Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe
Resource
win7-20240220-en
General
-
Target
dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe
-
Size
964KB
-
MD5
a7c7d5a11c998f769d392d9a3478e865
-
SHA1
48a1c04ac6c07cbfe849a2ed652086c11177bc46
-
SHA256
dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897
-
SHA512
a01788a62a7202d875528dc045f0f051c81b9be79291a5bdc2d41c1f6e17d66798b5dcbcd84087a5adeec34ad63b6536536f3994702de8a10f8bf54127e2c593
-
SSDEEP
12288:OqP2RKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:OqPvBpDRmi78gkPXlyo0G/jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1056 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2156 Logo1_.exe 2584 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe -
Loads dropped DLL 2 IoCs
pid Process 1056 cmd.exe 1056 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\Icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\logger\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe File created C:\Windows\Logo1_.exe dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2584 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2584 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe Token: 35 2584 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2096 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 28 PID 2292 wrote to memory of 2096 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 28 PID 2292 wrote to memory of 2096 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 28 PID 2292 wrote to memory of 2096 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 28 PID 2096 wrote to memory of 1296 2096 net.exe 30 PID 2096 wrote to memory of 1296 2096 net.exe 30 PID 2096 wrote to memory of 1296 2096 net.exe 30 PID 2096 wrote to memory of 1296 2096 net.exe 30 PID 2292 wrote to memory of 1056 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 31 PID 2292 wrote to memory of 1056 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 31 PID 2292 wrote to memory of 1056 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 31 PID 2292 wrote to memory of 1056 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 31 PID 2292 wrote to memory of 2156 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 33 PID 2292 wrote to memory of 2156 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 33 PID 2292 wrote to memory of 2156 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 33 PID 2292 wrote to memory of 2156 2292 dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe 33 PID 2156 wrote to memory of 2684 2156 Logo1_.exe 34 PID 2156 wrote to memory of 2684 2156 Logo1_.exe 34 PID 2156 wrote to memory of 2684 2156 Logo1_.exe 34 PID 2156 wrote to memory of 2684 2156 Logo1_.exe 34 PID 1056 wrote to memory of 2584 1056 cmd.exe 36 PID 1056 wrote to memory of 2584 1056 cmd.exe 36 PID 1056 wrote to memory of 2584 1056 cmd.exe 36 PID 1056 wrote to memory of 2584 1056 cmd.exe 36 PID 2684 wrote to memory of 2592 2684 net.exe 37 PID 2684 wrote to memory of 2592 2684 net.exe 37 PID 2684 wrote to memory of 2592 2684 net.exe 37 PID 2684 wrote to memory of 2592 2684 net.exe 37 PID 2156 wrote to memory of 2828 2156 Logo1_.exe 38 PID 2156 wrote to memory of 2828 2156 Logo1_.exe 38 PID 2156 wrote to memory of 2828 2156 Logo1_.exe 38 PID 2156 wrote to memory of 2828 2156 Logo1_.exe 38 PID 2828 wrote to memory of 2724 2828 net.exe 40 PID 2828 wrote to memory of 2724 2828 net.exe 40 PID 2828 wrote to memory of 2724 2828 net.exe 40 PID 2828 wrote to memory of 2724 2828 net.exe 40 PID 2156 wrote to memory of 1208 2156 Logo1_.exe 21 PID 2156 wrote to memory of 1208 2156 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe"C:\Users\Admin\AppData\Local\Temp\dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1296
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aEB0.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe"C:\Users\Admin\AppData\Local\Temp\dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2592
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2724
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5354241349b608202b5c359d6a8d31eb5
SHA14466156f6d679e8a842d211052a725fd1f30a20d
SHA2567f9b735658a32a095e3381e9002bfb638b6c441cb5236c23d542c41c9800dcf2
SHA512c201adc0081cbee4cbc531b09b65468769bd26f2bceb21594ba2dabe2a3aef42af726dfffe1cd37fdf7c475c24ddb46c6faac1dfe1132cb41cd99adc18640020
-
Filesize
478KB
MD55264aab343fc1f53c29d1065346d0010
SHA1db43bc0b28b4ada0c5635db50fd0b64410ab76ad
SHA256d33d56847b353c8207a43aa01cc75527328ebf4bba669e90e29266d1b6fb57dd
SHA512bb4ba1f7c5cae56cef564dd99f1a1fd3e2c656f8004f689a22ea641d886cbb3a19dde3dce5be4cf8cee4ce190170fd8c5390cb9c7c40ae54109559685119a958
-
Filesize
721B
MD5ddae70452998820b0eafcf0579403be3
SHA1f38a5e9e729e9617acd76f2dc0b90f305b160d94
SHA256e6618e647ed486215351ab09822a8b6aeea568bd140418cb7f1bfe54020890e9
SHA5121708cc43217b7921226b04f32e3c8c7d9b50cb79ea40dc064503f657ae9e1faea0c325560f93e93fb0f300e82b90280d8cd272120d510036d8f5a921ebba6581
-
C:\Users\Admin\AppData\Local\Temp\dcd6eaf5ff593cece4234e628283071c47b8260300aeaf26662f1b557c433897.exe.exe
Filesize930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
33KB
MD5faf698c6bc8a6f58f9bae312ee973faf
SHA1aecfda4eee59acb5be6fa476e8ea43cd746fcb88
SHA2564716a1af75b8d3043d7cadc7cf8d5d5c96d74552ae00c6af3dbfe05e1dc6945e
SHA51262d48ba8c4aaec7761f598b8b26fbaa529c7cbdd9e8defa58d4aebd31bf8f84f1e281937d1dc8f4495378a7d3911b11ab244b1ddfacb359421704cd4ca706a33
-
Filesize
8B
MD58de83b88f7ab26b8a33a1eeb970a7bc8
SHA1ad3208ec0bdfacd12ad7291d0259ef41b6bfc425
SHA256499baf65b91c9fff00cab334a4d8ab59d253993f173da5c33ff01ea4afc217fe
SHA5129272af088cc70ebeb388cefda678d35e649433d3a6c5715f3537e2832b3fead9568d58a026c36ab711fdef87597419e8be80a5d809530a933f72328c413a5d7e