Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe
Resource
win7-20240221-en
General
-
Target
3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe
-
Size
291KB
-
MD5
445e51ae7e9a6eaadfa8bfac82fd0d4e
-
SHA1
70d51d9353570037b429a41a7ebf0d5175c9ef39
-
SHA256
3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4
-
SHA512
5ff75cd1cfe84f517b223c5336ad3b04a13ead4f0ec43fe628de09e08bf619616206c852548f039587d882444abdc0cb53a9ac33234d023d3252be4bef100ecd
-
SSDEEP
6144:S+aezLMTi0+lfh+L5qe9T5q4GAFzWTBPMmC1UC6fOaU:S+a0MTi0uhMqe9ts2zWTpMmCG7W
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2656 Logo1_.exe 2908 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe -
Loads dropped DLL 2 IoCs
pid Process 2616 cmd.exe 2616 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe Logo1_.exe File created C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\WMPDMC.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\fr-FR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe File created C:\Windows\Logo1_.exe 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe 2656 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1500 wrote to memory of 2476 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 28 PID 1500 wrote to memory of 2476 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 28 PID 1500 wrote to memory of 2476 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 28 PID 1500 wrote to memory of 2476 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 28 PID 2476 wrote to memory of 2248 2476 net.exe 30 PID 2476 wrote to memory of 2248 2476 net.exe 30 PID 2476 wrote to memory of 2248 2476 net.exe 30 PID 2476 wrote to memory of 2248 2476 net.exe 30 PID 1500 wrote to memory of 2616 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 31 PID 1500 wrote to memory of 2616 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 31 PID 1500 wrote to memory of 2616 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 31 PID 1500 wrote to memory of 2616 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 31 PID 1500 wrote to memory of 2656 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 33 PID 1500 wrote to memory of 2656 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 33 PID 1500 wrote to memory of 2656 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 33 PID 1500 wrote to memory of 2656 1500 3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe 33 PID 2656 wrote to memory of 2596 2656 Logo1_.exe 34 PID 2656 wrote to memory of 2596 2656 Logo1_.exe 34 PID 2656 wrote to memory of 2596 2656 Logo1_.exe 34 PID 2656 wrote to memory of 2596 2656 Logo1_.exe 34 PID 2596 wrote to memory of 2528 2596 net.exe 36 PID 2596 wrote to memory of 2528 2596 net.exe 36 PID 2596 wrote to memory of 2528 2596 net.exe 36 PID 2596 wrote to memory of 2528 2596 net.exe 36 PID 2616 wrote to memory of 2908 2616 cmd.exe 37 PID 2616 wrote to memory of 2908 2616 cmd.exe 37 PID 2616 wrote to memory of 2908 2616 cmd.exe 37 PID 2616 wrote to memory of 2908 2616 cmd.exe 37 PID 2656 wrote to memory of 2712 2656 Logo1_.exe 38 PID 2656 wrote to memory of 2712 2656 Logo1_.exe 38 PID 2656 wrote to memory of 2712 2656 Logo1_.exe 38 PID 2656 wrote to memory of 2712 2656 Logo1_.exe 38 PID 2712 wrote to memory of 2196 2712 net.exe 40 PID 2712 wrote to memory of 2196 2712 net.exe 40 PID 2712 wrote to memory of 2196 2712 net.exe 40 PID 2712 wrote to memory of 2196 2712 net.exe 40 PID 2656 wrote to memory of 1284 2656 Logo1_.exe 21 PID 2656 wrote to memory of 1284 2656 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe"C:\Users\Admin\AppData\Local\Temp\3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2248
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a8EC8.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe"C:\Users\Admin\AppData\Local\Temp\3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe"4⤵
- Executes dropped EXE
PID:2908
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2528
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2196
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD57b714d463f7db900d5b6e757778a8ab8
SHA12cfc0e9f54236af8e10b0bfa551d87a20982b733
SHA256c995370836939a29853611830ca08d437286d4f45603edce88f36aa1f99a0d97
SHA512e8fe8823b5b7f282c24c964cbf4f248b7562259a13410bf95997288727f9bfc6ea51c4aa40182b649a2235bafc02062e0c57f4f62876b5174395071a8d68f9bb
-
Filesize
722B
MD5466747331367092afcb8c02f3afdea9f
SHA1c079aa932d46a7b55e68cb844fad9fcaf117c357
SHA2562574dfbca6fdafacfd2a669cc99a43c64b5af40582add24ae3b0d4e6fb3e666b
SHA512d47bc1e4b2367f74ec04ce004bb2eb0dd42c2262f81b54cca9577b697a7e65ee844cd12121ce2f1b6c1a1adc4db3ee2f68b70be6fe8fd3d5d3a377e550fd46b4
-
C:\Users\Admin\AppData\Local\Temp\3eb500751acdd99f5f3df4fd27f0b0efa5f0e370a99291118fc85d045ea4c0a4.exe.exe
Filesize252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
39KB
MD53119e880ce5d6d029185f7ed591e11d0
SHA13ab197daedf94e992062faa4eda18905b87c75bb
SHA256b1eada5fd013195853bb65ee2b9fa55eb97840d20077d7a2fd43167800608eda
SHA51218cafd3a73312811037cb0e44a578670498b09350d72febd262d62528094b9ba738357ef861bb9cb7704097b9c930b9aa38ee5823520e22cf71d4ebb453bf4d7
-
Filesize
9B
MD560b1ffe4d5892b7ae054738eec1fd425
SHA180d4e944617f4132b1c6917345b158f3693f35c8
SHA2565e9944cc48c7ec641cf7b1b0125f47f26102c371a973612f0583f604bc3900d4
SHA5127f5c200924dbb5531df997e6a35cb94f36b54f5651284b0d6404f0576301125ef72b410a170fca889d46c033063663cfc7791f9e4c3c30695af069053eee66cc