Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 09:18
Static task
static1
Behavioral task
behavioral1
Sample
66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe
Resource
win7-20240705-en
General
-
Target
66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe
-
Size
717KB
-
MD5
9c6ae8c00740982ed95dd11ae927a006
-
SHA1
5ac953d7cee7e348f4a8d530771e74a8292f4f49
-
SHA256
66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49
-
SHA512
badec1228b340336ef203ab26ff9b083c5530c328b1f6fafb1fdece0d2b3908de1dff0c8d898c76730249ed13c7d0762a61923258a863a3d7cc3c49faffd53c2
-
SSDEEP
12288:3LfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:37LOS2opPIXV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2404 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 3 IoCs
pid Process 2672 Logo1_.exe 2728 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 1228 Explorer.EXE -
Loads dropped DLL 2 IoCs
pid Process 2404 cmd.exe 2404 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ku_IQ\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\PublicAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe File created C:\Windows\Logo1_.exe 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2388 wrote to memory of 3064 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 30 PID 2388 wrote to memory of 3064 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 30 PID 2388 wrote to memory of 3064 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 30 PID 2388 wrote to memory of 3064 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 30 PID 3064 wrote to memory of 2352 3064 net.exe 32 PID 3064 wrote to memory of 2352 3064 net.exe 32 PID 3064 wrote to memory of 2352 3064 net.exe 32 PID 3064 wrote to memory of 2352 3064 net.exe 32 PID 2388 wrote to memory of 2404 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 33 PID 2388 wrote to memory of 2404 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 33 PID 2388 wrote to memory of 2404 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 33 PID 2388 wrote to memory of 2404 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 33 PID 2388 wrote to memory of 2672 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 35 PID 2388 wrote to memory of 2672 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 35 PID 2388 wrote to memory of 2672 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 35 PID 2388 wrote to memory of 2672 2388 66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe 35 PID 2672 wrote to memory of 2692 2672 Logo1_.exe 36 PID 2672 wrote to memory of 2692 2672 Logo1_.exe 36 PID 2672 wrote to memory of 2692 2672 Logo1_.exe 36 PID 2672 wrote to memory of 2692 2672 Logo1_.exe 36 PID 2404 wrote to memory of 2728 2404 cmd.exe 37 PID 2404 wrote to memory of 2728 2404 cmd.exe 37 PID 2404 wrote to memory of 2728 2404 cmd.exe 37 PID 2404 wrote to memory of 2728 2404 cmd.exe 37 PID 2692 wrote to memory of 2548 2692 net.exe 39 PID 2692 wrote to memory of 2548 2692 net.exe 39 PID 2692 wrote to memory of 2548 2692 net.exe 39 PID 2692 wrote to memory of 2548 2692 net.exe 39 PID 2672 wrote to memory of 2596 2672 Logo1_.exe 40 PID 2672 wrote to memory of 2596 2672 Logo1_.exe 40 PID 2672 wrote to memory of 2596 2672 Logo1_.exe 40 PID 2672 wrote to memory of 2596 2672 Logo1_.exe 40 PID 2596 wrote to memory of 1240 2596 net.exe 42 PID 2596 wrote to memory of 1240 2596 net.exe 42 PID 2596 wrote to memory of 1240 2596 net.exe 42 PID 2596 wrote to memory of 1240 2596 net.exe 42 PID 2672 wrote to memory of 1228 2672 Logo1_.exe 21 PID 2672 wrote to memory of 1228 2672 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe"C:\Users\Admin\AppData\Local\Temp\66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4347.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe"C:\Users\Admin\AppData\Local\Temp\66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe"4⤵
- Executes dropped EXE
PID:2728
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2548
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1240
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5b7bb6fde5070f22c2892f8ffa90e21ab
SHA199b915a961b74560ec71e48bab9140ebf0ff8828
SHA25622241fd7d48785774c50055f9fe6796818868706fbfbbaa47db9abbdf7e58909
SHA512a6b96e2379c22911039024570edca5aba589210683a653b1b06225492972d8a6616b9a85b77a9a77cd05d3279efbdc2894594ebc936b5acd786a08749313aa89
-
Filesize
478KB
MD579d96b6a2771e7783309bf05ebe7b5c1
SHA1b19da11278224b17598d5b6de189892a83196708
SHA256eb38a47ec49f3f376f53aff58def8c3a0e095bad67e2887d3f58bb4a3c71a19e
SHA51272e30060fd922fc37662d762bc647bf85938986d810057926fe86a1622e1b05fc841bab9ee06ee7855071ed27da3d8fe20d41f03ae68c4c76cc720a7e56d4d68
-
Filesize
722B
MD5a8c41c0e80f0b1e30b669b4a4a04d91d
SHA17b3719e5e5224e69b80ba84f128e1353dc2251bb
SHA256cd40aca9c96a9ddf3597a132f1495da62418749ab5484e5a57f14dc17e4ca98b
SHA51239ae6f45d0e1f59578d2702e6118079f60f42e65b85b43b8cbe7ae6fff63ab12cc05bd85714fb9878ed43b0f0b684cdd50a20227dfb18c14fed9a35f0b97ac2d
-
C:\Users\Admin\AppData\Local\Temp\66ad63b45c3cfca02427911cf3906c225df63f69c7c2ae66dbdb68b17efc7d49.exe.exe
Filesize684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
33KB
MD52a82d5208360158b3c993c811395e0a6
SHA17b0769ce4994359e329fd2c93a8d4c7f6a311084
SHA2569c8ff7750281ee54d8fdf3990659d7652c663fb986e029a791f8f051e3bf40f9
SHA512381ab7e6f07b427f2a5a2b9cd5c5914fa45a5edaf70e622969156d7a1deed8c3cab70b55084799d4055ce73324cbdc3acad6b45b83cfcebb25f62354d732b51b
-
Filesize
8B
MD5d8dca68320777bb03e3a6dbdb7624c4f
SHA1094cbdfea49743824e2aaf9c66082c25da2157b1
SHA256ebe46a39e49fe879afd1b4ac0de5c6c62e8e90342cd71aaaf3ec1d84269e9c6e
SHA5129097e8a3df0ae12235002caaef04951ab586d84ea9db1b9952e684b5ab570a033ba1bf047598fca329652cab23a5ec1516e6cd6dbcbd979fd32b9b8afbdf88cc