Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 14:33
Static task
static1
Behavioral task
behavioral1
Sample
1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe
Resource
win7-20240221-en
General
-
Target
1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe
-
Size
761KB
-
MD5
f42e7b13699eaf8213a66b2500b644f3
-
SHA1
526af9badb305f4e00f00d5c4d7fcad843be9601
-
SHA256
1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16
-
SHA512
c36f23d140226c75f9f28c9c0eb6b1bc5613d884ceec7d732427424dd3a373287f40f59cf48753d5474515eb79f5cef9f196552e41722b6eeeb31ff13efa6ece
-
SSDEEP
12288:lPtGboup+VHKBX3jbgS/Wg0MIn7ou8XBKsHKZycUQUfXJvA:lPt2kHKlzcS/0MInsu8uZycUfvA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1224 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2620 Logo1_.exe 2560 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe -
Loads dropped DLL 2 IoCs
pid Process 1224 cmd.exe 1224 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Updater6\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Uninstall Information\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe 2620 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2228 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 28 PID 2344 wrote to memory of 2228 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 28 PID 2344 wrote to memory of 2228 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 28 PID 2344 wrote to memory of 2228 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 28 PID 2228 wrote to memory of 2172 2228 net.exe 30 PID 2228 wrote to memory of 2172 2228 net.exe 30 PID 2228 wrote to memory of 2172 2228 net.exe 30 PID 2228 wrote to memory of 2172 2228 net.exe 30 PID 2344 wrote to memory of 1224 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 31 PID 2344 wrote to memory of 1224 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 31 PID 2344 wrote to memory of 1224 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 31 PID 2344 wrote to memory of 1224 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 31 PID 2344 wrote to memory of 2620 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 33 PID 2344 wrote to memory of 2620 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 33 PID 2344 wrote to memory of 2620 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 33 PID 2344 wrote to memory of 2620 2344 1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe 33 PID 2620 wrote to memory of 2704 2620 Logo1_.exe 34 PID 2620 wrote to memory of 2704 2620 Logo1_.exe 34 PID 2620 wrote to memory of 2704 2620 Logo1_.exe 34 PID 2620 wrote to memory of 2704 2620 Logo1_.exe 34 PID 2704 wrote to memory of 2736 2704 net.exe 36 PID 2704 wrote to memory of 2736 2704 net.exe 36 PID 2704 wrote to memory of 2736 2704 net.exe 36 PID 2704 wrote to memory of 2736 2704 net.exe 36 PID 1224 wrote to memory of 2560 1224 cmd.exe 37 PID 1224 wrote to memory of 2560 1224 cmd.exe 37 PID 1224 wrote to memory of 2560 1224 cmd.exe 37 PID 1224 wrote to memory of 2560 1224 cmd.exe 37 PID 2620 wrote to memory of 2756 2620 Logo1_.exe 38 PID 2620 wrote to memory of 2756 2620 Logo1_.exe 38 PID 2620 wrote to memory of 2756 2620 Logo1_.exe 38 PID 2620 wrote to memory of 2756 2620 Logo1_.exe 38 PID 2756 wrote to memory of 2468 2756 net.exe 40 PID 2756 wrote to memory of 2468 2756 net.exe 40 PID 2756 wrote to memory of 2468 2756 net.exe 40 PID 2756 wrote to memory of 2468 2756 net.exe 40 PID 2620 wrote to memory of 1204 2620 Logo1_.exe 21 PID 2620 wrote to memory of 1204 2620 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe"C:\Users\Admin\AppData\Local\Temp\1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2172
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2137.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe"C:\Users\Admin\AppData\Local\Temp\1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe"4⤵
- Executes dropped EXE
PID:2560
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2736
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2468
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5a250aa2897bf08c76a4de6de8562286e
SHA12dfca956f87c670477e8b3d31bd0664018ca0219
SHA25665b18c4626b691c78ebd76f4f497f4f54e0dfde43371102719087cbda44e1c69
SHA512004dca009b53b4b3040fbb84eff848b984fc94ae377c316bfaefe47c648ef826e346202088c656482ee63e6ef3f470896dc577fe4a62e2bec2e2d46fd5d9d5fc
-
Filesize
478KB
MD55264aab343fc1f53c29d1065346d0010
SHA1db43bc0b28b4ada0c5635db50fd0b64410ab76ad
SHA256d33d56847b353c8207a43aa01cc75527328ebf4bba669e90e29266d1b6fb57dd
SHA512bb4ba1f7c5cae56cef564dd99f1a1fd3e2c656f8004f689a22ea641d886cbb3a19dde3dce5be4cf8cee4ce190170fd8c5390cb9c7c40ae54109559685119a958
-
Filesize
722B
MD5bde39a0ff1df7e231e1fd7b43cfb3f6b
SHA14017775e2c93e588b041d237fc6d8ac35a62db09
SHA2561db80dfea3fd75832437ff7cce2a5f056d97d5e003e4bc64497c8881fa187f90
SHA51209b6ab022ec624f5484cda864af04cd7ed6ae7d9934838ddc83dcc8f1c1a52dc0090af3a8e8123f37509ce0ec254d123a42afafef92e621c860a6a3b7df5d759
-
C:\Users\Admin\AppData\Local\Temp\1bff67d6ab5be86d5d96c23758311476edd262290e17bbed62075bf3b285ac16.exe.exe
Filesize728KB
MD523e2fc0497edd8195bcae45a1389bf85
SHA128d2f99739a49cb707f9348cd3195e234c853b1e
SHA25692d70a8fc07cee881009026759a8aaa5debfb64069038f610988719ed3630107
SHA5125ae4c17363aa70cd17532fcf76bdff86d2634956f6e0483e88a14b22ce3e6dd01ad233943409302ab3a858d9d9eddb1a5d6d376f48908b64ed655554abfb2b4c
-
Filesize
33KB
MD590ec7c50aec83a0f7624ef99fbf56efd
SHA1c27225e22d2b67947763a6807ad30315ca37c7ff
SHA25692980a159169e0859fbea14aeece4d664bd6b190ddae4e0433bb9329a428d3c9
SHA512f916293e2bb72eef430c11bd0567fb656e217147e8069f1ef7a4f3cd5d6b25b52992126ddd88ad6b8dbbc57be1b2ab06892897277f81b03ca34056747d2be96d
-
Filesize
8B
MD55db3a6182cd872eaab6e2e7df1096b6c
SHA13e324dd00c5b4aa1e4bc5176310a642cefbc8c2a
SHA256734417b13fb0508f286fe107625febab857319f967d8c512786c7a45f8c575bf
SHA5122216f82eee3214ae8bcca36317dada5873b818cd0fb23ebab360998fe0a1d1108172a7ea274bd56606f632cea033f347c0913dff9f0538e99edb4641c92d8149