Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/09/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
866d4082cb55a980eb9853baca970bf0N.exe
Resource
win7-20240903-en
General
-
Target
866d4082cb55a980eb9853baca970bf0N.exe
-
Size
66KB
-
MD5
866d4082cb55a980eb9853baca970bf0
-
SHA1
d48af090631c9717714bc952194ecb7d6fec9d9b
-
SHA256
1f6edb6ba58ee9b822dcea40f56b4e9a07989fcb80641c112ef22d40b18b7907
-
SHA512
f041a40bb4623a4ced1194acecee041162c9bc16d01e7a6b916641c8a21523d5a667d40ff40c6eac91d33a0903fb257a7123a9228334f656212cf5bca5798d7e
-
SSDEEP
1536:JMraYzMXqtGN/CstC9qVFAb4yzwC132n6wkj7:JMraY46tGNFC0VFAb4yzjwkH
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 866d4082cb55a980eb9853baca970bf0N.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
pid Process 2496 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2532 Logo1_.exe 2728 866d4082cb55a980eb9853baca970bf0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2496 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FRAR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lo\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 866d4082cb55a980eb9853baca970bf0N.exe File created C:\Windows\Logo1_.exe 866d4082cb55a980eb9853baca970bf0N.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 866d4082cb55a980eb9853baca970bf0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2672 866d4082cb55a980eb9853baca970bf0N.exe 2672 866d4082cb55a980eb9853baca970bf0N.exe 2672 866d4082cb55a980eb9853baca970bf0N.exe 2672 866d4082cb55a980eb9853baca970bf0N.exe 2672 866d4082cb55a980eb9853baca970bf0N.exe 2672 866d4082cb55a980eb9853baca970bf0N.exe 2672 866d4082cb55a980eb9853baca970bf0N.exe 2672 866d4082cb55a980eb9853baca970bf0N.exe 2672 866d4082cb55a980eb9853baca970bf0N.exe 2672 866d4082cb55a980eb9853baca970bf0N.exe 2672 866d4082cb55a980eb9853baca970bf0N.exe 2672 866d4082cb55a980eb9853baca970bf0N.exe 2672 866d4082cb55a980eb9853baca970bf0N.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe 2532 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1524 2672 866d4082cb55a980eb9853baca970bf0N.exe 30 PID 2672 wrote to memory of 1524 2672 866d4082cb55a980eb9853baca970bf0N.exe 30 PID 2672 wrote to memory of 1524 2672 866d4082cb55a980eb9853baca970bf0N.exe 30 PID 2672 wrote to memory of 1524 2672 866d4082cb55a980eb9853baca970bf0N.exe 30 PID 1524 wrote to memory of 1932 1524 net.exe 32 PID 1524 wrote to memory of 1932 1524 net.exe 32 PID 1524 wrote to memory of 1932 1524 net.exe 32 PID 1524 wrote to memory of 1932 1524 net.exe 32 PID 2672 wrote to memory of 2496 2672 866d4082cb55a980eb9853baca970bf0N.exe 33 PID 2672 wrote to memory of 2496 2672 866d4082cb55a980eb9853baca970bf0N.exe 33 PID 2672 wrote to memory of 2496 2672 866d4082cb55a980eb9853baca970bf0N.exe 33 PID 2672 wrote to memory of 2496 2672 866d4082cb55a980eb9853baca970bf0N.exe 33 PID 2672 wrote to memory of 2532 2672 866d4082cb55a980eb9853baca970bf0N.exe 35 PID 2672 wrote to memory of 2532 2672 866d4082cb55a980eb9853baca970bf0N.exe 35 PID 2672 wrote to memory of 2532 2672 866d4082cb55a980eb9853baca970bf0N.exe 35 PID 2672 wrote to memory of 2532 2672 866d4082cb55a980eb9853baca970bf0N.exe 35 PID 2532 wrote to memory of 3000 2532 Logo1_.exe 36 PID 2532 wrote to memory of 3000 2532 Logo1_.exe 36 PID 2532 wrote to memory of 3000 2532 Logo1_.exe 36 PID 2532 wrote to memory of 3000 2532 Logo1_.exe 36 PID 3000 wrote to memory of 1636 3000 net.exe 38 PID 3000 wrote to memory of 1636 3000 net.exe 38 PID 3000 wrote to memory of 1636 3000 net.exe 38 PID 3000 wrote to memory of 1636 3000 net.exe 38 PID 2496 wrote to memory of 2728 2496 cmd.exe 39 PID 2496 wrote to memory of 2728 2496 cmd.exe 39 PID 2496 wrote to memory of 2728 2496 cmd.exe 39 PID 2496 wrote to memory of 2728 2496 cmd.exe 39 PID 2532 wrote to memory of 3028 2532 Logo1_.exe 40 PID 2532 wrote to memory of 3028 2532 Logo1_.exe 40 PID 2532 wrote to memory of 3028 2532 Logo1_.exe 40 PID 2532 wrote to memory of 3028 2532 Logo1_.exe 40 PID 3028 wrote to memory of 2924 3028 net.exe 42 PID 3028 wrote to memory of 2924 3028 net.exe 42 PID 3028 wrote to memory of 2924 3028 net.exe 42 PID 3028 wrote to memory of 2924 3028 net.exe 42 PID 2532 wrote to memory of 1240 2532 Logo1_.exe 21 PID 2532 wrote to memory of 1240 2532 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\866d4082cb55a980eb9853baca970bf0N.exe"C:\Users\Admin\AppData\Local\Temp\866d4082cb55a980eb9853baca970bf0N.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:1932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aA8DD.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\866d4082cb55a980eb9853baca970bf0N.exe"C:\Users\Admin\AppData\Local\Temp\866d4082cb55a980eb9853baca970bf0N.exe"4⤵
- Executes dropped EXE
PID:2728
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD54cb61cdbe83e32f686ec1d5d9c8c81e8
SHA16c9a639ff8614f535dfbe594a0553c5e20f2ab36
SHA256f08253c31ff0c37a31859b433f48e079de3e2aedd383897c1059438de5e9dfdf
SHA51222cd0ff6e09b547c3f9026b07d943c52e75937679c4bbec080c0fc285a802f61317332a1d0186c68bfdb259965cabda9f7952bb00013e94011b0606d34ccf39c
-
Filesize
478KB
MD5e3d7f6cbc53a96972587f05acd5c0ca0
SHA1e12f124807a30188da6157d4423775373c668dd8
SHA25675db003d5fe6855e432e4ccaf8720890f181c3dc9d800b253508aebabfde2da8
SHA512ea783b525ebf1fa786d06051e64c72efa9665aaaa0e456c99c3fb80298066491da47d9056f7046d35d4bb3165ac2ca85eac9c9a9331923dbf56937831a9bc078
-
Filesize
536B
MD5187ca85feb14fef9063fafe8c143f942
SHA1e8f49af43cdce05375e7234737db5b3603efe471
SHA25625fdc524feea7eddbb039e02f558a97d1461f106b398b2d00e64eb7409b8393a
SHA5126fa41183247750a24cfb867a6e27113012c890470a977eea51122a25617996d063ae70789d4845380388cb1d07d7db3f54b00024075b2813cdae0d149a4839a8
-
Filesize
33KB
MD5e27df2dd35f9e988ae5eb765cdf26dcf
SHA1c21252dbf9e06e2d4492c3bbd6c29c41b5eb8440
SHA256cdd28c680dd5ccaa7cc5accc72825a3705747717735e0a6a3f446bfdcb27b044
SHA5128ea4e39586c42f983e07ab887e04147ab43757aa605997ad8487c64adbef51740ecc62b7030bbebf3bd962c65c1e66ee24d6d7e780b3e7ce0344f2bf2194ed50
-
Filesize
33KB
MD5a5817ced46296620f62b49e66c0e0b7e
SHA156446bbb1855257d094cb44e4e216b64bcd25fe0
SHA25639a0b0f9c415f548da5c361e1c56a2fa903e8093994b972df58ec29e35af7525
SHA5128b7ebb7fbb377450ddddcf447afe8cd0d67f422f101c8f6f8f81746e027084ce1c8a7e01da7311ba4ceb6d4e1dacf9220dd471970833cd32bfa241691d03b5b2
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
9B
MD56958c617a77595dbc06ba761133b066e
SHA1aa86897fa79edfb2905f43528d63d0baaa0b40f2
SHA256d1070387888af7568a73c3ce347758ce54586ae7ad77f1e34358bef9598a4758
SHA512da2fbe30ee3b252faac068ce82c34b1cc0516e164d457726742c09e4f8c01c36c6fb20e48b8db83bc86672255152784142aebc0efeaec33a28c721c8ecdd27d2