Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe
Resource
win7-20240708-en
General
-
Target
e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe
-
Size
76KB
-
MD5
d8d82a54421efc66eaaa345542aa477f
-
SHA1
cfa032adccbe7e4d24634673daa7c9c78cde40b0
-
SHA256
e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2
-
SHA512
f8ece1f878ef971134f982e7c7fa2f49154f07c40c74327b7a0a9e62a913eded5b8ad553945d3c17e769cf4536fbf72c399531318cb38da8a46c0d3c8a087daa
-
SSDEEP
1536:Hfae+Zk7qzUJBeLkbiT29dX6riw+d9bHrkT5gUHz7FxtJ:Hfae+aezUDbHXKrBkfkT5xHzD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2352 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2360 Logo1_.exe 2792 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe -
Loads dropped DLL 1 IoCs
pid Process 2352 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\Skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\PublicAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kab\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe File created C:\Windows\Logo1_.exe e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe 2360 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2328 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 30 PID 1700 wrote to memory of 2328 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 30 PID 1700 wrote to memory of 2328 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 30 PID 1700 wrote to memory of 2328 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 30 PID 2328 wrote to memory of 2052 2328 net.exe 32 PID 2328 wrote to memory of 2052 2328 net.exe 32 PID 2328 wrote to memory of 2052 2328 net.exe 32 PID 2328 wrote to memory of 2052 2328 net.exe 32 PID 1700 wrote to memory of 2352 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 33 PID 1700 wrote to memory of 2352 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 33 PID 1700 wrote to memory of 2352 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 33 PID 1700 wrote to memory of 2352 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 33 PID 1700 wrote to memory of 2360 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 35 PID 1700 wrote to memory of 2360 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 35 PID 1700 wrote to memory of 2360 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 35 PID 1700 wrote to memory of 2360 1700 e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe 35 PID 2360 wrote to memory of 1776 2360 Logo1_.exe 36 PID 2360 wrote to memory of 1776 2360 Logo1_.exe 36 PID 2360 wrote to memory of 1776 2360 Logo1_.exe 36 PID 2360 wrote to memory of 1776 2360 Logo1_.exe 36 PID 1776 wrote to memory of 2796 1776 net.exe 38 PID 1776 wrote to memory of 2796 1776 net.exe 38 PID 1776 wrote to memory of 2796 1776 net.exe 38 PID 1776 wrote to memory of 2796 1776 net.exe 38 PID 2352 wrote to memory of 2792 2352 cmd.exe 39 PID 2352 wrote to memory of 2792 2352 cmd.exe 39 PID 2352 wrote to memory of 2792 2352 cmd.exe 39 PID 2352 wrote to memory of 2792 2352 cmd.exe 39 PID 2360 wrote to memory of 1612 2360 Logo1_.exe 40 PID 2360 wrote to memory of 1612 2360 Logo1_.exe 40 PID 2360 wrote to memory of 1612 2360 Logo1_.exe 40 PID 2360 wrote to memory of 1612 2360 Logo1_.exe 40 PID 1612 wrote to memory of 2932 1612 net.exe 42 PID 1612 wrote to memory of 2932 1612 net.exe 42 PID 1612 wrote to memory of 2932 1612 net.exe 42 PID 1612 wrote to memory of 2932 1612 net.exe 42 PID 2360 wrote to memory of 1220 2360 Logo1_.exe 21 PID 2360 wrote to memory of 1220 2360 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe"C:\Users\Admin\AppData\Local\Temp\e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aB960.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe"C:\Users\Admin\AppData\Local\Temp\e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe"4⤵
- Executes dropped EXE
PID:2792
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2796
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2932
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD57b714d463f7db900d5b6e757778a8ab8
SHA12cfc0e9f54236af8e10b0bfa551d87a20982b733
SHA256c995370836939a29853611830ca08d437286d4f45603edce88f36aa1f99a0d97
SHA512e8fe8823b5b7f282c24c964cbf4f248b7562259a13410bf95997288727f9bfc6ea51c4aa40182b649a2235bafc02062e0c57f4f62876b5174395071a8d68f9bb
-
Filesize
722B
MD5db745aba6d3276ebf2ffaa2a1c94425d
SHA1f745f517e58530c0139fdacc20c795a0310bb307
SHA2565350509bf1c331ad8fda88f2dccf0a3d4beefa7284f386768fbf9982d172ccee
SHA5121d265223c948dcc0065f726e3fa8e057c0743336108bc35077987f77e42833a0a40d61e9b6465f8c230e4734821538d078762857bb41c732ce6adeade44576fd
-
C:\Users\Admin\AppData\Local\Temp\e6f6fae9fdcc67da1a2c3a887158d03f77e7f3193076928ca203038ebed3f5b2.exe.exe
Filesize36KB
MD59f498971cbe636662f3d210747d619e1
SHA144b8e2732fa1e2f204fc70eaa1cb406616250085
SHA2568adf6748981c3e7b62f5dbca992be6675574fffbce7673743f2d7fe787d56a41
SHA512b73083c2f7b028d2946cb8f7b4fe2289fedaa4175364a2aac37db0aeff4602aede772ccc9eba7e6dcfcb7276e52604ca45d8021952201b5834485b48bca3dc93
-
Filesize
39KB
MD5cbd6c62ce40b33dafb9c1c34daaee76d
SHA163aa66883ebb8481a9b8ad4bbd722cbf3cdaa7a0
SHA2567b3963c7cb2db990dd1e1ede9a3c814015cb4ea4519ce5314a49f1c32e0ad4b2
SHA5123e461ad05c6875337f70c5f8a570582b88a8f71ced918ef0a7907495037a4258e950738660fe397213c690023ef9ff7efa2d96b87de3df13a681c06d508c8722
-
Filesize
9B
MD5ee036d7bfecde982d31263f77044a72f
SHA1d575db536fac53ad7f9e8f28fbf32a34aaa54afd
SHA2566bd2c0216839f407cec78332e286e5649b2f99169f532db4197696fb125339ee
SHA5127fe9f2de5fb89d0f7d9ddd7a9196ac54c8d159b403a428ffaea985d6bcb73e8e98a9fe36ec4cd102aa76b37f96dcd5c7a2b1abd04634a3489cc3074b57914863