Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe
Resource
win7-20240508-en
General
-
Target
a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe
-
Size
187KB
-
MD5
dd32e3ceece8dc50df275ef9a64e00eb
-
SHA1
8382ec050cb9505a6611d0473c5f14f7cbba83e6
-
SHA256
a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc
-
SHA512
f15bd8099d7eea8bb4551ce4c19bdab3cffd096bc54119b802cb832ccb6f7d901f96a8cc71f2f7f0fe4df3b34bbb60d464bb3212f1a1ed9ff678a054a4bf4397
-
SSDEEP
3072:2iaY46tGNttyeQLYm1JE4yr9JKfzg5YGSYadyL+PRlndUdlKu4E+jZqMN6:546tGdye41Fyr9YfzzGBz+JJd5vv6
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2688 Logo1_.exe 2260 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe -
Loads dropped DLL 1 IoCs
pid Process 2648 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\sw\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eo\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe Logo1_.exe File created C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\Office14\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe File created C:\Windows\Logo1_.exe a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe 2688 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2224 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 28 PID 1776 wrote to memory of 2224 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 28 PID 1776 wrote to memory of 2224 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 28 PID 1776 wrote to memory of 2224 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 28 PID 2224 wrote to memory of 2868 2224 net.exe 30 PID 2224 wrote to memory of 2868 2224 net.exe 30 PID 2224 wrote to memory of 2868 2224 net.exe 30 PID 2224 wrote to memory of 2868 2224 net.exe 30 PID 1776 wrote to memory of 2648 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 31 PID 1776 wrote to memory of 2648 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 31 PID 1776 wrote to memory of 2648 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 31 PID 1776 wrote to memory of 2648 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 31 PID 1776 wrote to memory of 2688 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 33 PID 1776 wrote to memory of 2688 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 33 PID 1776 wrote to memory of 2688 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 33 PID 1776 wrote to memory of 2688 1776 a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe 33 PID 2688 wrote to memory of 2628 2688 Logo1_.exe 34 PID 2688 wrote to memory of 2628 2688 Logo1_.exe 34 PID 2688 wrote to memory of 2628 2688 Logo1_.exe 34 PID 2688 wrote to memory of 2628 2688 Logo1_.exe 34 PID 2648 wrote to memory of 2260 2648 cmd.exe 36 PID 2648 wrote to memory of 2260 2648 cmd.exe 36 PID 2648 wrote to memory of 2260 2648 cmd.exe 36 PID 2648 wrote to memory of 2260 2648 cmd.exe 36 PID 2628 wrote to memory of 2664 2628 net.exe 37 PID 2628 wrote to memory of 2664 2628 net.exe 37 PID 2628 wrote to memory of 2664 2628 net.exe 37 PID 2628 wrote to memory of 2664 2628 net.exe 37 PID 2688 wrote to memory of 2728 2688 Logo1_.exe 38 PID 2688 wrote to memory of 2728 2688 Logo1_.exe 38 PID 2688 wrote to memory of 2728 2688 Logo1_.exe 38 PID 2688 wrote to memory of 2728 2688 Logo1_.exe 38 PID 2728 wrote to memory of 2196 2728 net.exe 40 PID 2728 wrote to memory of 2196 2728 net.exe 40 PID 2728 wrote to memory of 2196 2728 net.exe 40 PID 2728 wrote to memory of 2196 2728 net.exe 40 PID 2688 wrote to memory of 1208 2688 Logo1_.exe 21 PID 2688 wrote to memory of 1208 2688 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe"C:\Users\Admin\AppData\Local\Temp\a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1A06.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe"C:\Users\Admin\AppData\Local\Temp\a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe"4⤵
- Executes dropped EXE
PID:2260
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2664
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2196
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5e9ae0e602530e00541d729e159c8d19c
SHA10bd4f58be99a83ab73316637186170f7b2cc0ede
SHA2565f92d40acd8a863d5eb0319ea9db2a0b1e440d906e0810002a7afa4761a66f6e
SHA5128242678307fc559992316f5ca53df0ed2c030a9d7f056c23ca3d03ed8fa5c28f253d7148e67b8ec5bae20537946bb719c9959ca8858631a9a3b36d04650cd2a3
-
Filesize
478KB
MD5db764a6fc7542a9957d748715344c062
SHA1cabe984ec76ae92718ce9ad0362ec35d6abf4c9b
SHA256f8ba3098b75413ee7d285b68d8f63ef7ef40e997c0d506d89785ff5777a4a590
SHA512f6e1416e896d3f4b7d8035d783dc051bdf64172d0af8d79f38f68b664110b635acea36313f656f1194beb2fc8da711ba09cdc4635db723408487a35c21d54f90
-
Filesize
722B
MD5f08a53ad4c8ccae0b49280601039d379
SHA1c510f3189e94a55842e8dc9aa76313fed1b8d336
SHA2566b8e2d9ae3d19d50dcc7f4107008f99bc765316c9f031f140279856802579d06
SHA5125c1bce921d28e043bed2db180e0f371fa1723b5cd7d01f04bd073351d6b82befa5f7a7a630f5027c2927310e6f8f5aff30c74db7429e25b6992b1c7d37104394
-
C:\Users\Admin\AppData\Local\Temp\a28f7ff1aa85e86b58bc19314340205163ad773777e8c37258268e3b0fc6c0cc.exe.exe
Filesize153KB
MD57030c9615c98953c481553671dd7b9e5
SHA1c83224286ade28626c6dafe3b91301fe7f2d728b
SHA256b16e1af7d41d73ea65b88544ed47990c192c41ffa8e11b78e18c9f74221311b1
SHA5125eb5d804e81c81af9b948ea21b2e08dbefbb52f8239437deb28e3c9ccb59d50a57467b194b01469d81bc6f6ae58b97dff0c86ac8f6546bd1188d67aa10956e03
-
Filesize
33KB
MD5831af9e5c2f307e3bcc422547a18c85d
SHA12789cdda0fa810ffad5e35383941c7645d0ff544
SHA256d29e10134728cff561db97e9b3ec6106c9b0214a9f8ae50f5c307f652096e620
SHA5129e5358159a5c7ed9ce9f28516618ad5b495993b97b78999b6b7a2bd2cd472000552facb5be246abc0d09d391301a99324ea0a634f5b470de0b444fe674d08e9b
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
8B
MD56890820ebb29213eaf25c92e56fd41ee
SHA1b926083cf18461657f09f2a4af604f8fafa4ae29
SHA256ddb532e0e9d9e9a382d9f92ef1e5e26eba608b5f3335f1b711d99044240af3f9
SHA5125ebefef8f75ecb9fce8854606cb41402dabf66347ddbbd1075f5b94a5794fc4ca240c615eee930a6eedfd117e011afd8772aba2db2c83df0f376c84e8f512cda