Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/06/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe
Resource
win7-20231129-en
General
-
Target
1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe
-
Size
99KB
-
MD5
f01763aab0b11e87bbdb86cc5a8e6d4c
-
SHA1
a724eb296ea9d3e1c0132b789c3af8a3aede8fb2
-
SHA256
1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a
-
SHA512
eb769d11cd6345143d1b766ba3d3311a6d02c962c307af6efe1761335ce9862bc7f4adb5ba8816b161c6e5d36b9e837287938a5b0ca4db3966c5db22f7940c94
-
SSDEEP
1536:Hje+Zk7qzUJBeLkbiT29dXkyapmebn4ddJZeY86iLflLJYEIs67rxo:Hje+aezUDbHXlLK4ddJMY86ipmns6S
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2380 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1212 Logo1_.exe 2676 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Uninstall Information\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe Logo1_.exe File created C:\Program Files\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\DESIGNER\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EURO\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe File created C:\Windows\Logo1_.exe 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe 1212 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1940 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 28 PID 1660 wrote to memory of 1940 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 28 PID 1660 wrote to memory of 1940 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 28 PID 1660 wrote to memory of 1940 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 28 PID 1940 wrote to memory of 1268 1940 net.exe 30 PID 1940 wrote to memory of 1268 1940 net.exe 30 PID 1940 wrote to memory of 1268 1940 net.exe 30 PID 1940 wrote to memory of 1268 1940 net.exe 30 PID 1660 wrote to memory of 2380 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 31 PID 1660 wrote to memory of 2380 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 31 PID 1660 wrote to memory of 2380 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 31 PID 1660 wrote to memory of 2380 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 31 PID 1660 wrote to memory of 1212 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 33 PID 1660 wrote to memory of 1212 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 33 PID 1660 wrote to memory of 1212 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 33 PID 1660 wrote to memory of 1212 1660 1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe 33 PID 2380 wrote to memory of 2676 2380 cmd.exe 34 PID 2380 wrote to memory of 2676 2380 cmd.exe 34 PID 2380 wrote to memory of 2676 2380 cmd.exe 34 PID 2380 wrote to memory of 2676 2380 cmd.exe 34 PID 1212 wrote to memory of 2660 1212 Logo1_.exe 35 PID 1212 wrote to memory of 2660 1212 Logo1_.exe 35 PID 1212 wrote to memory of 2660 1212 Logo1_.exe 35 PID 1212 wrote to memory of 2660 1212 Logo1_.exe 35 PID 2660 wrote to memory of 2860 2660 net.exe 37 PID 2660 wrote to memory of 2860 2660 net.exe 37 PID 2660 wrote to memory of 2860 2660 net.exe 37 PID 2660 wrote to memory of 2860 2660 net.exe 37 PID 1212 wrote to memory of 2568 1212 Logo1_.exe 38 PID 1212 wrote to memory of 2568 1212 Logo1_.exe 38 PID 1212 wrote to memory of 2568 1212 Logo1_.exe 38 PID 1212 wrote to memory of 2568 1212 Logo1_.exe 38 PID 2568 wrote to memory of 2724 2568 net.exe 40 PID 2568 wrote to memory of 2724 2568 net.exe 40 PID 2568 wrote to memory of 2724 2568 net.exe 40 PID 2568 wrote to memory of 2724 2568 net.exe 40 PID 1212 wrote to memory of 1260 1212 Logo1_.exe 21 PID 1212 wrote to memory of 1260 1212 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe"C:\Users\Admin\AppData\Local\Temp\1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1268
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a11FB.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe"C:\Users\Admin\AppData\Local\Temp\1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe"4⤵
- Executes dropped EXE
PID:2676
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2860
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2724
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD57b714d463f7db900d5b6e757778a8ab8
SHA12cfc0e9f54236af8e10b0bfa551d87a20982b733
SHA256c995370836939a29853611830ca08d437286d4f45603edce88f36aa1f99a0d97
SHA512e8fe8823b5b7f282c24c964cbf4f248b7562259a13410bf95997288727f9bfc6ea51c4aa40182b649a2235bafc02062e0c57f4f62876b5174395071a8d68f9bb
-
Filesize
722B
MD57fbc21286a73a9bd62dc1816ebfe90f5
SHA1d1f5f28ac4699e44e32d3dcc9b7211e7a2f630ad
SHA2567d1fa1bce4c145c539a3d3343fa0bb7afadda9ed4910f54f3fefb0a9f00aa665
SHA512fb1248c11e3bd26af4eaf6483965c00ced713fd9a176c609a29369f216744a2053da7640a81088fd62aa9723700efadad6a16076184aeeb90f639dcba158d8e8
-
C:\Users\Admin\AppData\Local\Temp\1d4be60d5ac22ad4d5feb70ae1e771c8350fdc37ffbd3381b38cdab72721b90a.exe.exe
Filesize59KB
MD5dfc18f7068913dde25742b856788d7ca
SHA1cbaa23f782c2ddcd7c9ff024fd0b096952a2b387
SHA256ff4ac75c02247000da084de006c214d3dd3583867bd3533ba788e22734c7a2bf
SHA512d0c7ec1dae41a803325b51c12490c355ed779d297daa35247889950491e52427810132f0829fc7ffa3022f1a106f4e4ba78ed612223395313a6f267e9ab24945
-
Filesize
39KB
MD53119e880ce5d6d029185f7ed591e11d0
SHA13ab197daedf94e992062faa4eda18905b87c75bb
SHA256b1eada5fd013195853bb65ee2b9fa55eb97840d20077d7a2fd43167800608eda
SHA51218cafd3a73312811037cb0e44a578670498b09350d72febd262d62528094b9ba738357ef861bb9cb7704097b9c930b9aa38ee5823520e22cf71d4ebb453bf4d7
-
Filesize
8B
MD55db3a6182cd872eaab6e2e7df1096b6c
SHA13e324dd00c5b4aa1e4bc5176310a642cefbc8c2a
SHA256734417b13fb0508f286fe107625febab857319f967d8c512786c7a45f8c575bf
SHA5122216f82eee3214ae8bcca36317dada5873b818cd0fb23ebab360998fe0a1d1108172a7ea274bd56606f632cea033f347c0913dff9f0538e99edb4641c92d8149