Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
8b5e68042edbd8cbbcfcedeade8d6c10N.exe
Resource
win7-20240708-en
General
-
Target
8b5e68042edbd8cbbcfcedeade8d6c10N.exe
-
Size
90KB
-
MD5
8b5e68042edbd8cbbcfcedeade8d6c10
-
SHA1
fb3edea22c09a375566d669659a331a8fb5b150d
-
SHA256
02f031a51085f2466a8bd8466ec11a8dceb57fd8d38626070d1dff6066c9a7aa
-
SHA512
5cc6c2d1be6b95428fe80a9dab4a862a0f0e84f13ddea3f6f5dd3e3589b051bd12f82d8e889eac972a3d0eb01854c894e4d817c562b80c8701a6f1d6fffb2f4f
-
SSDEEP
768:KPL1RO5RroZJ76739sBWs69a7zKHOrEz+mKLtOWD/QwmKxyA5dmtdLAuDeGJiqr8:Kfe+Zk78UKUWLQwFxV7qjh3rmKPNIwW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2864 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2480 Logo1_.exe 2688 8b5e68042edbd8cbbcfcedeade8d6c10N.exe -
Loads dropped DLL 1 IoCs
pid Process 2864 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\applet\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe Logo1_.exe File created C:\Program Files\DVD Maker\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kab\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am_ET\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 8b5e68042edbd8cbbcfcedeade8d6c10N.exe File created C:\Windows\Logo1_.exe 8b5e68042edbd8cbbcfcedeade8d6c10N.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b5e68042edbd8cbbcfcedeade8d6c10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2156 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 31 PID 1976 wrote to memory of 2156 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 31 PID 1976 wrote to memory of 2156 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 31 PID 1976 wrote to memory of 2156 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 31 PID 2156 wrote to memory of 2176 2156 net.exe 33 PID 2156 wrote to memory of 2176 2156 net.exe 33 PID 2156 wrote to memory of 2176 2156 net.exe 33 PID 2156 wrote to memory of 2176 2156 net.exe 33 PID 1976 wrote to memory of 2864 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 34 PID 1976 wrote to memory of 2864 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 34 PID 1976 wrote to memory of 2864 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 34 PID 1976 wrote to memory of 2864 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 34 PID 1976 wrote to memory of 2480 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 36 PID 1976 wrote to memory of 2480 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 36 PID 1976 wrote to memory of 2480 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 36 PID 1976 wrote to memory of 2480 1976 8b5e68042edbd8cbbcfcedeade8d6c10N.exe 36 PID 2480 wrote to memory of 2832 2480 Logo1_.exe 37 PID 2480 wrote to memory of 2832 2480 Logo1_.exe 37 PID 2480 wrote to memory of 2832 2480 Logo1_.exe 37 PID 2480 wrote to memory of 2832 2480 Logo1_.exe 37 PID 2864 wrote to memory of 2688 2864 cmd.exe 39 PID 2864 wrote to memory of 2688 2864 cmd.exe 39 PID 2864 wrote to memory of 2688 2864 cmd.exe 39 PID 2864 wrote to memory of 2688 2864 cmd.exe 39 PID 2832 wrote to memory of 2656 2832 net.exe 40 PID 2832 wrote to memory of 2656 2832 net.exe 40 PID 2832 wrote to memory of 2656 2832 net.exe 40 PID 2832 wrote to memory of 2656 2832 net.exe 40 PID 2480 wrote to memory of 2884 2480 Logo1_.exe 41 PID 2480 wrote to memory of 2884 2480 Logo1_.exe 41 PID 2480 wrote to memory of 2884 2480 Logo1_.exe 41 PID 2480 wrote to memory of 2884 2480 Logo1_.exe 41 PID 2884 wrote to memory of 2696 2884 net.exe 43 PID 2884 wrote to memory of 2696 2884 net.exe 43 PID 2884 wrote to memory of 2696 2884 net.exe 43 PID 2884 wrote to memory of 2696 2884 net.exe 43 PID 2480 wrote to memory of 1184 2480 Logo1_.exe 21 PID 2480 wrote to memory of 1184 2480 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\8b5e68042edbd8cbbcfcedeade8d6c10N.exe"C:\Users\Admin\AppData\Local\Temp\8b5e68042edbd8cbbcfcedeade8d6c10N.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD8E1.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\8b5e68042edbd8cbbcfcedeade8d6c10N.exe"C:\Users\Admin\AppData\Local\Temp\8b5e68042edbd8cbbcfcedeade8d6c10N.exe"4⤵
- Executes dropped EXE
PID:2688
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5c57ef276644263a6a4c6cf871b8e003d
SHA1a2f5ef600da07f5b5588c2ed8ba337741d313095
SHA256a8da87145e0f0463eeabe281c67b347d6ef6bebe3e5e00197a5b6ee59e1eed52
SHA512980da7eb3f8aca92aec8d780dbf07dd2629bf4aa84e4a14a0a4fb387dd512136ed2258b2a1ab3ee6eea3406c5bf1fa0287dc8c0a255445fa2dbb06e7a5da4119
-
Filesize
477KB
MD5c32f3ae2a93a21a604cd493d86b40278
SHA14428387f1a1dd12ff5607459bcf4d89cd8ed80fe
SHA256b84bbbbc007c88ca79ea94b2cf92e7a3093c8de3a8ce4b70b6f4d0a9480595a8
SHA5125e7bb3318deebf7663fc4b9c3b20ce75986e32cbb27c34ec94fccf5affde4f0dd9e5dd0bef38510d088ec00b885dccafff09706a75fd927f882540ead7cc7965
-
Filesize
536B
MD50a35f46553b7ed555aea6af784794ad9
SHA1050b0a6f23b221936dbf5f711e960eb41eb4dd23
SHA2567cd0752e85dc1b39d859610819d1f6de3e80662c67480a1f499e99e6c002432c
SHA512fe77dab7bfa98cf1cf2a8b7b6a625398d01d4b4af426f86a3bfe81bba0294311411aa83dc1341b6a1d5e9d7f09336c5bd1b8b6f29ec55b7d560bea153d3a1d55
-
Filesize
57KB
MD5fa71e60855b37c3c26d9ebbb52a0c3de
SHA1e608fea1cd4d5a34d7a86ca4e64d1db67f539f29
SHA2565122bb9ce0e46f847cf1920c4e2fcead16b3101f6f03d3225e92a5f80a2f1c1c
SHA5121b8cc9b37c24c9a5661e26cfb162fd1cb6419a4beb472bf100f4fbb61dfe9c353e8d3502af3d9a55d44a5f07dc0bf49412d5ca0d0d20fe466e3156ad1a88886b
-
Filesize
33KB
MD567447cc82c32ec0b329d4b6617249dbf
SHA10deb2e64815a22711d6de43a4be84e5898d44645
SHA256ed16b5f174494d3e4139f6441a81ce67754a08e8cc2ae5688241d5bff95893fb
SHA512175254a41a9fb8c4c113a046880c83ca2370c2f541b27d7a3fb8765a491bf612b37b615ba5c922e8b72f0c3a828edda6dd5afe03030f2b97da35fbd6671c1b76
-
Filesize
8B
MD55d65d1288c9ecedfd5f28d17a01a30bc
SHA1e5bb89b8ad5c73516abf7e3baeaf1855154381dc
SHA2563501728ad227b52ce4d4f85ddd0e6d28dfa7acce977ae27f1e337be209825a5f
SHA5126177ce001dd535382c3bae5e8c3cfda85d8d8b76b68bce10fa8e5e1e748fd1512a531ffc93fef1316f2c27d93b5b4a5b60a6391f0e131ccc5cc0a65c2755868e