Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe
Resource
win7-20240708-en
General
-
Target
48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe
-
Size
400KB
-
MD5
46b9bae9cdc0f3824c1f63a92db4381d
-
SHA1
325f2d5884d24cb1357c1e5e8e9785824188a944
-
SHA256
48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405
-
SHA512
a3c5280804e7086af5a6b475a7c5eb8531f3c19c937c7567be8668d1d14de47a2b08ac11fde693d07cfb25cf65cba5725c24e27067a1bf9845539edb6c9f3f3b
-
SSDEEP
6144:/b+aezsP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1mx:/b+aQahVy41
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2644 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2992 Logo1_.exe 2320 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe -
Loads dropped DLL 1 IoCs
pid Process 2644 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\bin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SUMIPNTG\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\management\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File created C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe 2992 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2768 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 30 PID 2876 wrote to memory of 2768 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 30 PID 2876 wrote to memory of 2768 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 30 PID 2876 wrote to memory of 2768 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 30 PID 2768 wrote to memory of 1936 2768 net.exe 32 PID 2768 wrote to memory of 1936 2768 net.exe 32 PID 2768 wrote to memory of 1936 2768 net.exe 32 PID 2768 wrote to memory of 1936 2768 net.exe 32 PID 2876 wrote to memory of 2644 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 33 PID 2876 wrote to memory of 2644 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 33 PID 2876 wrote to memory of 2644 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 33 PID 2876 wrote to memory of 2644 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 33 PID 2876 wrote to memory of 2992 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 34 PID 2876 wrote to memory of 2992 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 34 PID 2876 wrote to memory of 2992 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 34 PID 2876 wrote to memory of 2992 2876 48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe 34 PID 2992 wrote to memory of 2616 2992 Logo1_.exe 36 PID 2992 wrote to memory of 2616 2992 Logo1_.exe 36 PID 2992 wrote to memory of 2616 2992 Logo1_.exe 36 PID 2992 wrote to memory of 2616 2992 Logo1_.exe 36 PID 2616 wrote to memory of 2692 2616 net.exe 38 PID 2616 wrote to memory of 2692 2616 net.exe 38 PID 2616 wrote to memory of 2692 2616 net.exe 38 PID 2616 wrote to memory of 2692 2616 net.exe 38 PID 2644 wrote to memory of 2320 2644 cmd.exe 39 PID 2644 wrote to memory of 2320 2644 cmd.exe 39 PID 2644 wrote to memory of 2320 2644 cmd.exe 39 PID 2644 wrote to memory of 2320 2644 cmd.exe 39 PID 2992 wrote to memory of 700 2992 Logo1_.exe 40 PID 2992 wrote to memory of 700 2992 Logo1_.exe 40 PID 2992 wrote to memory of 700 2992 Logo1_.exe 40 PID 2992 wrote to memory of 700 2992 Logo1_.exe 40 PID 700 wrote to memory of 988 700 net.exe 42 PID 700 wrote to memory of 988 700 net.exe 42 PID 700 wrote to memory of 988 700 net.exe 42 PID 700 wrote to memory of 988 700 net.exe 42 PID 2992 wrote to memory of 1212 2992 Logo1_.exe 21 PID 2992 wrote to memory of 1212 2992 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe"C:\Users\Admin\AppData\Local\Temp\48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a6A67.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe"C:\Users\Admin\AppData\Local\Temp\48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe"4⤵
- Executes dropped EXE
PID:2320
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2692
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:988
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD57b714d463f7db900d5b6e757778a8ab8
SHA12cfc0e9f54236af8e10b0bfa551d87a20982b733
SHA256c995370836939a29853611830ca08d437286d4f45603edce88f36aa1f99a0d97
SHA512e8fe8823b5b7f282c24c964cbf4f248b7562259a13410bf95997288727f9bfc6ea51c4aa40182b649a2235bafc02062e0c57f4f62876b5174395071a8d68f9bb
-
Filesize
722B
MD5b6741c3e6ca966f6111303a6700fffa8
SHA1ae105ad303026ca5838912d48cfc827199fe2631
SHA2569bab503ac80d49aba8384cf08105d9045169249dc0f583c3e048a8d90dac2df0
SHA5129dfc41a35aa470a714153890f96ff7a12d0a38305c62eee0caf513915130bc5ae9e7622ce710260e8806b5a49df6b7c1693b7ee077cd04d36758c0702cb5a8fc
-
C:\Users\Admin\AppData\Local\Temp\48486ac596a5b4da52f00bf0ba094f5b45829ffb3040074684dd1d63f7ade405.exe.exe
Filesize360KB
MD55fbd45261a2de3bb42f489e825a9a935
SHA1ff388f6e9efe651ec62c4152c1739783e7899293
SHA2569e63701598199d5c47217e23b44d0e3ec5d53f5419166b1b6c68a7e9e8fc47a4
SHA5127f22b1995a07016adb342c551454d602bfbe511525139aee8581b62116608e9e278fd81c26382f1333c7eccded4474196e73c093bb5cbf8e8f203e865024c058
-
Filesize
39KB
MD5cbd6c62ce40b33dafb9c1c34daaee76d
SHA163aa66883ebb8481a9b8ad4bbd722cbf3cdaa7a0
SHA2567b3963c7cb2db990dd1e1ede9a3c814015cb4ea4519ce5314a49f1c32e0ad4b2
SHA5123e461ad05c6875337f70c5f8a570582b88a8f71ced918ef0a7907495037a4258e950738660fe397213c690023ef9ff7efa2d96b87de3df13a681c06d508c8722
-
Filesize
9B
MD5ee036d7bfecde982d31263f77044a72f
SHA1d575db536fac53ad7f9e8f28fbf32a34aaa54afd
SHA2566bd2c0216839f407cec78332e286e5649b2f99169f532db4197696fb125339ee
SHA5127fe9f2de5fb89d0f7d9ddd7a9196ac54c8d159b403a428ffaea985d6bcb73e8e98a9fe36ec4cd102aa76b37f96dcd5c7a2b1abd04634a3489cc3074b57914863