Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe
Resource
win7-20240611-en
General
-
Target
1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe
-
Size
93KB
-
MD5
a1d1ea48d0c92c08c99cc67c1f58c5db
-
SHA1
873ececf800bd639b0583bae2641df02f58c36da
-
SHA256
1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719
-
SHA512
8c4d79e2c47e71e23631b633270cdc5a07be1a1b9888520ee3c7dd77345fa4079f47eabdbf5d38039d8246aebc41f86fcfcbf3a351a3410975a8c1f4a9e853c0
-
SSDEEP
1536:ctTFsxN92ppTSahtA3AWHB0UxMkzOt7HcvJGt5AdHIOWnToIf12Z9:c16NIv7MwWhAWJGSCTBf12Z9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2776 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2848 Logo1_.exe 2688 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe -
Loads dropped DLL 2 IoCs
pid Process 2776 cmd.exe 2776 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EURO\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SUMIPNTG\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Internet Explorer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or_IN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe File created C:\Windows\Logo1_.exe 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2424 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 28 PID 2368 wrote to memory of 2424 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 28 PID 2368 wrote to memory of 2424 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 28 PID 2368 wrote to memory of 2424 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 28 PID 2424 wrote to memory of 2892 2424 net.exe 30 PID 2424 wrote to memory of 2892 2424 net.exe 30 PID 2424 wrote to memory of 2892 2424 net.exe 30 PID 2424 wrote to memory of 2892 2424 net.exe 30 PID 2368 wrote to memory of 2776 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 31 PID 2368 wrote to memory of 2776 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 31 PID 2368 wrote to memory of 2776 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 31 PID 2368 wrote to memory of 2776 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 31 PID 2368 wrote to memory of 2848 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 33 PID 2368 wrote to memory of 2848 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 33 PID 2368 wrote to memory of 2848 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 33 PID 2368 wrote to memory of 2848 2368 1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe 33 PID 2848 wrote to memory of 2880 2848 Logo1_.exe 34 PID 2848 wrote to memory of 2880 2848 Logo1_.exe 34 PID 2848 wrote to memory of 2880 2848 Logo1_.exe 34 PID 2848 wrote to memory of 2880 2848 Logo1_.exe 34 PID 2776 wrote to memory of 2688 2776 cmd.exe 36 PID 2776 wrote to memory of 2688 2776 cmd.exe 36 PID 2776 wrote to memory of 2688 2776 cmd.exe 36 PID 2776 wrote to memory of 2688 2776 cmd.exe 36 PID 2880 wrote to memory of 2596 2880 net.exe 37 PID 2880 wrote to memory of 2596 2880 net.exe 37 PID 2880 wrote to memory of 2596 2880 net.exe 37 PID 2880 wrote to memory of 2596 2880 net.exe 37 PID 2848 wrote to memory of 2972 2848 Logo1_.exe 38 PID 2848 wrote to memory of 2972 2848 Logo1_.exe 38 PID 2848 wrote to memory of 2972 2848 Logo1_.exe 38 PID 2848 wrote to memory of 2972 2848 Logo1_.exe 38 PID 2972 wrote to memory of 2616 2972 net.exe 40 PID 2972 wrote to memory of 2616 2972 net.exe 40 PID 2972 wrote to memory of 2616 2972 net.exe 40 PID 2972 wrote to memory of 2616 2972 net.exe 40 PID 2848 wrote to memory of 1232 2848 Logo1_.exe 21 PID 2848 wrote to memory of 1232 2848 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe"C:\Users\Admin\AppData\Local\Temp\1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1239.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe"C:\Users\Admin\AppData\Local\Temp\1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe"4⤵
- Executes dropped EXE
PID:2688
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2596
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2616
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5d1b326bb608a3354437f032ccf3cee89
SHA158dd89d939e180fd84c30d4adbeaaaf8ebfbbb26
SHA25640e1de27dc92431138539f86ccd5b9f4dcdcdc6da4ef142a29dbf9043d69bce5
SHA51285771390400510a38b5bafb0eef63c1b11a5eeaaec9f5fbdcd735d6625971135d237a62f2f357ad912282151bfd351b901a0facd99e4f068f09e3716c8a7473a
-
Filesize
478KB
MD585bfd80e5e2a61689d1273c6efa51ccc
SHA18ae8a160124cc56983f24a933fbecdac08da435a
SHA256892cf1575e0cc60639951f9a5a37323f3ca7d06f335e8a39635c3b858596ea3c
SHA51296dd851f4d17a65aa6dfddfdc134a46d30b0417451b4c4b31092b66056cae59302d49b706294547e5766e347dc368ff4bd176d90376c5e2ad5c7a52aa8718a79
-
Filesize
722B
MD58c53a688dc74b4022a8acd4f332bb7d9
SHA17657bf33847523098913884569892c387c0b2027
SHA256a0e12fd43a9be49cfc75ee59f52e759a406cc424ae449d9a3f4d7954cfa979cd
SHA51268874516b3b43e846ab661d1accd865001052433e2d7693dd7608c8ff8691e18ce4ec425082314f2876b33446a30f2d56fcf25ff3312f3630bae74824cfdd21e
-
C:\Users\Admin\AppData\Local\Temp\1904a2fe3d552407465d90c186bda07d4c353733358834919faf5a4162167719.exe.exe
Filesize60KB
MD5ed0fde686788caec4f2cb1ec9c31680c
SHA181ae63b87eaa9fa5637835d2122c50953ae19d34
SHA256e362670f93cdd952335b1a41e5529f184f2022ea4d41817a9781b150b062511c
SHA512d90d5e74a9be23816a93490ed30c0aae9f7f038a42bd14aa2ce78e95967b4aabd848f006f00ade619c9976755658d45aa0f5b6d5babbbb2d59a6ed3a3a12ac6b
-
Filesize
33KB
MD5164dcc3e93f94c54763d5a450d132c2c
SHA1646517979f15f47744437e9f1a6e95a53dec3b69
SHA25663a6022b7d3ec4cd5355b8844bf1ef9f93363fbd9ee1a5d09815de70abda8cd6
SHA51233785e5e7c26af4d6a5ef5f2504200fd213c8eaf2204e828280fcdb955a032b87fc627cf1c32fdf11cc921715850151098c10691274cd8e78660b538f0381635
-
Filesize
9B
MD57d17b811a66f09661920bf5af1f95ae9
SHA1f974fb71f0c9242357d308243f16d5509a0fb040
SHA2561ffbf32a83283a76202c268eb3ea579c4b39aa6fb11fc42ad18318286fbf749c
SHA512019689bb28dd360a9b3fe6696944854f806ebe877734f4f8533f7c2508d371049a96f6c7bd5dda908ab91686dbfba4a54335cbc6c4d649775e62912f0af730e3