Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe
Resource
win7-20240221-en
General
-
Target
031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe
-
Size
93KB
-
MD5
0c9ede513a97b2aef46d6a760bf1ce0b
-
SHA1
eb988a2dfc6d20b0620b959c893d6c5cec2d8969
-
SHA256
031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9
-
SHA512
bc3e57c6d0ed7807678706d00eb9cb5c108c06ea8e3708f53a246760f86765e3e570434c0a067dd0ab95d5463c62349dc3325597ab3593235e8eab4a827f3cf0
-
SSDEEP
1536:6Rcx1aeg1v9OQZVUKM6+kKpeJvJnBpwdaMIOOnToIfiV6pdQ:6Rf9lOzKM5peJvxKaCqTBfioo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2520 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1248 Logo1_.exe 2412 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe -
Loads dropped DLL 2 IoCs
pid Process 2520 cmd.exe 2520 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\DAO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DAO\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe File created C:\Windows\Logo1_.exe 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe 1248 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1780 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 28 PID 2084 wrote to memory of 1780 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 28 PID 2084 wrote to memory of 1780 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 28 PID 2084 wrote to memory of 1780 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 28 PID 1780 wrote to memory of 1636 1780 net.exe 30 PID 1780 wrote to memory of 1636 1780 net.exe 30 PID 1780 wrote to memory of 1636 1780 net.exe 30 PID 1780 wrote to memory of 1636 1780 net.exe 30 PID 2084 wrote to memory of 2520 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 31 PID 2084 wrote to memory of 2520 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 31 PID 2084 wrote to memory of 2520 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 31 PID 2084 wrote to memory of 2520 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 31 PID 2084 wrote to memory of 1248 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 33 PID 2084 wrote to memory of 1248 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 33 PID 2084 wrote to memory of 1248 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 33 PID 2084 wrote to memory of 1248 2084 031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe 33 PID 1248 wrote to memory of 2564 1248 Logo1_.exe 34 PID 1248 wrote to memory of 2564 1248 Logo1_.exe 34 PID 1248 wrote to memory of 2564 1248 Logo1_.exe 34 PID 1248 wrote to memory of 2564 1248 Logo1_.exe 34 PID 2564 wrote to memory of 2616 2564 net.exe 36 PID 2564 wrote to memory of 2616 2564 net.exe 36 PID 2564 wrote to memory of 2616 2564 net.exe 36 PID 2564 wrote to memory of 2616 2564 net.exe 36 PID 2520 wrote to memory of 2412 2520 cmd.exe 37 PID 2520 wrote to memory of 2412 2520 cmd.exe 37 PID 2520 wrote to memory of 2412 2520 cmd.exe 37 PID 2520 wrote to memory of 2412 2520 cmd.exe 37 PID 1248 wrote to memory of 2960 1248 Logo1_.exe 38 PID 1248 wrote to memory of 2960 1248 Logo1_.exe 38 PID 1248 wrote to memory of 2960 1248 Logo1_.exe 38 PID 1248 wrote to memory of 2960 1248 Logo1_.exe 38 PID 2960 wrote to memory of 2160 2960 net.exe 40 PID 2960 wrote to memory of 2160 2960 net.exe 40 PID 2960 wrote to memory of 2160 2960 net.exe 40 PID 2960 wrote to memory of 2160 2960 net.exe 40 PID 1248 wrote to memory of 1104 1248 Logo1_.exe 20 PID 1248 wrote to memory of 1104 1248 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe"C:\Users\Admin\AppData\Local\Temp\031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a8E6.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe"C:\Users\Admin\AppData\Local\Temp\031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe"4⤵
- Executes dropped EXE
PID:2412
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2160
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD5ec52a7c41d8fe6a425af4a49d3ff8692
SHA106d3654358703be938fcee47e29e38ee38702b59
SHA25645b71822efada34915ef05af5fa772700dc0981a7ec84b5f3ff938fc522e2e48
SHA512f3cd793d93823527a7dce92032774f0b4b8656ba5234251f27c4ff203811a54649b93c12bff4e374d3950652897b0e1c51845caea57c86593d45cc3d060b348b
-
Filesize
721B
MD5d81c0c696d9bde93195a0dacb339c2f6
SHA1069230fc7078a784c2c5794c31cd8758b5409727
SHA256d6d5cee9222e3a0138d238a977eac361e25cc8d502531d66e78f5e63a535b2de
SHA512c321164f81ee77c26e4ce2fdf91a9687dc560e9b0782e003ea748e4c55593f1adc940067bb0efd617d00adf010ac228fcbe04fd3151373a39511fec1cc4510d8
-
C:\Users\Admin\AppData\Local\Temp\031d9cd7c4be70fe389b40e712b28337658c00e50162cb89ac90dd0deee16ba9.exe.exe
Filesize60KB
MD57b112b1fb864c90ec5b65eab21cb40b8
SHA1e7b73361f722fc7cbb93ef98a8d26e34f4d49767
SHA256751941b4e09898c31791efeb5f90fc7367c89831d4a98637ed505e40763e287b
SHA512bf9cdeff39cc4fa48457c55ad02e3856b5b27998535aed801a469252f01e7676462332fa3f93877753e963d037472f615c1fc5fc2e996316621b4e0a180cb5f5
-
Filesize
33KB
MD55553d3ee0be1b8b190a8cabf5ac62a7d
SHA16e05d4872a18ec838e986aaf8702941fc3ebdbed
SHA25671cd5ce8ac64bb6d980085861a384c45af9ab7f69e66a1c5425b72f451bba722
SHA512dca7f12e7f67945e2dfd77ad6180ad2a87d5cac7751715a7a1fb070c7573f9ff3f3911ff28ba96fc47fcb2e7459f0076d167d0dd28edd6d96b0204a4234fc452
-
Filesize
8B
MD5378d822ce12583d0d584184af22d1d77
SHA1c062ac770b028df6db676099e02f09fc2f77b171
SHA2561ad01f8e46c86dfa34468e306eabe54b58d56134130b53ea7677961e3baaf6c7
SHA51223cf7b916de734c6bb6fd3b2beee21f3e82bc95e93d8662dca818d7cf13602706f22671dce61388b2a7e0b613c07c70512331c4132759b16cf438cb1750bc397