Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe
Resource
win7-20240221-en
General
-
Target
9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe
-
Size
491KB
-
MD5
cb599a4bede85c3b47c6bdf14ff4987a
-
SHA1
d11ee7d1eba1b96efdb695989f891475db0d2f20
-
SHA256
9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55
-
SHA512
fc935711757230840596a6b7faaccd55734f2951ad5b0707bb88399ca418f624dfd912cd26325d722ecd6c2e90d1e29e1c2c20a019e9cee171414a136b6f144b
-
SSDEEP
6144:k1NM5pOz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fay7:k1upI1gL5pRTcAkS/3hzN8qE43fm78V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2864 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2552 Logo1_.exe 2972 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe -
Loads dropped DLL 1 IoCs
pid Process 2864 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Australia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\az\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe File created C:\Windows\Logo1_.exe 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3000 wrote to memory of 1668 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 28 PID 3000 wrote to memory of 1668 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 28 PID 3000 wrote to memory of 1668 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 28 PID 3000 wrote to memory of 1668 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 28 PID 1668 wrote to memory of 2528 1668 net.exe 30 PID 1668 wrote to memory of 2528 1668 net.exe 30 PID 1668 wrote to memory of 2528 1668 net.exe 30 PID 1668 wrote to memory of 2528 1668 net.exe 30 PID 3000 wrote to memory of 2864 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 31 PID 3000 wrote to memory of 2864 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 31 PID 3000 wrote to memory of 2864 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 31 PID 3000 wrote to memory of 2864 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 31 PID 3000 wrote to memory of 2552 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 33 PID 3000 wrote to memory of 2552 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 33 PID 3000 wrote to memory of 2552 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 33 PID 3000 wrote to memory of 2552 3000 9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe 33 PID 2552 wrote to memory of 2456 2552 Logo1_.exe 34 PID 2552 wrote to memory of 2456 2552 Logo1_.exe 34 PID 2552 wrote to memory of 2456 2552 Logo1_.exe 34 PID 2552 wrote to memory of 2456 2552 Logo1_.exe 34 PID 2864 wrote to memory of 2972 2864 cmd.exe 36 PID 2864 wrote to memory of 2972 2864 cmd.exe 36 PID 2864 wrote to memory of 2972 2864 cmd.exe 36 PID 2864 wrote to memory of 2972 2864 cmd.exe 36 PID 2456 wrote to memory of 2584 2456 net.exe 37 PID 2456 wrote to memory of 2584 2456 net.exe 37 PID 2456 wrote to memory of 2584 2456 net.exe 37 PID 2456 wrote to memory of 2584 2456 net.exe 37 PID 2552 wrote to memory of 2476 2552 Logo1_.exe 38 PID 2552 wrote to memory of 2476 2552 Logo1_.exe 38 PID 2552 wrote to memory of 2476 2552 Logo1_.exe 38 PID 2552 wrote to memory of 2476 2552 Logo1_.exe 38 PID 2476 wrote to memory of 2436 2476 net.exe 40 PID 2476 wrote to memory of 2436 2476 net.exe 40 PID 2476 wrote to memory of 2436 2476 net.exe 40 PID 2476 wrote to memory of 2436 2476 net.exe 40 PID 2552 wrote to memory of 1200 2552 Logo1_.exe 21 PID 2552 wrote to memory of 1200 2552 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe"C:\Users\Admin\AppData\Local\Temp\9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a84F8.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe"C:\Users\Admin\AppData\Local\Temp\9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe"4⤵
- Executes dropped EXE
PID:2972
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2584
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2436
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5c1311e35ea05def263f404a5d7b73260
SHA1952954211d07edfb16b371cf104aa332731011b7
SHA256c502724428c14d7c1079512448dd16a7495a543483d0b818d4d6b67add762748
SHA5125606f9ef7170a427dbd217e79bf36dff7c9f13b3799c73221940ba8412cb6e436e30ee88bc8aefbdb6428dec24e03d503a68d67d8f03bb8bcb027563e87070ed
-
Filesize
478KB
MD5c8b074fbff9452f981c52acd82c24918
SHA103ffff9c1f1e8da670c6c65b2d858a9ed7eae4fa
SHA256986587b92dc97769781c303bcf1c6e13dacd413cac927afb4462389b3204d888
SHA512fc282e5789ea88095cfd50a0aa1c38d63515f70b28c52c2d68da57119f4b8f5f5ba4216a3547fe5202939d0ca3c8ad6c1cd938831c5b0bb3fc6e96b6d834bf8c
-
Filesize
722B
MD5263d8fe1f3061bc3412450ae1d6c330e
SHA1df46dbfe0d7a925190f08343bc0fc34230d0ec07
SHA2569765de223cce9361b5188ecc480dd46bad8003fb4fbff0e53a2f53a11851f785
SHA512f0078cec4262db529471230449b135796d4cb02de30b6ac26a971191280a1c6293437b629247f9ce6d4e2ef92211a9bbd32ad3afa17b46d17957e2d75341744f
-
Filesize
33KB
MD5a0c02032a40d35cd333d9e5c309519d2
SHA1010b30527b26c9264fab15a3941e2f692b014bbf
SHA2560f552e28158600bb566846945865b84540a6e4ddd0a4da4cf9effd58c85c3724
SHA512dd414f5e166e2b53738d868af9bf580bae8efb2aa1dfa0702fc22172e3402bbc5dd6b92c25d33c9a456b56c54215cb784fba38bf65c2f43acce7044abc6167a7
-
Filesize
8B
MD5a6f28952c332969f9e6d9f7d1a449737
SHA131c0826adb63cc03162fb9e88781f4b50da8f11b
SHA256d9d875805581110dafdfb2ceb34c5e60f50fe720963f9813c287e4845248d208
SHA5128187572ee8fbb9a42af34a3444be3a4309c5a798e7b1f27fce5b28b7168b72d015b1c10e611ccd3a9361af2aaeab831d2734017f77adff341c3fdb876c296eac
-
\Users\Admin\AppData\Local\Temp\9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55.exe
Filesize458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628