Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe
Resource
win10v2004-20240226-en
General
-
Target
d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe
-
Size
2.8MB
-
MD5
5fde9d0c604f3f9d8f0bb79dcccf461d
-
SHA1
b6b95a97c37c6e282c8d5218398240c4320f4230
-
SHA256
d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8
-
SHA512
559c7eee8a4a2a3555c76a2daf89633d00f6fe3a641fe61c0040c2ef65e1dfa598f718e20701a22a0bc3b55da214cc0a032b842ac3b6b2974c7786cfb3a6e8b1
-
SSDEEP
49152:l6gLKJuMarhVnMFwTH8/giBiBcbk4ZxZ2DqFeVMhuxcPh:4d1XdhBiiMa7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2360 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2700 Logo1_.exe 2716 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe -
Loads dropped DLL 1 IoCs
pid Process 2360 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jre7\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\PublicAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ku_IQ\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eo\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe File created C:\Windows\Logo1_.exe d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2260 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 28 PID 2408 wrote to memory of 2260 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 28 PID 2408 wrote to memory of 2260 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 28 PID 2408 wrote to memory of 2260 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 28 PID 2260 wrote to memory of 808 2260 net.exe 30 PID 2260 wrote to memory of 808 2260 net.exe 30 PID 2260 wrote to memory of 808 2260 net.exe 30 PID 2260 wrote to memory of 808 2260 net.exe 30 PID 2408 wrote to memory of 2360 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 31 PID 2408 wrote to memory of 2360 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 31 PID 2408 wrote to memory of 2360 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 31 PID 2408 wrote to memory of 2360 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 31 PID 2408 wrote to memory of 2700 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 33 PID 2408 wrote to memory of 2700 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 33 PID 2408 wrote to memory of 2700 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 33 PID 2408 wrote to memory of 2700 2408 d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe 33 PID 2700 wrote to memory of 2712 2700 Logo1_.exe 34 PID 2700 wrote to memory of 2712 2700 Logo1_.exe 34 PID 2700 wrote to memory of 2712 2700 Logo1_.exe 34 PID 2700 wrote to memory of 2712 2700 Logo1_.exe 34 PID 2712 wrote to memory of 2988 2712 net.exe 36 PID 2712 wrote to memory of 2988 2712 net.exe 36 PID 2712 wrote to memory of 2988 2712 net.exe 36 PID 2712 wrote to memory of 2988 2712 net.exe 36 PID 2700 wrote to memory of 2748 2700 Logo1_.exe 38 PID 2700 wrote to memory of 2748 2700 Logo1_.exe 38 PID 2700 wrote to memory of 2748 2700 Logo1_.exe 38 PID 2700 wrote to memory of 2748 2700 Logo1_.exe 38 PID 2748 wrote to memory of 2596 2748 net.exe 40 PID 2748 wrote to memory of 2596 2748 net.exe 40 PID 2748 wrote to memory of 2596 2748 net.exe 40 PID 2748 wrote to memory of 2596 2748 net.exe 40 PID 2700 wrote to memory of 1196 2700 Logo1_.exe 21 PID 2700 wrote to memory of 1196 2700 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe"C:\Users\Admin\AppData\Local\Temp\d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:808
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a29A0.bat3⤵
- Deletes itself
- Loads dropped DLL
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe"C:\Users\Admin\AppData\Local\Temp\d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe"4⤵
- Executes dropped EXE
PID:2716
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2988
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2596
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5ded2175b2df67275abae4ba15944c7c6
SHA115e16af64183f29b566f558c36802e3e34e1205d
SHA2561e717899d86e8cf36ad797b533b4a43a58f9aba162dd8b4d4ee48ed6af64e16a
SHA5125d97130a356fd02f2837680b6d0b0d9c8e2ab37e6a167898acb29b44f35b7feb0d29f6dd2cde547255ba7e83e89ff9563edfe2f2781de84e4e99716c7a6a56b2
-
Filesize
478KB
MD5ec52a7c41d8fe6a425af4a49d3ff8692
SHA106d3654358703be938fcee47e29e38ee38702b59
SHA25645b71822efada34915ef05af5fa772700dc0981a7ec84b5f3ff938fc522e2e48
SHA512f3cd793d93823527a7dce92032774f0b4b8656ba5234251f27c4ff203811a54649b93c12bff4e374d3950652897b0e1c51845caea57c86593d45cc3d060b348b
-
Filesize
722B
MD5c7564b7f576eeaa753ce73d3a5fec0c5
SHA1b54399e747265eb983271eede59a73e9f07d66a1
SHA2560e5e0b0add29b9933ba5885189ccebc9a01a1213fbb04e8f924678767616c926
SHA5120b2c5bcf76d0238010b099ba5468adf65b7070df000328c0d179e29b32ce680b96d7b8d92330438221174f4eb30d8e502b48702491527568e8e4e5adb72723b3
-
C:\Users\Admin\AppData\Local\Temp\d508eebaa8bf7cf2592b0355d3f11abf871ba1156919055e06f3c7e52246a9c8.exe.exe
Filesize2.8MB
MD5095092f4e746810c5829038d48afd55a
SHA1246eb3d41194dddc826049bbafeb6fc522ec044a
SHA2562f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588
SHA5127f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400
-
Filesize
33KB
MD502ae2f4f874cd3f8b010ee3e202c593a
SHA1bd9f1e0c977439f32db2d9368f2741eba46d68dc
SHA256b5a4af62bd47eb59cb99abef2d20aefc03881f37fbec23eb45a786ab9b889efe
SHA5128d93eff82209c4934b53f461d8730b9b09e0f353f272cbc4ea81b538f2b3e30eafbc5df8c30a27ba20d1a79a0204063f217f8bb0b4a9497ebb62bc91101ecd83
-
Filesize
8B
MD587cbd7a2d7bdb443a36ecfb46e39db18
SHA112aac09be13003e857809ea9434c76126ac39bbf
SHA256fe5e34894849bd441c429cfd17e62e06b828a82b04c9f0e7cadd884d78b326e1
SHA51275b0b484285909c577f97dd2b748e8b6e905b2a37dc8a569519325e67cac8b8932fbbd52c754df787e2a6326a9ca575e5d37372a9635718a310c642457ed17e0