Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe
Resource
win7-20240903-en
General
-
Target
78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe
-
Size
37KB
-
MD5
39c3bcc55d1bac5f940acd36b7df6fdb
-
SHA1
7f06069d53003415add83286cd55c662636e0fd0
-
SHA256
78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9
-
SHA512
60599e7196180be678088e35c051aed7ddfb1a16e4c794740c2e176d745c249227c26fb272fdd5643795a33235df995167c56456473fa42b3a1f71f2c5f2d114
-
SSDEEP
768:KBRO5RroZJ76739sBWs69a7zKHOrEz+mKLtOWDKn3:Kfe+Zk78UKUW+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1564 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 1 IoCs
pid Process 2476 Logo1_.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1041\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eo\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SUMIPNTG\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sm\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe File created C:\Windows\Logo1_.exe 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe 2476 Logo1_.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2464 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 30 PID 2600 wrote to memory of 2464 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 30 PID 2600 wrote to memory of 2464 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 30 PID 2600 wrote to memory of 2464 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 30 PID 2464 wrote to memory of 1548 2464 net.exe 32 PID 2464 wrote to memory of 1548 2464 net.exe 32 PID 2464 wrote to memory of 1548 2464 net.exe 32 PID 2464 wrote to memory of 1548 2464 net.exe 32 PID 2600 wrote to memory of 1564 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 33 PID 2600 wrote to memory of 1564 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 33 PID 2600 wrote to memory of 1564 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 33 PID 2600 wrote to memory of 1564 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 33 PID 2600 wrote to memory of 2476 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 35 PID 2600 wrote to memory of 2476 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 35 PID 2600 wrote to memory of 2476 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 35 PID 2600 wrote to memory of 2476 2600 78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe 35 PID 2476 wrote to memory of 2608 2476 Logo1_.exe 36 PID 2476 wrote to memory of 2608 2476 Logo1_.exe 36 PID 2476 wrote to memory of 2608 2476 Logo1_.exe 36 PID 2476 wrote to memory of 2608 2476 Logo1_.exe 36 PID 2608 wrote to memory of 2720 2608 net.exe 38 PID 2608 wrote to memory of 2720 2608 net.exe 38 PID 2608 wrote to memory of 2720 2608 net.exe 38 PID 2608 wrote to memory of 2720 2608 net.exe 38 PID 2476 wrote to memory of 2640 2476 Logo1_.exe 39 PID 2476 wrote to memory of 2640 2476 Logo1_.exe 39 PID 2476 wrote to memory of 2640 2476 Logo1_.exe 39 PID 2476 wrote to memory of 2640 2476 Logo1_.exe 39 PID 2640 wrote to memory of 2784 2640 net.exe 41 PID 2640 wrote to memory of 2784 2640 net.exe 41 PID 2640 wrote to memory of 2784 2640 net.exe 41 PID 2640 wrote to memory of 2784 2640 net.exe 41 PID 2476 wrote to memory of 1200 2476 Logo1_.exe 21 PID 2476 wrote to memory of 1200 2476 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe"C:\Users\Admin\AppData\Local\Temp\78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aB423.bat3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1564
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5132624a6a5e38afcf976b4657690a558
SHA14fa999ba139bc0af894821b83b7c0ba49ba7e4ce
SHA256f82b3ec29220048b3ad8e3c8f0b2dc7b303c77cc21014fa402bc030960df3ee0
SHA512ab30add9589ac59abefa82d881f2cd019f7e5703ccae5f000313cd45ce96c1ec8554adf0825ccf54aabafa0b0ccd840527f24b8ac0a833bc4a859f26ad45aa2c
-
Filesize
477KB
MD5c32f3ae2a93a21a604cd493d86b40278
SHA14428387f1a1dd12ff5607459bcf4d89cd8ed80fe
SHA256b84bbbbc007c88ca79ea94b2cf92e7a3093c8de3a8ce4b70b6f4d0a9480595a8
SHA5125e7bb3318deebf7663fc4b9c3b20ce75986e32cbb27c34ec94fccf5affde4f0dd9e5dd0bef38510d088ec00b885dccafff09706a75fd927f882540ead7cc7965
-
Filesize
722B
MD52819d109a199399ae3b4332bef8853fc
SHA185b83e66e8f025a6f3939df826eeb7d8e7d5807f
SHA2567a96e4611a07e56a7450582b96f100d62ab78aacb31198ed0d0b1b679ea6bcca
SHA5123e1fb2e63b660b170e2acb97d8f2f4a7e81038fc131e68e2ad7cc529c05a8e811889af56e48e36f499d8d1da061885ba2bba7c5db1933db0cd406151bb26d129
-
C:\Users\Admin\AppData\Local\Temp\78d5a57484343058abc69e295c0684d956cf30ea810a04fb94f17713d520abc9.exe.exe
Filesize4KB
MD599b96f7f497e9e216da4b7c9979810e5
SHA12c424f82747581db2b35673eb22ba321d573944b
SHA2567c3300179b3d9ab57042a5f026a69fac3b0e2e783e94853ff109a29d2d3f541b
SHA51290a0b888f474fa5505f39ca7575635a7ea839e4e23cf9d573c99d7b3b226036fb0b82e17900012aed9fe1c8b4985488e22df0421ad66dbff9d4fcf4be0455212
-
Filesize
33KB
MD5ac4d54500ddcf012f66bc5ba7530beb1
SHA1375bfcd1b95696f4b1c5f93dd5621e5c16fcda98
SHA256733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09
SHA512076bddcb1a579a43ec3714f9396a2b3836bcb86d469c9df56b9bbc94aaf1330069c97c75081e5414faf2160b8904f357fa823c40273e64c8278059c760fa974a
-
Filesize
9B
MD55412111268dd2c1fb1cf8697bfab9b6c
SHA116d0b289e83c74cb50a004edd7c5750ac706f321
SHA256f3aa35be7048ddbf11fc581e5f9476745d75bcf097e121ba2915614e360a0cdc
SHA51213fc5bf11faaf5471fde8a1bafdcc6d27521bad796e5e532c94d9c8232dd70088e70b6d5ac60c4c15d13e59926ac38e9a9e01b4dd4694a77d70bdd1ae7005ccf