Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe
Resource
win7-20240704-en
General
-
Target
8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe
-
Size
43KB
-
MD5
df97341db9a3307519e40f6cd1d4f364
-
SHA1
646881055913a47806b6b1ea311df761ec0f7efd
-
SHA256
8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a
-
SHA512
adf603e446c72fb6ddeacd2a213740e7868a25fe148740d7b82ed674c0b0dc83e5f1a25c92d47f64289dd6889cf8b345dfc212fcd5da79d420780eca3dc25c93
-
SSDEEP
768:HsaO5RroZJ76739AzUJQ+OYkLl2b3+DTQb9OGImt0oRn3:Hsae+Zk7qzUJBeLkbiT29dX3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2640 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 1 IoCs
pid Process 2840 Logo1_.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ie\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe File created C:\Windows\Logo1_.exe 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2232 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 30 PID 2084 wrote to memory of 2232 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 30 PID 2084 wrote to memory of 2232 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 30 PID 2084 wrote to memory of 2232 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 30 PID 2232 wrote to memory of 2736 2232 net.exe 32 PID 2232 wrote to memory of 2736 2232 net.exe 32 PID 2232 wrote to memory of 2736 2232 net.exe 32 PID 2232 wrote to memory of 2736 2232 net.exe 32 PID 2084 wrote to memory of 2640 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 33 PID 2084 wrote to memory of 2640 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 33 PID 2084 wrote to memory of 2640 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 33 PID 2084 wrote to memory of 2640 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 33 PID 2084 wrote to memory of 2840 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 35 PID 2084 wrote to memory of 2840 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 35 PID 2084 wrote to memory of 2840 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 35 PID 2084 wrote to memory of 2840 2084 8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe 35 PID 2840 wrote to memory of 2568 2840 Logo1_.exe 36 PID 2840 wrote to memory of 2568 2840 Logo1_.exe 36 PID 2840 wrote to memory of 2568 2840 Logo1_.exe 36 PID 2840 wrote to memory of 2568 2840 Logo1_.exe 36 PID 2568 wrote to memory of 2672 2568 net.exe 38 PID 2568 wrote to memory of 2672 2568 net.exe 38 PID 2568 wrote to memory of 2672 2568 net.exe 38 PID 2568 wrote to memory of 2672 2568 net.exe 38 PID 2840 wrote to memory of 2564 2840 Logo1_.exe 39 PID 2840 wrote to memory of 2564 2840 Logo1_.exe 39 PID 2840 wrote to memory of 2564 2840 Logo1_.exe 39 PID 2840 wrote to memory of 2564 2840 Logo1_.exe 39 PID 2564 wrote to memory of 3048 2564 net.exe 41 PID 2564 wrote to memory of 3048 2564 net.exe 41 PID 2564 wrote to memory of 3048 2564 net.exe 41 PID 2564 wrote to memory of 3048 2564 net.exe 41 PID 2840 wrote to memory of 1212 2840 Logo1_.exe 21 PID 2840 wrote to memory of 1212 2840 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe"C:\Users\Admin\AppData\Local\Temp\8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aF22C.bat3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD56d0d6e0e6b9c1f755eeee10305f199c9
SHA16bd5ffb0481f75d5edbb659dfc0c85f3fd1c9147
SHA256fd93ab2b7dca5b0b769637aeec591fe865efa180d2f46625c80153dcb1ccfa6d
SHA512eb15d0f478723e397ce4ca3ac36d6ee30066dd1139f5828efc1016db7a6e5632ab99dd72146091d0dd42409d5497619250ea718fccf3a9debf9ceed3a34d74b3
-
Filesize
484KB
MD57b714d463f7db900d5b6e757778a8ab8
SHA12cfc0e9f54236af8e10b0bfa551d87a20982b733
SHA256c995370836939a29853611830ca08d437286d4f45603edce88f36aa1f99a0d97
SHA512e8fe8823b5b7f282c24c964cbf4f248b7562259a13410bf95997288727f9bfc6ea51c4aa40182b649a2235bafc02062e0c57f4f62876b5174395071a8d68f9bb
-
Filesize
722B
MD5428c79c957f3b0d16699d6fe76c7947c
SHA1a900f8722af9f6a072467c2c3b4e45d39edd71ea
SHA256eb60636e1cffd62764526929df47a1c495f94ab419df1970312657d9c9728348
SHA51212aa4c69a018a70191e6fe75cc5479be2588a11f50099b7b14d514ad55476c84cc98d5909a32820d978070e4f202e71826fe084041892593c0308083cafcf21e
-
C:\Users\Admin\AppData\Local\Temp\8ad598321b1462b28a72360138022500fbf742011d3c7eac78c635cdcf6eb23a.exe.exe
Filesize4KB
MD599b96f7f497e9e216da4b7c9979810e5
SHA12c424f82747581db2b35673eb22ba321d573944b
SHA2567c3300179b3d9ab57042a5f026a69fac3b0e2e783e94853ff109a29d2d3f541b
SHA51290a0b888f474fa5505f39ca7575635a7ea839e4e23cf9d573c99d7b3b226036fb0b82e17900012aed9fe1c8b4985488e22df0421ad66dbff9d4fcf4be0455212
-
Filesize
39KB
MD5dd45e175b084f3e7b3923cb8fcb3833b
SHA1e44896aa2e3e4a8ba6677fd10c4eac8315b3939c
SHA256cff2b960d67366aedaec8aaa4388a3537000a7253a3eeef378d24e1a171a4f13
SHA512562284581292c3965df7e1f95bcffa2047d9a9e42e863e32b9cfc7b289270db24ca1ecb004f26d499d9901c49c11844cf3868b93b4b704f30a98ba4b52824fba
-
Filesize
9B
MD5ece8e24737d1957fb4e94d8890ee8d02
SHA16c79bfb99f560a2102a903116f5a0c195f7885e4
SHA256d920366b3c62a677cf0cf1f267a7c2f3dd693f2ff60ee023091bf9c39c5e30b8
SHA512ccf58b4da1ad1379a546f307bca8dc4452a61a3cb443814f4d9566b8d8d35cc9d794ada4d1a13296ed5bc0248ba5ef538e5dc5e22861c2ead3f479beeb5c2d37