Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 09:18
Static task
static1
Behavioral task
behavioral1
Sample
95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe
Resource
win7-20240708-en
General
-
Target
95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe
-
Size
264KB
-
MD5
5dc6df8fcb77a829557c591d8f0711f7
-
SHA1
cb6d58da5284de15e536217540c6e4b96b4c38b0
-
SHA256
95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857
-
SHA512
8b890e1f9f0a84ad1d195100286538fe8ba586cfe9fa305b1fb9cee12d7cd3c05dcc8082f8b3afb4d628fd211e8650dbc3106a5be78dbe390337c63b20a6ea76
-
SSDEEP
3072:eXfZQioJK+LRkgUA1nQZwFGVO4Mqg+WDY:sALRp1nQ4QLd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2940 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2700 Logo1_.exe 2540 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe -
Loads dropped DLL 1 IoCs
pid Process 2940 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1036\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PrivateAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe File created C:\Windows\Logo1_.exe 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe 2700 Logo1_.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2744 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 30 PID 2644 wrote to memory of 2744 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 30 PID 2644 wrote to memory of 2744 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 30 PID 2644 wrote to memory of 2744 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 30 PID 2744 wrote to memory of 2952 2744 net.exe 32 PID 2744 wrote to memory of 2952 2744 net.exe 32 PID 2744 wrote to memory of 2952 2744 net.exe 32 PID 2744 wrote to memory of 2952 2744 net.exe 32 PID 2644 wrote to memory of 2940 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 33 PID 2644 wrote to memory of 2940 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 33 PID 2644 wrote to memory of 2940 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 33 PID 2644 wrote to memory of 2940 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 33 PID 2644 wrote to memory of 2700 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 35 PID 2644 wrote to memory of 2700 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 35 PID 2644 wrote to memory of 2700 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 35 PID 2644 wrote to memory of 2700 2644 95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe 35 PID 2700 wrote to memory of 2712 2700 Logo1_.exe 36 PID 2700 wrote to memory of 2712 2700 Logo1_.exe 36 PID 2700 wrote to memory of 2712 2700 Logo1_.exe 36 PID 2700 wrote to memory of 2712 2700 Logo1_.exe 36 PID 2940 wrote to memory of 2540 2940 cmd.exe 38 PID 2940 wrote to memory of 2540 2940 cmd.exe 38 PID 2940 wrote to memory of 2540 2940 cmd.exe 38 PID 2940 wrote to memory of 2540 2940 cmd.exe 38 PID 2940 wrote to memory of 2540 2940 cmd.exe 38 PID 2940 wrote to memory of 2540 2940 cmd.exe 38 PID 2940 wrote to memory of 2540 2940 cmd.exe 38 PID 2712 wrote to memory of 2556 2712 net.exe 39 PID 2712 wrote to memory of 2556 2712 net.exe 39 PID 2712 wrote to memory of 2556 2712 net.exe 39 PID 2712 wrote to memory of 2556 2712 net.exe 39 PID 2700 wrote to memory of 3024 2700 Logo1_.exe 40 PID 2700 wrote to memory of 3024 2700 Logo1_.exe 40 PID 2700 wrote to memory of 3024 2700 Logo1_.exe 40 PID 2700 wrote to memory of 3024 2700 Logo1_.exe 40 PID 3024 wrote to memory of 1000 3024 net.exe 42 PID 3024 wrote to memory of 1000 3024 net.exe 42 PID 3024 wrote to memory of 1000 3024 net.exe 42 PID 3024 wrote to memory of 1000 3024 net.exe 42 PID 2700 wrote to memory of 1196 2700 Logo1_.exe 21 PID 2700 wrote to memory of 1196 2700 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe"C:\Users\Admin\AppData\Local\Temp\95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aF73A.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe"C:\Users\Admin\AppData\Local\Temp\95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe"4⤵
- Executes dropped EXE
PID:2540
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2556
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1000
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5c031b4deb10e992ecc2fca24f69450e1
SHA1d28ada07ce8378dbc4e907f3b1448ec9a113b72e
SHA256c30dd1399eb0902d404a7621f178fbb3fbc35f54990633d7eaf7c1c6adcd347b
SHA512ef69c695a9db7a4bfee74d158120319b68e33dd640b20c87ef5040883e3cc091a542781030eaf106f410e24b0b8d9720c57bd8f7a9c9e8cc79e2b31c582432b3
-
Filesize
478KB
MD579d96b6a2771e7783309bf05ebe7b5c1
SHA1b19da11278224b17598d5b6de189892a83196708
SHA256eb38a47ec49f3f376f53aff58def8c3a0e095bad67e2887d3f58bb4a3c71a19e
SHA51272e30060fd922fc37662d762bc647bf85938986d810057926fe86a1622e1b05fc841bab9ee06ee7855071ed27da3d8fe20d41f03ae68c4c76cc720a7e56d4d68
-
Filesize
722B
MD509e6ce51331e1f14e0d8b299825cca3e
SHA1d54663bb6c4f1a21272b2364f5269d84835debcf
SHA2560330de5c4057406e5d1d9544465f1b6db92e81dc4396303384534784cb8841be
SHA5124b3dad372482217b8f7b9d969abc428ced2596ac342d6118bb805cb21e9efd5135f535920fe93595e77895c0906fae9c931199723366a0fb3b3afed0d91060c9
-
C:\Users\Admin\AppData\Local\Temp\95d40f5e7584aaa8df75b7ae420cfe98702a6a2a498558f1ff9aac02087ad857.exe.exe
Filesize231KB
MD56f581a41167d2d484fcba20e6fc3c39a
SHA1d48de48d24101b9baaa24f674066577e38e6b75c
SHA2563eb8d53778eab9fb13b4c97aeab56e4bad2a6ea3748d342f22eaf4d7aa3185a7
SHA512e1177b6cea89445d58307b3327c78909adff225497f9abb8de571cdd114b547a8f515ec3ab038b583bf752a085b231f6329d6ca82fbe6be8a58cd97a1dbaf0f6
-
Filesize
33KB
MD555f0baaeeb761a40ade638b231978a1a
SHA143285993b9512b483c283e6628f510f11638e516
SHA25626721debf0e04b4ebf38931d8c44e2d985651d0cbc590a06de7a68b93b848479
SHA51256c48ef92de26cb0d373d06ad4ddc49687681de59d9156a7f1bb34f3743bb6b38d5ae991370c60efc04a3a69da5d4a43e035fdc4e179b523ac7ab62c6df3a717
-
Filesize
8B
MD5d8dca68320777bb03e3a6dbdb7624c4f
SHA1094cbdfea49743824e2aaf9c66082c25da2157b1
SHA256ebe46a39e49fe879afd1b4ac0de5c6c62e8e90342cd71aaaf3ec1d84269e9c6e
SHA5129097e8a3df0ae12235002caaef04951ab586d84ea9db1b9952e684b5ab570a033ba1bf047598fca329652cab23a5ec1516e6cd6dbcbd979fd32b9b8afbdf88cc