Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe
Resource
win7-20231129-en
General
-
Target
6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe
-
Size
81KB
-
MD5
9f4b3adf45b47795392f73eaf0ed7c51
-
SHA1
c51d070914af476d4f112d2c388c2df9ed64f63f
-
SHA256
6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c
-
SHA512
8436186a5755514bda6990cb613f332389f92de09b90094059b00b966a1120a10ece17952509a25a6f43b7724f8108a1db6c7b9c1b1210c6ffa6fee10a3b302c
-
SSDEEP
1536:ctTFsxN92ppTSahtA3AA2zHxvuS6YGJYjilZrPMC5V:c16NIv7Mw56Y0ZIC5V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2176 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2980 Logo1_.exe 2552 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe -
Loads dropped DLL 1 IoCs
pid Process 2176 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1042\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe File created C:\Windows\Logo1_.exe 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe 2980 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2168 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 28 PID 2856 wrote to memory of 2168 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 28 PID 2856 wrote to memory of 2168 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 28 PID 2856 wrote to memory of 2168 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 28 PID 2168 wrote to memory of 2864 2168 net.exe 30 PID 2168 wrote to memory of 2864 2168 net.exe 30 PID 2168 wrote to memory of 2864 2168 net.exe 30 PID 2168 wrote to memory of 2864 2168 net.exe 30 PID 2856 wrote to memory of 2176 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 31 PID 2856 wrote to memory of 2176 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 31 PID 2856 wrote to memory of 2176 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 31 PID 2856 wrote to memory of 2176 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 31 PID 2856 wrote to memory of 2980 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 33 PID 2856 wrote to memory of 2980 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 33 PID 2856 wrote to memory of 2980 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 33 PID 2856 wrote to memory of 2980 2856 6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe 33 PID 2980 wrote to memory of 3052 2980 Logo1_.exe 34 PID 2980 wrote to memory of 3052 2980 Logo1_.exe 34 PID 2980 wrote to memory of 3052 2980 Logo1_.exe 34 PID 2980 wrote to memory of 3052 2980 Logo1_.exe 34 PID 2176 wrote to memory of 2552 2176 cmd.exe 36 PID 2176 wrote to memory of 2552 2176 cmd.exe 36 PID 2176 wrote to memory of 2552 2176 cmd.exe 36 PID 2176 wrote to memory of 2552 2176 cmd.exe 36 PID 3052 wrote to memory of 2640 3052 net.exe 37 PID 3052 wrote to memory of 2640 3052 net.exe 37 PID 3052 wrote to memory of 2640 3052 net.exe 37 PID 3052 wrote to memory of 2640 3052 net.exe 37 PID 2980 wrote to memory of 2528 2980 Logo1_.exe 38 PID 2980 wrote to memory of 2528 2980 Logo1_.exe 38 PID 2980 wrote to memory of 2528 2980 Logo1_.exe 38 PID 2980 wrote to memory of 2528 2980 Logo1_.exe 38 PID 2528 wrote to memory of 2756 2528 net.exe 40 PID 2528 wrote to memory of 2756 2528 net.exe 40 PID 2528 wrote to memory of 2756 2528 net.exe 40 PID 2528 wrote to memory of 2756 2528 net.exe 40 PID 2980 wrote to memory of 1212 2980 Logo1_.exe 21 PID 2980 wrote to memory of 1212 2980 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe"C:\Users\Admin\AppData\Local\Temp\6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1822.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe"C:\Users\Admin\AppData\Local\Temp\6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe"4⤵
- Executes dropped EXE
PID:2552
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2640
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2756
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5d1b326bb608a3354437f032ccf3cee89
SHA158dd89d939e180fd84c30d4adbeaaaf8ebfbbb26
SHA25640e1de27dc92431138539f86ccd5b9f4dcdcdc6da4ef142a29dbf9043d69bce5
SHA51285771390400510a38b5bafb0eef63c1b11a5eeaaec9f5fbdcd735d6625971135d237a62f2f357ad912282151bfd351b901a0facd99e4f068f09e3716c8a7473a
-
Filesize
478KB
MD585bfd80e5e2a61689d1273c6efa51ccc
SHA18ae8a160124cc56983f24a933fbecdac08da435a
SHA256892cf1575e0cc60639951f9a5a37323f3ca7d06f335e8a39635c3b858596ea3c
SHA51296dd851f4d17a65aa6dfddfdc134a46d30b0417451b4c4b31092b66056cae59302d49b706294547e5766e347dc368ff4bd176d90376c5e2ad5c7a52aa8718a79
-
Filesize
722B
MD5ae8e46653b87c30df823c328e102002f
SHA13cee9373f05709e9824581ac9bdc282ba3a83e4b
SHA2560fcd40b8ff2c6b0f55db887bf5e4838b9beb90ce46f349dd2c0b7b090d056881
SHA512b4317f99594574928818c523063724a2147e6a24e37a33fac7811fc0e61fb50cdf4243d2307dc3501038231c48bf1f991424909f9ea10cef0fd2f50006870a45
-
C:\Users\Admin\AppData\Local\Temp\6e2ffbdb049d73be86b302b97588c9fb4f2dc0d0c21f9a41437c382b7318bf2c.exe.exe
Filesize48KB
MD5422a02111fabd3e229ffd105d6054f56
SHA17930d07dbc89c1113eec7cbd492daf3a025939b2
SHA2562d6bd317e34216f318ce9fb34fbc24e6260b1472930a8c0f126792f8ff821a9e
SHA512a46b5f8b6cb3cf2cb9714a0708ff63dfe4b543ab4a651f2b8ab93ce54ae77e8c7f6d67a8d9d4481957ada966f778ac6d1cceb24b1d8bbad2a6bca77b0bc9ea59
-
Filesize
33KB
MD5164dcc3e93f94c54763d5a450d132c2c
SHA1646517979f15f47744437e9f1a6e95a53dec3b69
SHA25663a6022b7d3ec4cd5355b8844bf1ef9f93363fbd9ee1a5d09815de70abda8cd6
SHA51233785e5e7c26af4d6a5ef5f2504200fd213c8eaf2204e828280fcdb955a032b87fc627cf1c32fdf11cc921715850151098c10691274cd8e78660b538f0381635
-
Filesize
9B
MD57d17b811a66f09661920bf5af1f95ae9
SHA1f974fb71f0c9242357d308243f16d5509a0fb040
SHA2561ffbf32a83283a76202c268eb3ea579c4b39aa6fb11fc42ad18318286fbf749c
SHA512019689bb28dd360a9b3fe6696944854f806ebe877734f4f8533f7c2508d371049a96f6c7bd5dda908ab91686dbfba4a54335cbc6c4d649775e62912f0af730e3