Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe
Resource
win7-20231129-en
General
-
Target
a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe
-
Size
66KB
-
MD5
8f01c2ececfa92aaa29802c21f8bb018
-
SHA1
58ef3aa86c5b42642776a4ad3a779525e76a0fa0
-
SHA256
a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355
-
SHA512
a63a485623a734bbdbf4022351f9d11379dd71c3fcfbaaa8122e5b54697b81ab0466a8d2db14d53117b1d3b38935cc1fb876e9459f42606e1c54f3936960f16a
-
SSDEEP
768:mYBzh+Vxr1x5cE9Fl5pz8UOutDlMXaoSunjXWNNZ2KG6KzVSVxhMXYkUEt6HAkxV:/BNsrz8VuJlMXaDuiNf2kKzs2Irj5hN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2908 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1972 Logo1_.exe 2668 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe -
Loads dropped DLL 1 IoCs
pid Process 2908 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmprph.exe Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe Logo1_.exe File created C:\Program Files (x86)\Uninstall Information\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe File created C:\Windows\Logo1_.exe a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe 1972 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2792 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 28 PID 2936 wrote to memory of 2792 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 28 PID 2936 wrote to memory of 2792 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 28 PID 2936 wrote to memory of 2792 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 28 PID 2792 wrote to memory of 2712 2792 net.exe 30 PID 2792 wrote to memory of 2712 2792 net.exe 30 PID 2792 wrote to memory of 2712 2792 net.exe 30 PID 2792 wrote to memory of 2712 2792 net.exe 30 PID 2936 wrote to memory of 2908 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 31 PID 2936 wrote to memory of 2908 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 31 PID 2936 wrote to memory of 2908 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 31 PID 2936 wrote to memory of 2908 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 31 PID 2936 wrote to memory of 1972 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 33 PID 2936 wrote to memory of 1972 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 33 PID 2936 wrote to memory of 1972 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 33 PID 2936 wrote to memory of 1972 2936 a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe 33 PID 1972 wrote to memory of 2632 1972 Logo1_.exe 34 PID 1972 wrote to memory of 2632 1972 Logo1_.exe 34 PID 1972 wrote to memory of 2632 1972 Logo1_.exe 34 PID 1972 wrote to memory of 2632 1972 Logo1_.exe 34 PID 2908 wrote to memory of 2668 2908 cmd.exe 36 PID 2908 wrote to memory of 2668 2908 cmd.exe 36 PID 2908 wrote to memory of 2668 2908 cmd.exe 36 PID 2908 wrote to memory of 2668 2908 cmd.exe 36 PID 2632 wrote to memory of 2636 2632 net.exe 37 PID 2632 wrote to memory of 2636 2632 net.exe 37 PID 2632 wrote to memory of 2636 2632 net.exe 37 PID 2632 wrote to memory of 2636 2632 net.exe 37 PID 1972 wrote to memory of 2696 1972 Logo1_.exe 38 PID 1972 wrote to memory of 2696 1972 Logo1_.exe 38 PID 1972 wrote to memory of 2696 1972 Logo1_.exe 38 PID 1972 wrote to memory of 2696 1972 Logo1_.exe 38 PID 2696 wrote to memory of 2456 2696 net.exe 40 PID 2696 wrote to memory of 2456 2696 net.exe 40 PID 2696 wrote to memory of 2456 2696 net.exe 40 PID 2696 wrote to memory of 2456 2696 net.exe 40 PID 1972 wrote to memory of 1372 1972 Logo1_.exe 21 PID 1972 wrote to memory of 1372 1972 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe"C:\Users\Admin\AppData\Local\Temp\a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1BCA.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe"C:\Users\Admin\AppData\Local\Temp\a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe"4⤵
- Executes dropped EXE
PID:2668
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2456
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD55264aab343fc1f53c29d1065346d0010
SHA1db43bc0b28b4ada0c5635db50fd0b64410ab76ad
SHA256d33d56847b353c8207a43aa01cc75527328ebf4bba669e90e29266d1b6fb57dd
SHA512bb4ba1f7c5cae56cef564dd99f1a1fd3e2c656f8004f689a22ea641d886cbb3a19dde3dce5be4cf8cee4ce190170fd8c5390cb9c7c40ae54109559685119a958
-
Filesize
722B
MD56a7cecf700727c34a26ed1fe6ddaee6d
SHA194a7e448f17f93978a833e708e9e4b6cb9334637
SHA256209c35f854c48d45c185565189f6b2045c248b18ba3d3d2a43426cddb8aa1074
SHA512e56376d663288a04aeb1b74ca9a0f1603d90b6412e54f905ebe52b910b253d56527a2d79fe52b1908887b27a0407d26e55724f932eb0a2840a1694fbd75d4211
-
C:\Users\Admin\AppData\Local\Temp\a5f74f6bfb321220e04bb5e0fe02c2510543f96a9240471bc5fc33543a64e355.exe.exe
Filesize33KB
MD597ec61761e1fdfb2f1d4ea4d221a43d1
SHA1d6e1682a8dd967bdffe8c145731fb9ea1d0a3509
SHA2561f3069b596484ffa16181226b07c67ee1cb0f41d191ddde7c02f6bb75336cc52
SHA5127d34cc27dce09e2711d76f39c5f44525937ac15723aaedc303c154223f3ec42e6043374582614cc3067795781a2daf6ea8935f3f3b0a8747fa783cedf36090a9
-
Filesize
33KB
MD5d208b34bbac286d49a77081b20a5c951
SHA194341f108285312afa4cd4d6458804358b88e322
SHA2566d3b364072ac79af423a6fa1252424274b51e8c18a113e8f54e7d8a9413ae33a
SHA512e42039b533ec80a0b591bd6a4877c8c993eefdd7323a6fbb2d58b75188f085365c8f927f7079917fa18363f505f9ec400c0536f236248ca2809941dcd408aab0
-
Filesize
9B
MD503c36dbecb7f35761f80ba5fc5566da6
SHA1159b7733006187467bda251a1bbb278c141dceb6
SHA25685a53f5b976fb1c26ce14c31e93c1f68997d2d8b09ab9aa2b7e0d32b8e50ec3b
SHA512fe573085d2abef34adcede2f89b1c2810875ab00ef9ba27a1d95ed1dbe93e182fc53d981901a0b8048dd4eb5fdc852b8f0e0c3a0e1a404cbbe70e13a7a14104a