Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe
Resource
win7-20240508-en
General
-
Target
5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe
-
Size
58KB
-
MD5
7be685a4660bb0e6a078304e0fea7ea5
-
SHA1
30cb1cf148225dc942fed67f37d3e2443d71b8da
-
SHA256
5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9
-
SHA512
55a8d57454f8fa7b96ba6e91f2b66d46ad5c6370d9a7ada2ac35eb675ac0e7887c19a9df226b8b13f84c22c5165ba683b74c6cf033ae000e9c93a2d81e9b30d5
-
SSDEEP
1536:BUcx1ae9n40g4ZoeVWsHh3jF89vOnl6vAOxJ0lM:BUfZ4ZHUI4GlIAOxJV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2668 Logo1_.exe 1720 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe -
Loads dropped DLL 2 IoCs
pid Process 2652 cmd.exe 2652 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe Logo1_.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\fr-FR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe File created C:\Windows\Logo1_.exe 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1736 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 28 PID 1776 wrote to memory of 1736 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 28 PID 1776 wrote to memory of 1736 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 28 PID 1776 wrote to memory of 1736 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 28 PID 1736 wrote to memory of 2052 1736 net.exe 30 PID 1736 wrote to memory of 2052 1736 net.exe 30 PID 1736 wrote to memory of 2052 1736 net.exe 30 PID 1736 wrote to memory of 2052 1736 net.exe 30 PID 1776 wrote to memory of 2652 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 31 PID 1776 wrote to memory of 2652 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 31 PID 1776 wrote to memory of 2652 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 31 PID 1776 wrote to memory of 2652 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 31 PID 1776 wrote to memory of 2668 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 32 PID 1776 wrote to memory of 2668 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 32 PID 1776 wrote to memory of 2668 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 32 PID 1776 wrote to memory of 2668 1776 5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe 32 PID 2668 wrote to memory of 2568 2668 Logo1_.exe 34 PID 2668 wrote to memory of 2568 2668 Logo1_.exe 34 PID 2668 wrote to memory of 2568 2668 Logo1_.exe 34 PID 2668 wrote to memory of 2568 2668 Logo1_.exe 34 PID 2568 wrote to memory of 2580 2568 net.exe 36 PID 2568 wrote to memory of 2580 2568 net.exe 36 PID 2568 wrote to memory of 2580 2568 net.exe 36 PID 2568 wrote to memory of 2580 2568 net.exe 36 PID 2652 wrote to memory of 1720 2652 cmd.exe 37 PID 2652 wrote to memory of 1720 2652 cmd.exe 37 PID 2652 wrote to memory of 1720 2652 cmd.exe 37 PID 2652 wrote to memory of 1720 2652 cmd.exe 37 PID 2668 wrote to memory of 2488 2668 Logo1_.exe 38 PID 2668 wrote to memory of 2488 2668 Logo1_.exe 38 PID 2668 wrote to memory of 2488 2668 Logo1_.exe 38 PID 2668 wrote to memory of 2488 2668 Logo1_.exe 38 PID 2488 wrote to memory of 2636 2488 net.exe 40 PID 2488 wrote to memory of 2636 2488 net.exe 40 PID 2488 wrote to memory of 2636 2488 net.exe 40 PID 2488 wrote to memory of 2636 2488 net.exe 40 PID 2668 wrote to memory of 1184 2668 Logo1_.exe 21 PID 2668 wrote to memory of 1184 2668 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe"C:\Users\Admin\AppData\Local\Temp\5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1DDD.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe"C:\Users\Admin\AppData\Local\Temp\5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe"4⤵
- Executes dropped EXE
PID:1720
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2580
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2636
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD56028470621a870e37ea49499b4044df3
SHA190f86d2b21cd3b2d2940c3b0066fd46680c4ff62
SHA2568a4b651cc3b85bcec5f000ebba490795941af94b8680dd4876d35153d3242e18
SHA51221927cbfb83b5e0b90c2baadba1bf845bee1e3a733447adedd29b143e1defadc79443661f0686a5d2549310dee27c1c3e442f3e22981d0b808436380655601a2
-
Filesize
722B
MD5d39e65978db2bc9599985b14974c0cfb
SHA16ff73282acc463133fcde4b6738d59323e51ab3d
SHA2565323ddd1d502ce9461e0d99c6c9b8960c541d3415e58a962c542ed84e4956c65
SHA512bead51d9e71aca593c885bfc5b849d567d68b7dcd2b673ace08b0fd2d23a200aa362b255db7eabd0b2668decbe5179429ed00157b64f68a077843030471a9e55
-
C:\Users\Admin\AppData\Local\Temp\5e186b691ae85f4ec27be7a8b02ff68a6f993b5a5bacbefd593a6351418e48a9.exe.exe
Filesize25KB
MD56ff84be315cfafbbdf36aa01af8389e7
SHA12c550a4059ac331f5f5c9d3f218e0f6184aa27c9
SHA25647c67c1c88ceaee3cf1667bf956a3e11a84dea2f7c2afc634777aa5f1bf65c76
SHA51272498b009573a9cc9b5554e61d56b68f273682bfa2e13808f4abd5b2171aa59dd4a64bd9f68a3a416cfaceacb0041df918d8a84f28a5fa7f204fc562c5b6b174
-
Filesize
33KB
MD543356dd48a332ab8c25c4d2c7eac2f61
SHA18faaad2e3fb1b90d093b7bfc923cf17f2325e3f7
SHA25615bdce335e41a396daed422b87205338b8fa4f479e68731da5bb8f6b036c97e4
SHA512261b60bac39bdacacb435f749c7ac3cb2c760f6d771104e6bd9b242046c677f8d823de7fbd0c43a6fb0b979be4a786f13dca14b7e39bb05eddb079e03b86abdd
-
Filesize
8B
MD5fa8bf97ffdb152205be1f3a9bd9faec3
SHA188a5a98b6074543e357ec7ad221eaee5e30ec82a
SHA25608a129c008511d5fc4ee1e2ad0fad3d0b033407f74285a18c6fe956d5dc2c9cb
SHA512ea0a63f52af441964e4a2cddede537d87f1ad78241c883cf40334801056879bb1639ae75b2d9e3cceb90471837263760fc7d6c6708819c7a73fec703ba098443