Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe
Resource
win7-20240508-en
General
-
Target
87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe
-
Size
5.7MB
-
MD5
e9940858b5ee06d4f0f9769a0ad3e886
-
SHA1
9ccf251a137220d86cb26de950baf137e72aa2c9
-
SHA256
87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7
-
SHA512
4839dded2e73a52b92a7d7be321361a6efefb9b26140a0dc0caf87ec52329e9579f61b27f409d571129110b47a38f6aa9b88ec7a7ad5cf2e8c10f7d8685077b1
-
SSDEEP
49152:9d+Pv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTP:9dAKUgTH2M2m9UMpu1QfLczqssnKSk
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
pid Process 2592 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2616 Logo1_.exe 2748 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe -
Loads dropped DLL 1 IoCs
pid Process 2592 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\FreeCell\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1042\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PrivateAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe File created C:\Windows\Logo1_.exe 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2984 wrote to memory of 1428 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 28 PID 2984 wrote to memory of 1428 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 28 PID 2984 wrote to memory of 1428 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 28 PID 2984 wrote to memory of 1428 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 28 PID 1428 wrote to memory of 2180 1428 net.exe 30 PID 1428 wrote to memory of 2180 1428 net.exe 30 PID 1428 wrote to memory of 2180 1428 net.exe 30 PID 1428 wrote to memory of 2180 1428 net.exe 30 PID 2984 wrote to memory of 2592 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 31 PID 2984 wrote to memory of 2592 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 31 PID 2984 wrote to memory of 2592 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 31 PID 2984 wrote to memory of 2592 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 31 PID 2984 wrote to memory of 2616 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 33 PID 2984 wrote to memory of 2616 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 33 PID 2984 wrote to memory of 2616 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 33 PID 2984 wrote to memory of 2616 2984 87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe 33 PID 2616 wrote to memory of 2612 2616 Logo1_.exe 34 PID 2616 wrote to memory of 2612 2616 Logo1_.exe 34 PID 2616 wrote to memory of 2612 2616 Logo1_.exe 34 PID 2616 wrote to memory of 2612 2616 Logo1_.exe 34 PID 2612 wrote to memory of 2648 2612 net.exe 37 PID 2612 wrote to memory of 2648 2612 net.exe 37 PID 2612 wrote to memory of 2648 2612 net.exe 37 PID 2612 wrote to memory of 2648 2612 net.exe 37 PID 2616 wrote to memory of 2524 2616 Logo1_.exe 38 PID 2616 wrote to memory of 2524 2616 Logo1_.exe 38 PID 2616 wrote to memory of 2524 2616 Logo1_.exe 38 PID 2616 wrote to memory of 2524 2616 Logo1_.exe 38 PID 2524 wrote to memory of 2400 2524 net.exe 40 PID 2524 wrote to memory of 2400 2524 net.exe 40 PID 2524 wrote to memory of 2400 2524 net.exe 40 PID 2524 wrote to memory of 2400 2524 net.exe 40 PID 2616 wrote to memory of 1216 2616 Logo1_.exe 21 PID 2616 wrote to memory of 1216 2616 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe"C:\Users\Admin\AppData\Local\Temp\87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a3DBC.bat3⤵
- Deletes itself
- Loads dropped DLL
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe"C:\Users\Admin\AppData\Local\Temp\87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe"4⤵
- Executes dropped EXE
PID:2748
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2648
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2400
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5159d118fb71764ddba5b2b399afc2968
SHA1183d2bef4d041a18ce2db45aff24b1bae5c7cf64
SHA2564716c91e0dba7b83006ab7012d0b910e7131934d13f45ef8c9cd36a55a7e25a5
SHA51217d465442659eacc06f8b5958e5c6fdfdb15808a56110f4a8f89d0d7644e88208ec81480d21452c09aa7817a1da93fa8536b0431544b56fff3dcfa45c0163e79
-
Filesize
478KB
MD5db764a6fc7542a9957d748715344c062
SHA1cabe984ec76ae92718ce9ad0362ec35d6abf4c9b
SHA256f8ba3098b75413ee7d285b68d8f63ef7ef40e997c0d506d89785ff5777a4a590
SHA512f6e1416e896d3f4b7d8035d783dc051bdf64172d0af8d79f38f68b664110b635acea36313f656f1194beb2fc8da711ba09cdc4635db723408487a35c21d54f90
-
Filesize
722B
MD5a6af6d8767bea9e53edda46e02f7eec7
SHA1421245e829df54231c35e2ebb54d3d1d2661e05f
SHA2563a9f844bc95cc3aa9171a19f1a8d6e44de6537b2f9d3432f9a98c58043ce0c3e
SHA5120f0f191bd04e8e66f623c64cab0adf32635b9b8b86610b1f6e9f6eb244dafc4a7e75f880959d770f7dab432ae221e274bd17c7285e001f8c07439b127f8b183f
-
C:\Users\Admin\AppData\Local\Temp\87c067966525383be9e85c1cc446e0f40436973eae09f78f5edc1d699763eae7.exe.exe
Filesize5.7MB
MD5ba18e99b3e17adb5b029eaebc457dd89
SHA1ec0458f3c00d35b323f08d4e1cc2e72899429c38
SHA256f5ee36de8edf9be2ac2752b219cfdcb7ca1677071b8e116cb876306e9f1b6628
SHA5121f41929e6f5b555b60c411c7810cbf14e3af26100df5ac4533ec3739a278c1b925687284660efb4868e3741305098e2737836229efc9fe46c97a6057c10e677c
-
Filesize
33KB
MD5e0f9a37b72e5e3237cb283d20651e2db
SHA1b1055194f19a5777e7e5d2195e807886c71fb3cc
SHA2569676ec4967a7fb53d0f71547bd3017ce0325262a26ff4dd373671f9837edfdee
SHA512da154ddd63b27cc028128f53acac7ba0b72fb159cd0024b48666af0fa1777409c010272fe1d5524804cec9247ff3502ebde13f4bc0db82b5859a394524f67533
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
8B
MD56890820ebb29213eaf25c92e56fd41ee
SHA1b926083cf18461657f09f2a4af604f8fafa4ae29
SHA256ddb532e0e9d9e9a382d9f92ef1e5e26eba608b5f3335f1b711d99044240af3f9
SHA5125ebefef8f75ecb9fce8854606cb41402dabf66347ddbbd1075f5b94a5794fc4ca240c615eee930a6eedfd117e011afd8772aba2db2c83df0f376c84e8f512cda