Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe
Resource
win7-20240705-en
General
-
Target
55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe
-
Size
1.1MB
-
MD5
4052774a9f7c6514ed83a76e091a9543
-
SHA1
6013d9d0d8e048e9b8bcce58ebb4c026ba63d6d4
-
SHA256
55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd
-
SHA512
2675bd5ed1a1dd4802ced7536db854fd61e926c0701f44f8a5e6e13348fae14b18b873d021c356894cb96f990456db8e77d59ec82ae2086eedd0cb638435889a
-
SSDEEP
24576:MbBRXT9T+w6zY8v5a2FZ7WDpk2Kvfd5nP6Wp8zrMBThYBjv:sBRZ6zY8/7WDaDvfd5iQ8zoBThojv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2832 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 1940 Logo1_.exe 2676 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe -
Loads dropped DLL 1 IoCs
pid Process 2832 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Uninstall Information\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\DAO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es_MX\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sm\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kab\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe File created C:\Windows\Logo1_.exe 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1976 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 30 PID 3028 wrote to memory of 1976 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 30 PID 3028 wrote to memory of 1976 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 30 PID 3028 wrote to memory of 1976 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 30 PID 1976 wrote to memory of 1892 1976 net.exe 32 PID 1976 wrote to memory of 1892 1976 net.exe 32 PID 1976 wrote to memory of 1892 1976 net.exe 32 PID 1976 wrote to memory of 1892 1976 net.exe 32 PID 3028 wrote to memory of 2832 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 33 PID 3028 wrote to memory of 2832 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 33 PID 3028 wrote to memory of 2832 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 33 PID 3028 wrote to memory of 2832 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 33 PID 3028 wrote to memory of 1940 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 35 PID 3028 wrote to memory of 1940 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 35 PID 3028 wrote to memory of 1940 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 35 PID 3028 wrote to memory of 1940 3028 55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe 35 PID 1940 wrote to memory of 2820 1940 Logo1_.exe 36 PID 1940 wrote to memory of 2820 1940 Logo1_.exe 36 PID 1940 wrote to memory of 2820 1940 Logo1_.exe 36 PID 1940 wrote to memory of 2820 1940 Logo1_.exe 36 PID 2832 wrote to memory of 2676 2832 cmd.exe 38 PID 2832 wrote to memory of 2676 2832 cmd.exe 38 PID 2832 wrote to memory of 2676 2832 cmd.exe 38 PID 2832 wrote to memory of 2676 2832 cmd.exe 38 PID 2820 wrote to memory of 2108 2820 net.exe 39 PID 2820 wrote to memory of 2108 2820 net.exe 39 PID 2820 wrote to memory of 2108 2820 net.exe 39 PID 2820 wrote to memory of 2108 2820 net.exe 39 PID 1940 wrote to memory of 1964 1940 Logo1_.exe 40 PID 1940 wrote to memory of 1964 1940 Logo1_.exe 40 PID 1940 wrote to memory of 1964 1940 Logo1_.exe 40 PID 1940 wrote to memory of 1964 1940 Logo1_.exe 40 PID 1964 wrote to memory of 2564 1964 net.exe 42 PID 1964 wrote to memory of 2564 1964 net.exe 42 PID 1964 wrote to memory of 2564 1964 net.exe 42 PID 1964 wrote to memory of 2564 1964 net.exe 42 PID 1940 wrote to memory of 1404 1940 Logo1_.exe 21 PID 1940 wrote to memory of 1404 1940 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe"C:\Users\Admin\AppData\Local\Temp\55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1892
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a770.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe"C:\Users\Admin\AppData\Local\Temp\55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe"4⤵
- Executes dropped EXE
PID:2676
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2108
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2564
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD56d0d6e0e6b9c1f755eeee10305f199c9
SHA16bd5ffb0481f75d5edbb659dfc0c85f3fd1c9147
SHA256fd93ab2b7dca5b0b769637aeec591fe865efa180d2f46625c80153dcb1ccfa6d
SHA512eb15d0f478723e397ce4ca3ac36d6ee30066dd1139f5828efc1016db7a6e5632ab99dd72146091d0dd42409d5497619250ea718fccf3a9debf9ceed3a34d74b3
-
Filesize
484KB
MD57b714d463f7db900d5b6e757778a8ab8
SHA12cfc0e9f54236af8e10b0bfa551d87a20982b733
SHA256c995370836939a29853611830ca08d437286d4f45603edce88f36aa1f99a0d97
SHA512e8fe8823b5b7f282c24c964cbf4f248b7562259a13410bf95997288727f9bfc6ea51c4aa40182b649a2235bafc02062e0c57f4f62876b5174395071a8d68f9bb
-
Filesize
721B
MD53088649a7cf49f8ef2a4e544fbcb7bff
SHA1eac7e84ed22894ccd0cc9837a4441ce9516265fa
SHA2563f39b8cc4d66dbba9e12456f60f65c1453794d397ac916f167e744db5f22b7e5
SHA51267cc14999eaf2f23fdff60f7eb85cf564d65fae0142740dfc91a2d2cb37ec3184be36066333bca1d10e4b7ae8488f0e8f2992d1a471aa30eecc230afa7a7da61
-
C:\Users\Admin\AppData\Local\Temp\55e029a4af7d6887c97710dd72fd928a6c857b808ac3cd7f545a8e3e9c9adcfd.exe.exe
Filesize1.1MB
MD5f012ebe3b9f0c4d18b43076b68295667
SHA127ce582d305bf5ec574fd7edf39e1300783e9323
SHA256bdff5163ff3787a7a8b6bb3f688e877c5fa10db2ad535bb9765c91e976fbcafe
SHA51206ce3eceb42ca555511f55e85fe79441a4a8c70ad32c36a045560cb8449e44f08bcd9e938e9a11a0360c7363ba2fff4dd92b1a300e21e214a6d273009d8c2463
-
Filesize
39KB
MD5dd45e175b084f3e7b3923cb8fcb3833b
SHA1e44896aa2e3e4a8ba6677fd10c4eac8315b3939c
SHA256cff2b960d67366aedaec8aaa4388a3537000a7253a3eeef378d24e1a171a4f13
SHA512562284581292c3965df7e1f95bcffa2047d9a9e42e863e32b9cfc7b289270db24ca1ecb004f26d499d9901c49c11844cf3868b93b4b704f30a98ba4b52824fba
-
Filesize
9B
MD51368e4d784ef82633de86fa6bc6e37f9
SHA177c7384e886b27647bb4f2fd364e7947e7b6abc6
SHA25657507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772
SHA5123cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b