Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe
Resource
win7-20240508-en
General
-
Target
4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe
-
Size
723KB
-
MD5
3f9cbd3a15f0055564b779e62278060a
-
SHA1
1ece2b03fd94f67686d1df81aa7783c47dfed7e7
-
SHA256
4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7
-
SHA512
9d68e77fb84327f5ae09150ec791827cdfd4ad8cdbbd95bd52bf9a4e9f226ef990bbaf2e739216550e982a35bbf77f35c7eb4bd58ce7d6ca9f22f29788d9368a
-
SSDEEP
12288:bW+a7fC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:bWBrLOS2opPIXV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2364 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 3004 Logo1_.exe 2632 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 1184 Explorer.EXE -
Loads dropped DLL 3 IoCs
pid Process 2364 cmd.exe 2364 cmd.exe 1184 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe File created C:\Windows\Logo1_.exe 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2756 wrote to memory of 1660 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 28 PID 2756 wrote to memory of 1660 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 28 PID 2756 wrote to memory of 1660 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 28 PID 2756 wrote to memory of 1660 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 28 PID 1660 wrote to memory of 628 1660 net.exe 30 PID 1660 wrote to memory of 628 1660 net.exe 30 PID 1660 wrote to memory of 628 1660 net.exe 30 PID 1660 wrote to memory of 628 1660 net.exe 30 PID 2756 wrote to memory of 2364 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 31 PID 2756 wrote to memory of 2364 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 31 PID 2756 wrote to memory of 2364 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 31 PID 2756 wrote to memory of 2364 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 31 PID 2756 wrote to memory of 3004 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 33 PID 2756 wrote to memory of 3004 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 33 PID 2756 wrote to memory of 3004 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 33 PID 2756 wrote to memory of 3004 2756 4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe 33 PID 3004 wrote to memory of 2680 3004 Logo1_.exe 34 PID 3004 wrote to memory of 2680 3004 Logo1_.exe 34 PID 3004 wrote to memory of 2680 3004 Logo1_.exe 34 PID 3004 wrote to memory of 2680 3004 Logo1_.exe 34 PID 2364 wrote to memory of 2632 2364 cmd.exe 36 PID 2364 wrote to memory of 2632 2364 cmd.exe 36 PID 2364 wrote to memory of 2632 2364 cmd.exe 36 PID 2364 wrote to memory of 2632 2364 cmd.exe 36 PID 2680 wrote to memory of 2488 2680 net.exe 37 PID 2680 wrote to memory of 2488 2680 net.exe 37 PID 2680 wrote to memory of 2488 2680 net.exe 37 PID 2680 wrote to memory of 2488 2680 net.exe 37 PID 3004 wrote to memory of 2772 3004 Logo1_.exe 38 PID 3004 wrote to memory of 2772 3004 Logo1_.exe 38 PID 3004 wrote to memory of 2772 3004 Logo1_.exe 38 PID 3004 wrote to memory of 2772 3004 Logo1_.exe 38 PID 2772 wrote to memory of 2724 2772 net.exe 40 PID 2772 wrote to memory of 2724 2772 net.exe 40 PID 2772 wrote to memory of 2724 2772 net.exe 40 PID 2772 wrote to memory of 2724 2772 net.exe 40 PID 3004 wrote to memory of 1184 3004 Logo1_.exe 21 PID 3004 wrote to memory of 1184 3004 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe"C:\Users\Admin\AppData\Local\Temp\4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:628
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1719.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe"C:\Users\Admin\AppData\Local\Temp\4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe"4⤵
- Executes dropped EXE
PID:2632
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2488
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2724
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5edc9d968c214a944e019fad26d1a18a5
SHA128dacfbfe9840c27f5af05343af82338786b1f36
SHA256b0f8dc8ea8e999b6c25e460e2f644f2ed41b2e481f57f5800de9c0c93c9ef275
SHA512f381ea38921a0163ced1feb11a9748010b2bf76f8eaf66ae326e98eb5d5ff75bc4b4342b4d3acf27a5177393c5b05cf43bb007ceb1d7799498e8429c8efb86a7
-
Filesize
722B
MD54d4510f44b2ac0e2389813faf0c76ef2
SHA1106e94a5db2d6240f58d4e96140e987488da93a2
SHA256eeb07a1a2b0d6dbe05058d151079f131a70bee1605cba7d53bf577aee23f6bdd
SHA512dd0606988f7dd5d650ac67b7b9b21997d7940baea89638bfad9e782dfc846b0cdb71a41032d81ce8f161356486e345a03376ac678b4255b3c7de4c6039baa252
-
C:\Users\Admin\AppData\Local\Temp\4127b16275ee4e839f50a2e4a3f578809317675de92b9b0c3dc8973789efa2f7.exe.exe
Filesize684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
39KB
MD59ac3cc4a6e069b5fb8c4abe11939c49f
SHA1993756ae5557a8c19e134408cd8d354ee43d8148
SHA256528ce1912359d5ef6d29f809faa2520237265fabb82e29d5b1d2a7f1009461b5
SHA512b54a6bcd9fe91f7ec497dec2587d785a579bcc0621194bdbfba53ec1127d63e79d5a72c31d7d3eb9aea9eb474f3d4f25bf23084ec33bbd4eee99f59f39def2d6
-
Filesize
8B
MD59bf5ad0e8bbf0ba1630c244358e5c6dd
SHA125918532222a7063195beeb76980b6ec9e59e19a
SHA256551cc5b618f0fa78108dd2388d9136893adb10499e4836e9728f4e96530bf02f
SHA5127fdce76bb191d4988d92e3d97ce8db4cae1b5c1f93198bffc4e863d324d814246353200d32ea730f83345fcb7ad82213c2bcd31351e905e473d9596bc7b43ad3