Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe
Resource
win7-20240508-en
General
-
Target
5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe
-
Size
375KB
-
MD5
11dd82b7f6129f2aa9446357b7e047fd
-
SHA1
fa43087090284f896f618e1679cd66d9028c6711
-
SHA256
5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60
-
SHA512
c3d9abf31c3cd3fbbcef5db2699e811798b930a2a073e042c00ae542c9c133789d4c2957076c5650432faffbc80b6d181725824c029a6f9391b0f1734b19c567
-
SSDEEP
6144:k/KW+aezZzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:HW+aQU66b5zhVymA/XSRh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2364 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2704 Logo1_.exe 2188 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe -
Loads dropped DLL 1 IoCs
pid Process 2364 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1042\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SUMIPNTG\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENFR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7z.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe File created C:\Windows\Logo1_.exe 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2180 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 28 PID 2204 wrote to memory of 2180 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 28 PID 2204 wrote to memory of 2180 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 28 PID 2204 wrote to memory of 2180 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 28 PID 2180 wrote to memory of 2360 2180 net.exe 30 PID 2180 wrote to memory of 2360 2180 net.exe 30 PID 2180 wrote to memory of 2360 2180 net.exe 30 PID 2180 wrote to memory of 2360 2180 net.exe 30 PID 2204 wrote to memory of 2364 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 31 PID 2204 wrote to memory of 2364 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 31 PID 2204 wrote to memory of 2364 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 31 PID 2204 wrote to memory of 2364 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 31 PID 2204 wrote to memory of 2704 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 33 PID 2204 wrote to memory of 2704 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 33 PID 2204 wrote to memory of 2704 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 33 PID 2204 wrote to memory of 2704 2204 5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe 33 PID 2704 wrote to memory of 2716 2704 Logo1_.exe 34 PID 2704 wrote to memory of 2716 2704 Logo1_.exe 34 PID 2704 wrote to memory of 2716 2704 Logo1_.exe 34 PID 2704 wrote to memory of 2716 2704 Logo1_.exe 34 PID 2716 wrote to memory of 2864 2716 net.exe 36 PID 2716 wrote to memory of 2864 2716 net.exe 36 PID 2716 wrote to memory of 2864 2716 net.exe 36 PID 2716 wrote to memory of 2864 2716 net.exe 36 PID 2364 wrote to memory of 2188 2364 cmd.exe 37 PID 2364 wrote to memory of 2188 2364 cmd.exe 37 PID 2364 wrote to memory of 2188 2364 cmd.exe 37 PID 2364 wrote to memory of 2188 2364 cmd.exe 37 PID 2704 wrote to memory of 2720 2704 Logo1_.exe 38 PID 2704 wrote to memory of 2720 2704 Logo1_.exe 38 PID 2704 wrote to memory of 2720 2704 Logo1_.exe 38 PID 2704 wrote to memory of 2720 2704 Logo1_.exe 38 PID 2720 wrote to memory of 2580 2720 net.exe 40 PID 2720 wrote to memory of 2580 2720 net.exe 40 PID 2720 wrote to memory of 2580 2720 net.exe 40 PID 2720 wrote to memory of 2580 2720 net.exe 40 PID 2704 wrote to memory of 1224 2704 Logo1_.exe 21 PID 2704 wrote to memory of 1224 2704 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe"C:\Users\Admin\AppData\Local\Temp\5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2360
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1D7F.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe"C:\Users\Admin\AppData\Local\Temp\5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe"4⤵
- Executes dropped EXE
PID:2188
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2864
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2580
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD59dedb1a7eef99feed2af3fb8c73297b0
SHA1fa03da28428dcfb50fce06b34745dbd9f1c31143
SHA2561def99dc66bb41bb916f73bb75499d0a72900e77c0a62c85c475526384b89cd4
SHA512b1994704303dc932cf601bf0bb4ffca7e49f317dc1f9194c79262aadb1ecc35ff9ce40518f4064a97d7893c0418216cc4ede0b4bf6c40e6891f12d5bf49d01d3
-
Filesize
484KB
MD5edc9d968c214a944e019fad26d1a18a5
SHA128dacfbfe9840c27f5af05343af82338786b1f36
SHA256b0f8dc8ea8e999b6c25e460e2f644f2ed41b2e481f57f5800de9c0c93c9ef275
SHA512f381ea38921a0163ced1feb11a9748010b2bf76f8eaf66ae326e98eb5d5ff75bc4b4342b4d3acf27a5177393c5b05cf43bb007ceb1d7799498e8429c8efb86a7
-
Filesize
722B
MD51d2e6bd6393b63bf02b9e150a2dd8a1f
SHA11bb64ca45276212af0076f8a579aff9e74c1ef2f
SHA2569d24243baebe5cbb2f65085e5d636be7e2e05f3967b3dca346377a37e76064a5
SHA5129387f783baade885e6ae5230b682dd14d2d3b0ff5c9921a8e1c23136efc268c300d98d34e2c78b1632927aba9525b893d1d1ae42a365c56b83d0db7387950221
-
C:\Users\Admin\AppData\Local\Temp\5fd56261aab360ecd985cc23973185fd9026a80a46893cfcb8cc9ec8b2356c60.exe.exe
Filesize335KB
MD540ac62c087648ccc2c58dae066d34c98
SHA10e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA5120c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f
-
Filesize
39KB
MD5a526b8c1dae7728e93d5ba5eeae7b353
SHA1bb0c23e0b0a3cfa0ae52854c14e0adce7c439a33
SHA25657253ef09f37588bafc2dd017b0ad6f27f5d6a6b526d5ca90bae19f25fcfe616
SHA5124577203ad19ef23357f96091f8d621db5fb42ad4f6f2fdce68f3ec51fea248fbc38deb5d13865097d2c7cbca1db8ae9f18a42b6aac1fedc81a479d2ebbf20926
-
Filesize
8B
MD5af485d3db9f82d3e5bdc8c6d87fb742e
SHA1f879c3dbd3d34e9789ff73896508bfbeabbf7468
SHA2567a7b688ede50bbaf08d4579fbd8c6b6c99d9dd1206d95ab24d8174eb9be98759
SHA512d5fe5155948320ef6d3f80c01c9a81f0d4f60bab381d921ab2e06b62475618b973b34346bd41b40af24f2b5aff64bba68710f405f7ff21a58f369acbaaee9360