d87fb742e
SHA1f879c3dbd3d34e9789ff73896508bfbeabbf7468
SHA2567a7b688ede50bbaf08d4579fbd8c6b6c99d9dd1206d95ab24d8174eb9be98759
SHA512d5fe5155948320ef6d3f80c01c9a81f0d4f60bab381d921ab2e06b62475618b973b34346bd41b40af24f2b5aff64bba68710f405f7ff21a58f369acbaaee9360