Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe
Resource
win7-20240221-en
General
-
Target
dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe
-
Size
47KB
-
MD5
7169d6cb382e09e229ca8025a02d77f6
-
SHA1
4983fcab1e9911ecdaa1135cb902efb6b9cfa69b
-
SHA256
dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d
-
SHA512
f105009f3b5eba801fb6bf57619135303e65d63ade5d7ef361dced9fed954bbe502a82dbfe8786310d003b600dbafad5840df812da58394f2a774a78b0e6e83f
-
SSDEEP
768:ivO5RroZJ767395uINRUiGNZTizgbbDyWQ3655Kv1X/qY1MSd:ive+Zk77RN5glbGHqaNrFd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2796 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2456 Logo1_.exe 1708 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe -
Loads dropped DLL 1 IoCs
pid Process 2796 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VC\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe Logo1_.exe File created C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe File created C:\Windows\Logo1_.exe dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe 2456 Logo1_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1708 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2212 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 28 PID 1688 wrote to memory of 2212 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 28 PID 1688 wrote to memory of 2212 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 28 PID 1688 wrote to memory of 2212 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 28 PID 2212 wrote to memory of 2728 2212 net.exe 30 PID 2212 wrote to memory of 2728 2212 net.exe 30 PID 2212 wrote to memory of 2728 2212 net.exe 30 PID 2212 wrote to memory of 2728 2212 net.exe 30 PID 1688 wrote to memory of 2796 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 31 PID 1688 wrote to memory of 2796 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 31 PID 1688 wrote to memory of 2796 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 31 PID 1688 wrote to memory of 2796 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 31 PID 1688 wrote to memory of 2456 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 33 PID 1688 wrote to memory of 2456 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 33 PID 1688 wrote to memory of 2456 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 33 PID 1688 wrote to memory of 2456 1688 dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe 33 PID 2456 wrote to memory of 2680 2456 Logo1_.exe 34 PID 2456 wrote to memory of 2680 2456 Logo1_.exe 34 PID 2456 wrote to memory of 2680 2456 Logo1_.exe 34 PID 2456 wrote to memory of 2680 2456 Logo1_.exe 34 PID 2796 wrote to memory of 1708 2796 cmd.exe 36 PID 2796 wrote to memory of 1708 2796 cmd.exe 36 PID 2796 wrote to memory of 1708 2796 cmd.exe 36 PID 2796 wrote to memory of 1708 2796 cmd.exe 36 PID 2796 wrote to memory of 1708 2796 cmd.exe 36 PID 2796 wrote to memory of 1708 2796 cmd.exe 36 PID 2796 wrote to memory of 1708 2796 cmd.exe 36 PID 2680 wrote to memory of 2708 2680 net.exe 37 PID 2680 wrote to memory of 2708 2680 net.exe 37 PID 2680 wrote to memory of 2708 2680 net.exe 37 PID 2680 wrote to memory of 2708 2680 net.exe 37 PID 2456 wrote to memory of 2476 2456 Logo1_.exe 38 PID 2456 wrote to memory of 2476 2456 Logo1_.exe 38 PID 2456 wrote to memory of 2476 2456 Logo1_.exe 38 PID 2456 wrote to memory of 2476 2456 Logo1_.exe 38 PID 2476 wrote to memory of 2908 2476 net.exe 40 PID 2476 wrote to memory of 2908 2476 net.exe 40 PID 2476 wrote to memory of 2908 2476 net.exe 40 PID 2476 wrote to memory of 2908 2476 net.exe 40 PID 2456 wrote to memory of 1208 2456 Logo1_.exe 21 PID 2456 wrote to memory of 1208 2456 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe"C:\Users\Admin\AppData\Local\Temp\dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2202.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe"C:\Users\Admin\AppData\Local\Temp\dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1708
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2708
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2908
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD556c94f1c35b2411a39625b2086fb411e
SHA15f252eeba687c78f2f085a9b3679d2c6d40c6023
SHA2562d7bbb1e7a50ce2fdbc4f4683127c424c7532395a2ec7e318ebd71a1cf965384
SHA5120e06e00f548fea442ca13fe010b43bf52a4df195064316840ed74c97543a8c50de7fde349c4b5a2a38dc3ea060deb24ab624ff926bdd369750021e5bd7845925
-
Filesize
478KB
MD5160d72907ba08c09bb389bd2103dc2e7
SHA1c17e093c36fdf4ebe8739d16412df3a46f47f152
SHA256c6947429cc3df873c25ca1a9ef6c2a7f01668728fb779c38cf6c78e8c0d825fd
SHA512572160d80583f13bb3140bdb7f6ae4625498a3d464f7b1f32ef6ed5c11bfa443ede6e5aa10a5d574032c199612b1a1e03fa2103fc67ba730dd54b75146119817
-
Filesize
722B
MD5617c5f4de8b7af5fc31a0e90831e35a8
SHA1d9ab50bcb396504d6501cdf19e2e19f19471b4cb
SHA256cf5aa9dd05a90f3d7dbc7ad681191b7d829d289d08e978a15cc8521fc9b9b1dc
SHA51236eddb1b9f5d61ca1418dc72b18b61b996b2e964baeaa88890f649dd25b4652515a20eaeb4d153df8c240c078db2f432b5393e0556af915b730dc95be83ebc5b
-
C:\Users\Admin\AppData\Local\Temp\dfe7dd18ae349f69172bdc35bd51488ad9581f302e4e88c892cb5927cfa1535d.exe.exe
Filesize14KB
MD5ad782ffac62e14e2269bf1379bccbaae
SHA19539773b550e902a35764574a2be2d05bc0d8afc
SHA2561c8a77db924ebeb952052334dc95add388700c02b073b07973cd8fe0a0a360b8
SHA512a1e9d6316ffc55f4751090961733e98c93b2a391666ff50b50e9dea39783746e501d14127e7ee9343926976d7e3cd224f13736530354d8466ea995dab35c8dc2
-
Filesize
33KB
MD504a42e417c2372e055e78c0dc6be9976
SHA162478726f35dab9093b03e001d314a76fec10563
SHA256740c02754a86ee5a079b749453e50bb48e10d3008608f40e68b82beb3da3f065
SHA512311b1551709b92926d644e3ac823f9f17e645b702030368b291a06d540c6d348ea580caa693eb1af2e9cb5b4578ed1a8f55aedc8f5cdccabdd79a745c00c96d7
-
Filesize
9B
MD51884bfdeea71ff22db39c196f4447c9c
SHA13eafc7e6e17ba6ce7a087a3588fb1efb596da038
SHA256163167bc5a01ad6b3ed4406c2a9a1baaf2c0ef4620ab7d5b39aeddf976ca776d
SHA512b22124aa3a912462e6face7f71ad3dfec4b27dab16b2e20e3a0adc277f89f631ec889c91b185ac4b9b670933d881b8fd26c25d6f405e465aa8148cdbb7f7c3e2