Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe
Resource
win7-20240221-en
General
-
Target
cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe
-
Size
717KB
-
MD5
f5c6a11662d347dfd4fcc22faa210cac
-
SHA1
f18d93e3bb1f415a00b4c857fd644cff695a0ff6
-
SHA256
cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501
-
SHA512
406fcbe52119d7f216f3b531a736b496e2b5feba708152ac91229d0f2fa8191fadaaeddf31c76ab073fedb16b3466adeb36bd189e105523cd96c2d6a4f0511bc
-
SSDEEP
12288:k1upqfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:k1AmLOS2opPIXV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2612 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2728 Logo1_.exe 2468 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 1192 Explorer.EXE -
Loads dropped DLL 3 IoCs
pid Process 2612 cmd.exe 2612 cmd.exe 1192 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\SystemV\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\DESIGNER\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe File created C:\Windows\Logo1_.exe cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe 2728 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2544 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 28 PID 1040 wrote to memory of 2544 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 28 PID 1040 wrote to memory of 2544 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 28 PID 1040 wrote to memory of 2544 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 28 PID 2544 wrote to memory of 1984 2544 net.exe 30 PID 2544 wrote to memory of 1984 2544 net.exe 30 PID 2544 wrote to memory of 1984 2544 net.exe 30 PID 2544 wrote to memory of 1984 2544 net.exe 30 PID 1040 wrote to memory of 2612 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 31 PID 1040 wrote to memory of 2612 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 31 PID 1040 wrote to memory of 2612 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 31 PID 1040 wrote to memory of 2612 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 31 PID 1040 wrote to memory of 2728 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 33 PID 1040 wrote to memory of 2728 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 33 PID 1040 wrote to memory of 2728 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 33 PID 1040 wrote to memory of 2728 1040 cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe 33 PID 2728 wrote to memory of 2548 2728 Logo1_.exe 34 PID 2728 wrote to memory of 2548 2728 Logo1_.exe 34 PID 2728 wrote to memory of 2548 2728 Logo1_.exe 34 PID 2728 wrote to memory of 2548 2728 Logo1_.exe 34 PID 2548 wrote to memory of 2396 2548 net.exe 36 PID 2548 wrote to memory of 2396 2548 net.exe 36 PID 2548 wrote to memory of 2396 2548 net.exe 36 PID 2548 wrote to memory of 2396 2548 net.exe 36 PID 2612 wrote to memory of 2468 2612 cmd.exe 37 PID 2612 wrote to memory of 2468 2612 cmd.exe 37 PID 2612 wrote to memory of 2468 2612 cmd.exe 37 PID 2612 wrote to memory of 2468 2612 cmd.exe 37 PID 2728 wrote to memory of 2536 2728 Logo1_.exe 38 PID 2728 wrote to memory of 2536 2728 Logo1_.exe 38 PID 2728 wrote to memory of 2536 2728 Logo1_.exe 38 PID 2728 wrote to memory of 2536 2728 Logo1_.exe 38 PID 2536 wrote to memory of 2364 2536 net.exe 40 PID 2536 wrote to memory of 2364 2536 net.exe 40 PID 2536 wrote to memory of 2364 2536 net.exe 40 PID 2536 wrote to memory of 2364 2536 net.exe 40 PID 2728 wrote to memory of 1192 2728 Logo1_.exe 21 PID 2728 wrote to memory of 1192 2728 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe"C:\Users\Admin\AppData\Local\Temp\cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a259A.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe"C:\Users\Admin\AppData\Local\Temp\cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe"4⤵
- Executes dropped EXE
PID:2468
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2396
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2364
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5c1311e35ea05def263f404a5d7b73260
SHA1952954211d07edfb16b371cf104aa332731011b7
SHA256c502724428c14d7c1079512448dd16a7495a543483d0b818d4d6b67add762748
SHA5125606f9ef7170a427dbd217e79bf36dff7c9f13b3799c73221940ba8412cb6e436e30ee88bc8aefbdb6428dec24e03d503a68d67d8f03bb8bcb027563e87070ed
-
Filesize
478KB
MD5c8b074fbff9452f981c52acd82c24918
SHA103ffff9c1f1e8da670c6c65b2d858a9ed7eae4fa
SHA256986587b92dc97769781c303bcf1c6e13dacd413cac927afb4462389b3204d888
SHA512fc282e5789ea88095cfd50a0aa1c38d63515f70b28c52c2d68da57119f4b8f5f5ba4216a3547fe5202939d0ca3c8ad6c1cd938831c5b0bb3fc6e96b6d834bf8c
-
Filesize
722B
MD5fba26e6bdcde78d85680c5382ceddb4c
SHA1159f91538159915a6219630c032e5ec4a7b3d4ea
SHA256279617231b96e434f3c2d61db09ad0f528cf803eb0be9d7fb3d0ace5618073c1
SHA5122af2814a6dffb7b63385084fff20ff397e209eb83f6d4d7562033b083358c8fd7fd9cbb1765d7b37bb7012266c58cd068e4cb652d41370baa8ae6ea799a53161
-
C:\Users\Admin\AppData\Local\Temp\cbb447099591e27d95f0bda01d26b84edb3502b136cf473c6a9cd3a3fdbbb501.exe.exe
Filesize684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
33KB
MD5a0c02032a40d35cd333d9e5c309519d2
SHA1010b30527b26c9264fab15a3941e2f692b014bbf
SHA2560f552e28158600bb566846945865b84540a6e4ddd0a4da4cf9effd58c85c3724
SHA512dd414f5e166e2b53738d868af9bf580bae8efb2aa1dfa0702fc22172e3402bbc5dd6b92c25d33c9a456b56c54215cb784fba38bf65c2f43acce7044abc6167a7
-
Filesize
9B
MD53b22ce0fee2d1aaf2c66dcd142740e29
SHA194d542b4bb9854a9419753c38e6ffe747653d91c
SHA2568284772f28954a109c16f1583e6e34e29f06673b34e04f268bda961b57ba9f79
SHA512efd4900a49624170e51ea401f0845634f49484a49335845258dc3d41a12e2022bf413a6751fcbcfd1ec68cde506f3363beae57f20e8eaca8b214d28baa138c5b