Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe
Resource
win7-20240903-en
General
-
Target
c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe
-
Size
73KB
-
MD5
4008bc6c58a09d901019afb2d70d6af1
-
SHA1
25e5596bc9499893e30b61c957d56c52109bfc1a
-
SHA256
c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b
-
SHA512
2e9af1140d082dd0b4cbd0c071bb40755224523b92ae4dedd329808081262aab6d69b7e907370c56eaff1a9abf52c588ffea5984619747ba3b722b1d020d7311
-
SSDEEP
1536:p4q8Q1xZtffrb8sjPFNhTYsFFrzckH2fmitDuK8wFxHK6FrHUM/g:qKtfDwsjPThTYszDH2fPxH/FoZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2224 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2748 Logo1_.exe 2764 c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe Logo1_.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe Logo1_.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{C10A79F8-2372-49E3-801D-73DDEB38AD5B}\chrome_installer.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe Logo1_.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Logo1_.exe c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe File created C:\Windows\virDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2748 Logo1_.exe 2748 Logo1_.exe 2748 Logo1_.exe 2748 Logo1_.exe 2748 Logo1_.exe 2748 Logo1_.exe 2748 Logo1_.exe 2748 Logo1_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2224 2932 c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe 30 PID 2932 wrote to memory of 2224 2932 c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe 30 PID 2932 wrote to memory of 2224 2932 c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe 30 PID 2932 wrote to memory of 2224 2932 c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe 30 PID 2932 wrote to memory of 2748 2932 c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe 32 PID 2932 wrote to memory of 2748 2932 c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe 32 PID 2932 wrote to memory of 2748 2932 c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe 32 PID 2932 wrote to memory of 2748 2932 c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe 32 PID 2748 wrote to memory of 1232 2748 Logo1_.exe 21 PID 2748 wrote to memory of 1232 2748 Logo1_.exe 21 PID 2224 wrote to memory of 2764 2224 cmd.exe 33 PID 2224 wrote to memory of 2764 2224 cmd.exe 33 PID 2224 wrote to memory of 2764 2224 cmd.exe 33 PID 2224 wrote to memory of 2764 2224 cmd.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe"C:\Users\Admin\AppData\Local\Temp\c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a7A1F.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe"C:\Users\Admin\AppData\Local\Temp\c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe"4⤵
- Executes dropped EXE
PID:2764
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5a39942e442b0656712ef004c5eebf9f5
SHA15b5c47e50da05a3e28ddeeab3c1f675d54845771
SHA25696f36704a64625ba9c26041ead320fd87f7de70d1d4ad3742b5b363b8125c419
SHA5121a674bc5fc827e8f0e10c38220bbe4f4775bce61a53f4650ca1f86861f1824c047b63b5dde00fd6efae7ab62be17d62df7df6e59296b09fd68bf3eb139b13bb9
-
C:\Users\Admin\AppData\Local\Temp\c3de3d25b59fa179eae51b716ffe18645b57a9fce2eed6124d08fa5bb14eca9b.exe.exe
Filesize15KB
MD5aa6de3b84d95ce3559202a9dc56d48a6
SHA1b6dd9ee8468889bc72eab148edea64e49237b955
SHA25655ed3a9b580cbbf36dcad57160054a4952d4af2aae6230c81f6a9a1e2450e211
SHA51227946a8652d69ff50301a93a678b2ce15ea63cefe54c8f0f192b37f5c9d3ee5f1d34864f045b0a79464d31d864910c281c0be11bafa917162793b0dde1e12239
-
Filesize
58KB
MD55b9d1ea57e40c0636fe1c1fbcbd5a368
SHA1c5573447bcb3ed3fa0dff406f03cb9842b062419
SHA25615a6900fe8e23897487abfde1aecdacf532f1ce9019ce106abf2c81362121be0
SHA512f123c53ac52f2b50b4b2d573d57cc80ef7c98ba867bfed68e3987d03ee6d2912eff58bee43f1e502e393148b63485b782a064f877d2c7896cf09180e670d0c87