Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe
Resource
win7-20240611-en
General
-
Target
08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe
-
Size
491KB
-
MD5
8d4898f677252c2953ab6c5b8af822ce
-
SHA1
3293eb54e3dc333a25619fe246eaa266ab38babc
-
SHA256
08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1
-
SHA512
296cbf44843f178ca82ade8674a89e91b431fa26e6ada263aa5ffb738e39bfe638082305673f803d5f3b8fa8885e1b785a5fca609c60deed12b3570fcdb2c3c5
-
SSDEEP
6144:rqulrz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fayCV4:rd1gL5pRTcAkS/3hzN8qE43fm78V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2760 Logo1_.exe 2808 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe -
Loads dropped DLL 1 IoCs
pid Process 2740 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\_desktop.ini Logo1_.exe File created C:\Program Files\Uninstall Information\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca@valencia\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe 2760 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2396 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 28 PID 2872 wrote to memory of 2396 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 28 PID 2872 wrote to memory of 2396 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 28 PID 2872 wrote to memory of 2396 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 28 PID 2396 wrote to memory of 2776 2396 net.exe 30 PID 2396 wrote to memory of 2776 2396 net.exe 30 PID 2396 wrote to memory of 2776 2396 net.exe 30 PID 2396 wrote to memory of 2776 2396 net.exe 30 PID 2872 wrote to memory of 2740 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 31 PID 2872 wrote to memory of 2740 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 31 PID 2872 wrote to memory of 2740 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 31 PID 2872 wrote to memory of 2740 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 31 PID 2872 wrote to memory of 2760 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 33 PID 2872 wrote to memory of 2760 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 33 PID 2872 wrote to memory of 2760 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 33 PID 2872 wrote to memory of 2760 2872 08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe 33 PID 2740 wrote to memory of 2808 2740 cmd.exe 35 PID 2740 wrote to memory of 2808 2740 cmd.exe 35 PID 2740 wrote to memory of 2808 2740 cmd.exe 35 PID 2740 wrote to memory of 2808 2740 cmd.exe 35 PID 2760 wrote to memory of 2840 2760 Logo1_.exe 34 PID 2760 wrote to memory of 2840 2760 Logo1_.exe 34 PID 2760 wrote to memory of 2840 2760 Logo1_.exe 34 PID 2760 wrote to memory of 2840 2760 Logo1_.exe 34 PID 2840 wrote to memory of 2556 2840 net.exe 37 PID 2840 wrote to memory of 2556 2840 net.exe 37 PID 2840 wrote to memory of 2556 2840 net.exe 37 PID 2840 wrote to memory of 2556 2840 net.exe 37 PID 2760 wrote to memory of 2392 2760 Logo1_.exe 38 PID 2760 wrote to memory of 2392 2760 Logo1_.exe 38 PID 2760 wrote to memory of 2392 2760 Logo1_.exe 38 PID 2760 wrote to memory of 2392 2760 Logo1_.exe 38 PID 2392 wrote to memory of 1188 2392 net.exe 40 PID 2392 wrote to memory of 1188 2392 net.exe 40 PID 2392 wrote to memory of 1188 2392 net.exe 40 PID 2392 wrote to memory of 1188 2392 net.exe 40 PID 2760 wrote to memory of 1224 2760 Logo1_.exe 21 PID 2760 wrote to memory of 1224 2760 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe"C:\Users\Admin\AppData\Local\Temp\08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1DAE.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe"C:\Users\Admin\AppData\Local\Temp\08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe"4⤵
- Executes dropped EXE
PID:2808
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2556
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1188
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5920aa02bc54d3ba29c445e3a171fc5ea
SHA11c58fd6fdfa1c582a442a34d4725d61a850b0363
SHA25605867d8f2ececd59d608188da2ce1a18fa0bc388c4896778c1909e36039db537
SHA5129d34fa3a6f4111d95c7086d31984dd6fdd606a50e567f4f75d798e5a8bebcfbe2952056cc23fcdd0d6e51780f7dd1dd41101a1f067bbbb7002710d59d40d0a3c
-
Filesize
478KB
MD585bfd80e5e2a61689d1273c6efa51ccc
SHA18ae8a160124cc56983f24a933fbecdac08da435a
SHA256892cf1575e0cc60639951f9a5a37323f3ca7d06f335e8a39635c3b858596ea3c
SHA51296dd851f4d17a65aa6dfddfdc134a46d30b0417451b4c4b31092b66056cae59302d49b706294547e5766e347dc368ff4bd176d90376c5e2ad5c7a52aa8718a79
-
Filesize
722B
MD5961b5d98aadb9481aa0da2b4a98d80fa
SHA15e14a67e1be8dae262911201d72c517e29cc53cc
SHA25692d5929efc71cf46f1d4c01b722d55c22e31132d60eaf0208154118e207df9a5
SHA5129d5728c4081970f74e6c159ddc1820b7c9c7aaf0129cbb2866435b91363f9c7a9fe50c30a0add9f20f0c725d851525cc8e1e4ad53276286e57e6555256f18844
-
C:\Users\Admin\AppData\Local\Temp\08c798996ada4602afc5bf6e8e280c310e9bd2b161eee0e0bbe4d490d20c4ab1.exe.exe
Filesize458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
33KB
MD5933403c035bedeaf409ff1a3d7bb394f
SHA127765fb7a74adda8b6b4d740a79e83fca3301e79
SHA25611a73da3698c3448e24744bdc72a155bb756676dcc7e03264d723ca91ce87a54
SHA51236f17b6beb74f2d11cf74a211719c0ab5c09ad289055917168cdb1d3355cfdf2cd917f008e3c8b51d408d1f6dd1fdda692e50c6dcbeeaf4917adad7cc769b2d0
-
Filesize
8B
MD587cbd7a2d7bdb443a36ecfb46e39db18
SHA112aac09be13003e857809ea9434c76126ac39bbf
SHA256fe5e34894849bd441c429cfd17e62e06b828a82b04c9f0e7cadd884d78b326e1
SHA51275b0b484285909c577f97dd2b748e8b6e905b2a37dc8a569519325e67cac8b8932fbbd52c754df787e2a6326a9ca575e5d37372a9635718a310c642457ed17e0