Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe
Resource
win7-20240708-en
General
-
Target
2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe
-
Size
66KB
-
MD5
7aa38d016ee38cfd82ce40156f98958c
-
SHA1
12e95a58e56007abb5efb3c5de80954e12c64779
-
SHA256
2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51
-
SHA512
6ce66e4bfa00f65b6e61aa1a0c42a1ce76b6b32f33ec677ca9a81a65a73ccc0b73da63aec53b8233c72624911c90a550c38ffcb4492ab3469f57cf269fa0ea48
-
SSDEEP
1536:eNPrPrBcx1ae9n40g9i/qo6SKH4vVfqzlledcTJzz:eLfZQioJKYvVfqzlvTJ3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 872 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 1844 Logo1_.exe 2748 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe -
Loads dropped DLL 1 IoCs
pid Process 872 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Argentina\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Updater6\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe File created C:\Windows\Logo1_.exe 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2380 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 30 PID 2368 wrote to memory of 2380 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 30 PID 2368 wrote to memory of 2380 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 30 PID 2368 wrote to memory of 2380 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 30 PID 2380 wrote to memory of 1712 2380 net.exe 32 PID 2380 wrote to memory of 1712 2380 net.exe 32 PID 2380 wrote to memory of 1712 2380 net.exe 32 PID 2380 wrote to memory of 1712 2380 net.exe 32 PID 2368 wrote to memory of 872 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 33 PID 2368 wrote to memory of 872 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 33 PID 2368 wrote to memory of 872 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 33 PID 2368 wrote to memory of 872 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 33 PID 2368 wrote to memory of 1844 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 35 PID 2368 wrote to memory of 1844 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 35 PID 2368 wrote to memory of 1844 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 35 PID 2368 wrote to memory of 1844 2368 2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe 35 PID 1844 wrote to memory of 2172 1844 Logo1_.exe 36 PID 1844 wrote to memory of 2172 1844 Logo1_.exe 36 PID 1844 wrote to memory of 2172 1844 Logo1_.exe 36 PID 1844 wrote to memory of 2172 1844 Logo1_.exe 36 PID 2172 wrote to memory of 2704 2172 net.exe 38 PID 2172 wrote to memory of 2704 2172 net.exe 38 PID 2172 wrote to memory of 2704 2172 net.exe 38 PID 2172 wrote to memory of 2704 2172 net.exe 38 PID 872 wrote to memory of 2748 872 cmd.exe 39 PID 872 wrote to memory of 2748 872 cmd.exe 39 PID 872 wrote to memory of 2748 872 cmd.exe 39 PID 872 wrote to memory of 2748 872 cmd.exe 39 PID 1844 wrote to memory of 2816 1844 Logo1_.exe 40 PID 1844 wrote to memory of 2816 1844 Logo1_.exe 40 PID 1844 wrote to memory of 2816 1844 Logo1_.exe 40 PID 1844 wrote to memory of 2816 1844 Logo1_.exe 40 PID 2816 wrote to memory of 2752 2816 net.exe 42 PID 2816 wrote to memory of 2752 2816 net.exe 42 PID 2816 wrote to memory of 2752 2816 net.exe 42 PID 2816 wrote to memory of 2752 2816 net.exe 42 PID 1844 wrote to memory of 1124 1844 Logo1_.exe 20 PID 1844 wrote to memory of 1124 1844 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe"C:\Users\Admin\AppData\Local\Temp\2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aB616.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe"C:\Users\Admin\AppData\Local\Temp\2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe"4⤵
- Executes dropped EXE
PID:2748
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2704
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2752
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD561da47408434aa255916c0f52f0a70a1
SHA1f4a662581634ea88ea91fa3df9bcbbbda28594fd
SHA2561c96935deb9a27e9d7e634faea6ec85df1bd81965b0102cdaef916867c9b1223
SHA5128e895afa682468c20db63a23bcb7e6e5c4791858abf482536e38a9c0182272cc00f4b4687d9e4870e9fa7d18e821c9aeb8b73ea539020a9f7bf798ba05f8ffb3
-
Filesize
478KB
MD579d96b6a2771e7783309bf05ebe7b5c1
SHA1b19da11278224b17598d5b6de189892a83196708
SHA256eb38a47ec49f3f376f53aff58def8c3a0e095bad67e2887d3f58bb4a3c71a19e
SHA51272e30060fd922fc37662d762bc647bf85938986d810057926fe86a1622e1b05fc841bab9ee06ee7855071ed27da3d8fe20d41f03ae68c4c76cc720a7e56d4d68
-
Filesize
722B
MD55ddc07cb6e9bd2058c828159fa5dd699
SHA1db7e9b2e38d420f7e49d54a02df0c081aaf2ca5c
SHA2567970ff9215808678637f1a39ec0d63bd783e86422ab6db41378274f225a327c2
SHA512726d38eaf600d99e70b6cbd36af1c37e22d35007c961bbf1226b2f98d0afba20af8da3fc01fc7f31f3d52c9bc2412fc0fb025d8e79c0fec116fba045bbca4077
-
C:\Users\Admin\AppData\Local\Temp\2219bd18ead73409ea46cb3faa1f0bccf674102f40c772bd174b0ca592a1dc51.exe.exe
Filesize33KB
MD564f8db30b16d1c755d033d069c70d2d1
SHA104e8f26c383027cc63531f48477424bda65b14e5
SHA2560823bf7a2c453892ffa4328a970a417e0907d584bfb7f819ed0f4bb139d12e55
SHA512f461b40de656e6df6360a1ba393b000720c0ffa91147b00ee42aefccb4122da4314ce4de00364e692a0517f5e6643fe061b232fb316e993642f2d43b393b38aa
-
Filesize
33KB
MD55ed5a2badb346b8b0790c924c99df3dd
SHA13278569b20ddea011e20405c09b01726934f4d4f
SHA2566cdfe0439de7d0626e8f6a39ee64ffee03797346b8bf3bf6b5c8a17da654fda3
SHA51285d6dd616dac0203c1168139f2367792323d4c2b34febb9e562e2d3ad145bbe8b6912786e2e485de9102014608d96ada2faad08976cc35d7494a36d8de8ee11d
-
Filesize
8B
MD5d8dca68320777bb03e3a6dbdb7624c4f
SHA1094cbdfea49743824e2aaf9c66082c25da2157b1
SHA256ebe46a39e49fe879afd1b4ac0de5c6c62e8e90342cd71aaaf3ec1d84269e9c6e
SHA5129097e8a3df0ae12235002caaef04951ab586d84ea9db1b9952e684b5ab570a033ba1bf047598fca329652cab23a5ec1516e6cd6dbcbd979fd32b9b8afbdf88cc