Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe
Resource
win7-20240508-en
General
-
Target
77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe
-
Size
163KB
-
MD5
314b06fbe3a39e2a4740038f8c2579d7
-
SHA1
92a2499a964d50156d9fe6f94994acf235f7ac52
-
SHA256
77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f
-
SHA512
4e458c3e52eb13668f89ab0089d83e2fa877e40cde6bf089aa2a9a2421e28f7d54a800a613e5e34ebcfcdd23b4ad1d4c07c5231b03661f38b7abe97cf370339d
-
SSDEEP
3072:6yf9lOzKM5pZQekqnwLD9m0WjfuRRfEdj4E3f90bC:V1NM5pZQek9if1Vv+W
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2072 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2836 Logo1_.exe 2660 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe -
Loads dropped DLL 1 IoCs
pid Process 2072 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\deploy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\DESIGNER\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or_IN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe File created C:\Windows\Logo1_.exe 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe 2836 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2012 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 28 PID 1740 wrote to memory of 2012 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 28 PID 1740 wrote to memory of 2012 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 28 PID 1740 wrote to memory of 2012 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 28 PID 2012 wrote to memory of 2896 2012 net.exe 30 PID 2012 wrote to memory of 2896 2012 net.exe 30 PID 2012 wrote to memory of 2896 2012 net.exe 30 PID 2012 wrote to memory of 2896 2012 net.exe 30 PID 1740 wrote to memory of 2072 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 31 PID 1740 wrote to memory of 2072 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 31 PID 1740 wrote to memory of 2072 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 31 PID 1740 wrote to memory of 2072 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 31 PID 1740 wrote to memory of 2836 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 33 PID 1740 wrote to memory of 2836 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 33 PID 1740 wrote to memory of 2836 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 33 PID 1740 wrote to memory of 2836 1740 77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe 33 PID 2836 wrote to memory of 2852 2836 Logo1_.exe 34 PID 2836 wrote to memory of 2852 2836 Logo1_.exe 34 PID 2836 wrote to memory of 2852 2836 Logo1_.exe 34 PID 2836 wrote to memory of 2852 2836 Logo1_.exe 34 PID 2852 wrote to memory of 2744 2852 net.exe 36 PID 2852 wrote to memory of 2744 2852 net.exe 36 PID 2852 wrote to memory of 2744 2852 net.exe 36 PID 2852 wrote to memory of 2744 2852 net.exe 36 PID 2072 wrote to memory of 2660 2072 cmd.exe 37 PID 2072 wrote to memory of 2660 2072 cmd.exe 37 PID 2072 wrote to memory of 2660 2072 cmd.exe 37 PID 2072 wrote to memory of 2660 2072 cmd.exe 37 PID 2836 wrote to memory of 2388 2836 Logo1_.exe 38 PID 2836 wrote to memory of 2388 2836 Logo1_.exe 38 PID 2836 wrote to memory of 2388 2836 Logo1_.exe 38 PID 2836 wrote to memory of 2388 2836 Logo1_.exe 38 PID 2388 wrote to memory of 2680 2388 net.exe 40 PID 2388 wrote to memory of 2680 2388 net.exe 40 PID 2388 wrote to memory of 2680 2388 net.exe 40 PID 2388 wrote to memory of 2680 2388 net.exe 40 PID 2836 wrote to memory of 1236 2836 Logo1_.exe 21 PID 2836 wrote to memory of 1236 2836 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe"C:\Users\Admin\AppData\Local\Temp\77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2896
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a3063.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe"C:\Users\Admin\AppData\Local\Temp\77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe"4⤵
- Executes dropped EXE
PID:2660
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2744
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2680
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD5ec52a7c41d8fe6a425af4a49d3ff8692
SHA106d3654358703be938fcee47e29e38ee38702b59
SHA25645b71822efada34915ef05af5fa772700dc0981a7ec84b5f3ff938fc522e2e48
SHA512f3cd793d93823527a7dce92032774f0b4b8656ba5234251f27c4ff203811a54649b93c12bff4e374d3950652897b0e1c51845caea57c86593d45cc3d060b348b
-
Filesize
722B
MD594613ac88b676b9fa868cf02a3de71a0
SHA130a91f4ac4581a17c14102c7defa37509f73bba3
SHA256a5718240f375c1286cf1ca26777dd91b847b92a03652b8be5307213dab309e6d
SHA5120c8a087dbcacf128f94622ae2218d3dea427a8071ee9825a192a1fa4948b2fe33b87cb329d1e41446a24e5ef8c85da5c87adbfb01af650dea6dad12674729331
-
C:\Users\Admin\AppData\Local\Temp\77436a14e111b387338e9b18ec78583c7b414a2e132ffba08834c3f8ce18b57f.exe.exe
Filesize129KB
MD511111df26aba5a177fbd3ff2821a9e5d
SHA1dba82329673e02dd99adbeb2d20538d10b6f484a
SHA25625e0e882cca2fc89942924ae208abf9059fe3f8bd87a16f788f8aad1f61521df
SHA5124d814017ce21b06208b5cd6814d40e801283a41216ea27986a88af50d2d61d23e9c54c0aafe6a8c509a94d156c59fb3dc8f46b902bcbc5acd185a712d31b2034
-
Filesize
33KB
MD58672c18abb253393520f7fc6b18384d7
SHA1bff7c7e6e156797ff0a6f8702c6dbbdee1f3ceaf
SHA256d82951f2780fd4d6ea6328ae66b12c2673bc01ce0de2d7d832481e011c9cdcb8
SHA512b9a709825bb369e77e59b181cee69a5db99e1399199b519629d0dd93fffd65d4833dd4addf464dfaefa7b8d9a41ff39fe86421927de4c1bb2048d54a51a577c8
-
Filesize
8B
MD5378d822ce12583d0d584184af22d1d77
SHA1c062ac770b028df6db676099e02f09fc2f77b171
SHA2561ad01f8e46c86dfa34468e306eabe54b58d56134130b53ea7677961e3baaf6c7
SHA51223cf7b916de734c6bb6fd3b2beee21f3e82bc95e93d8662dca818d7cf13602706f22671dce61388b2a7e0b613c07c70512331c4132759b16cf438cb1750bc397