Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe
Resource
win7-20240708-en
General
-
Target
ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe
-
Size
393KB
-
MD5
ae9b99cdaeea160df3d5cc35afb32b07
-
SHA1
e73f961c0e67aea82f6cc61758bd39558436b063
-
SHA256
ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202
-
SHA512
3a37dac9aedc6744b44ec0181dfc29c0aa9090e83775a466cd195720475c3b08f7389c64418531cfe2feefee5f36a2ce58e2d04b74652da0f8570c7d46e04003
-
SSDEEP
6144:T+aX36VP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1mx:T+aPahVy41
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2424 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2988 Logo1_.exe 2808 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe -
Loads dropped DLL 1 IoCs
pid Process 2424 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1041\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpconfig.exe Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\applet\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe File created C:\Windows\Logo1_.exe ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe 2988 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2684 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 30 PID 1732 wrote to memory of 2684 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 30 PID 1732 wrote to memory of 2684 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 30 PID 1732 wrote to memory of 2684 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 30 PID 2684 wrote to memory of 2528 2684 net.exe 32 PID 2684 wrote to memory of 2528 2684 net.exe 32 PID 2684 wrote to memory of 2528 2684 net.exe 32 PID 2684 wrote to memory of 2528 2684 net.exe 32 PID 1732 wrote to memory of 2424 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 33 PID 1732 wrote to memory of 2424 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 33 PID 1732 wrote to memory of 2424 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 33 PID 1732 wrote to memory of 2424 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 33 PID 1732 wrote to memory of 2988 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 35 PID 1732 wrote to memory of 2988 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 35 PID 1732 wrote to memory of 2988 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 35 PID 1732 wrote to memory of 2988 1732 ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe 35 PID 2988 wrote to memory of 988 2988 Logo1_.exe 36 PID 2988 wrote to memory of 988 2988 Logo1_.exe 36 PID 2988 wrote to memory of 988 2988 Logo1_.exe 36 PID 2988 wrote to memory of 988 2988 Logo1_.exe 36 PID 988 wrote to memory of 2728 988 net.exe 38 PID 988 wrote to memory of 2728 988 net.exe 38 PID 988 wrote to memory of 2728 988 net.exe 38 PID 988 wrote to memory of 2728 988 net.exe 38 PID 2424 wrote to memory of 2808 2424 cmd.exe 39 PID 2424 wrote to memory of 2808 2424 cmd.exe 39 PID 2424 wrote to memory of 2808 2424 cmd.exe 39 PID 2424 wrote to memory of 2808 2424 cmd.exe 39 PID 2988 wrote to memory of 2820 2988 Logo1_.exe 40 PID 2988 wrote to memory of 2820 2988 Logo1_.exe 40 PID 2988 wrote to memory of 2820 2988 Logo1_.exe 40 PID 2988 wrote to memory of 2820 2988 Logo1_.exe 40 PID 2820 wrote to memory of 2996 2820 net.exe 42 PID 2820 wrote to memory of 2996 2820 net.exe 42 PID 2820 wrote to memory of 2996 2820 net.exe 42 PID 2820 wrote to memory of 2996 2820 net.exe 42 PID 2988 wrote to memory of 1204 2988 Logo1_.exe 21 PID 2988 wrote to memory of 1204 2988 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe"C:\Users\Admin\AppData\Local\Temp\ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aBC8B.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe"C:\Users\Admin\AppData\Local\Temp\ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe"4⤵
- Executes dropped EXE
PID:2808
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2728
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2996
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD57eb7300a6f1fe5cb5d8bcf92de3900c8
SHA1dbdb82f5dd18cefb1fb6568a6debcd5b3ee4a932
SHA256be09f65a2abe5a78b373e7338f06f987c323385f51744051115130c5a3faabec
SHA51205e78a06d9c5844fb76a96b954159be6615434ccf217247ecbbd0d476e94598dcb50b77332b2a7b84e8f2c41e92d9b4655e782d2e595b1c2055d75872dc7b160
-
Filesize
478KB
MD53dc7d30c27a581e9d524214c0142ea4c
SHA1b610c2fcba0a638926caf130cecca2f495a6b758
SHA2561172b41a581efa3c42f4f276d12c3ba0f6bf12d44a10ef908730405ac34d8017
SHA51233e40a51281741cb9ca398d18e3ccdde022149f99414cf0e41767ef99275a5171b78e33e7f716ff615c93f62ab2dfb02fb839010dcc103c2639e731a4a550bc3
-
Filesize
722B
MD58bce1147d3331885a0da6dc0a881deb0
SHA17d3d1578657991245052f1952427089fa4d50c53
SHA256b7e6dab552d9460c0dfd64abd18cb094174633ff5c48a8305790ecf6cb41428d
SHA512132e035bed1db6a29d0314569958452c97b42383b11b75b1413539d3d67f5ef572cd0fef2150e60b5e421a4de8c31a3aaf3fc9507a3650c8d9e0274790f836d8
-
C:\Users\Admin\AppData\Local\Temp\ac32ab8e27571a62340623d49abf9147b3c6b1343f15cb7adcacb5e9022e0202.exe.exe
Filesize360KB
MD55fbd45261a2de3bb42f489e825a9a935
SHA1ff388f6e9efe651ec62c4152c1739783e7899293
SHA2569e63701598199d5c47217e23b44d0e3ec5d53f5419166b1b6c68a7e9e8fc47a4
SHA5127f22b1995a07016adb342c551454d602bfbe511525139aee8581b62116608e9e278fd81c26382f1333c7eccded4474196e73c093bb5cbf8e8f203e865024c058
-
Filesize
33KB
MD546a5f6d85ff10886a5d06449c6e8ec7c
SHA1a9f2d3632cdd46fe18ea0375351c93bb7f23fbd6
SHA2562ee1fc8a57b35f4df905e98b8b2742252697b2e1ca0fdc042f4e68af25df4321
SHA512901e0bdcafdb6d9c9d76c20d5afa2b70776b58c428e4ea91d9e718d396e7529624f450e0fc437e12f87fd5c192f9274841f85e1d9e496a1ce6fa19319f82f562
-
Filesize
9B
MD51368e4d784ef82633de86fa6bc6e37f9
SHA177c7384e886b27647bb4f2fd364e7947e7b6abc6
SHA25657507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772
SHA5123cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b