Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe
Resource
win10v2004-20240709-en
General
-
Target
9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe
-
Size
4.7MB
-
MD5
b507b4fae4e829a594551c9aa9558c76
-
SHA1
5bb73ec8187673fa4d5a5f1fe58a28f05a43b1c5
-
SHA256
9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425
-
SHA512
b83bc9f25fdc7709d8e019a52ee48b1ca9b378e474ebcdd56270eda8c5a178b10976d8d883bcc6e0c3dfca7e261d99efdd1805d9a7e05980c39862ea9e614015
-
SSDEEP
98304:TTZHwkh8lA5qICtNhQ8k7N1k4AYOfVkmUWqK7ZGFq86ZyiyEysbNLVExp3Zkoe8:TdHZ+YItNHk7NSDY0+WNZGoPZPZuxpJB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3060 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2328 Logo1_.exe 2812 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 2252 360huabaosetup.exe -
Loads dropped DLL 5 IoCs
pid Process 3060 cmd.exe 2812 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 2812 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 2812 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 2812 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 360huabaosetup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EURO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1036\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Outlook.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Logo1_.exe File opened for modification C:\Program Files\Windows Journal\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Temp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe File created C:\Windows\Logo1_.exe 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1688 wrote to memory of 3060 1688 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 30 PID 1688 wrote to memory of 3060 1688 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 30 PID 1688 wrote to memory of 3060 1688 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 30 PID 1688 wrote to memory of 3060 1688 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 30 PID 1688 wrote to memory of 2328 1688 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 32 PID 1688 wrote to memory of 2328 1688 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 32 PID 1688 wrote to memory of 2328 1688 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 32 PID 1688 wrote to memory of 2328 1688 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 32 PID 2328 wrote to memory of 2692 2328 Logo1_.exe 33 PID 2328 wrote to memory of 2692 2328 Logo1_.exe 33 PID 2328 wrote to memory of 2692 2328 Logo1_.exe 33 PID 2328 wrote to memory of 2692 2328 Logo1_.exe 33 PID 2692 wrote to memory of 2708 2692 net.exe 35 PID 2692 wrote to memory of 2708 2692 net.exe 35 PID 2692 wrote to memory of 2708 2692 net.exe 35 PID 2692 wrote to memory of 2708 2692 net.exe 35 PID 3060 wrote to memory of 2812 3060 cmd.exe 36 PID 3060 wrote to memory of 2812 3060 cmd.exe 36 PID 3060 wrote to memory of 2812 3060 cmd.exe 36 PID 3060 wrote to memory of 2812 3060 cmd.exe 36 PID 2812 wrote to memory of 2252 2812 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 37 PID 2812 wrote to memory of 2252 2812 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 37 PID 2812 wrote to memory of 2252 2812 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 37 PID 2812 wrote to memory of 2252 2812 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 37 PID 2812 wrote to memory of 2252 2812 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 37 PID 2812 wrote to memory of 2252 2812 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 37 PID 2812 wrote to memory of 2252 2812 9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe 37 PID 2328 wrote to memory of 1216 2328 Logo1_.exe 21 PID 2328 wrote to memory of 1216 2328 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe"C:\Users\Admin\AppData\Local\Temp\9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aA8EC.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe"C:\Users\Admin\AppData\Local\Temp\9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\360hb_tmp\4.0.324.0\360huabaosetup.exe"C:\Users\Admin\AppData\Local\Temp\360hb_tmp\4.0.324.0\360huabaosetup.exe" --user /exename:9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2252
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2708
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD56d6b52efb2a0ffa93fa75e30b8a6cdb8
SHA13d95a6beccd3b0c5099dc6f5a4d8b7835b2adc6f
SHA256570c1aeaa331c0f06af39ea01ce7b4a1b572d1746d233bc2fd356928792074da
SHA5127799102bf0a1785d53bcb4bb994e54efc4dc3d7ee16fd864d9c210d0c86771f49d9664ed0f00fa7aa7d08ad0cb7f3a62b9693ec4496418dfc6c4a44e68595fcf
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD507c96bd4ad67e6a780f05bd0b5b82d68
SHA17fd794583c89cc040ca5986934973cb383b8216c
SHA256d7eae4a6ebdea53fd14689b45193a0e69460fa400f8077b154ea92b988f40dec
SHA5125de8358dcdde55c748a35218c92e8db6891ee7f42c131bd5e70bb20c609641941c3452e8dc8fef68038e5958987bd005c81f904abb952fe23e431499c62e04f4
-
C:\Users\Admin\AppData\Local\Temp\9703d822795fb2fa91fb599556b20dc2e67f39e49b60ff9fcd4b1c40e0c27425.exe.exe
Filesize4.7MB
MD53a83e079cf1e79fa09248c3ffb742bc7
SHA1bc0dd5ba8b8f61ff34a20f753566cc2b814d70cd
SHA25623796fef04d754bd8845d131f91aca21a1cbef4efc300ac904c5c875b6853e28
SHA512e8e47c2c94ec1dd46ce4a22952560bac8eb1e92dbcc4357b5af0ac51bce82883aba1d966407db71393e5c04b064e80b7ebd5aa68c47a0223725951e0ff8fc11c
-
Filesize
26KB
MD518391870ca65afbac8d71ec5a641da96
SHA1df073ab849561d5ca7bc7fb15c6ebb4f9f5ee12a
SHA2569ea91d24b89b9786f3a79c1c9aee232172afec552ef9aaad9130ea5087c560f9
SHA5122bd9591ec49de6f5ad5b68ea4a7de2dba5e2dd3426ff71224a193b1db7578af85cdfc1a97cf1d99374928c7eb2df226b9bdd0f19234c295d59dc08c8055bc6bc
-
Filesize
9B
MD52efce5174bcf8d378a924333f75e26ad
SHA14fe6e1d729b55d42eb9d74aca11b36a94402de14
SHA25604ccb9bec2864153c72852867d8e65dca07eca4e5edcfb4beb62cb364dcd91fa
SHA51224684969632fb0562a3a7a5fec91d869d627730d8e9d83a2b17e326d7047e3fbff205eec207914e42ecd50fef68a212c19f3599ded271c00e66acc22f1f04c16
-
Filesize
1.6MB
MD5c412765db03e59091588551621021193
SHA1e6d1b444057735b482d6b3d226d7c2b0ef3c7d63
SHA2568a7cd25d858feb316e527130863a7f121b2c29f85086537f4d1e380f0334a4d4
SHA51297278289b8f1e72fb1f68039e6b3e6736938d5883725bd2fb70af68d237173b9c861e576c40c2cb46868fe3ea305634212635d460a5d02cd0f9bdccd79195b8d