Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe
Resource
win10v2004-20240709-en
General
-
Target
51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe
-
Size
315KB
-
MD5
337347c936df99f79c92ab844abfc310
-
SHA1
fa02390e22ec0f3af4389985d0c438b7a0aaee1a
-
SHA256
51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0
-
SHA512
2e5cc226ff4b6ca2887e87df0655377a38d530060b0169d32f6436961b920e31c7def7d3d40a4c6cae82cbb3021345cfd8074062150daa64dc76f00b3a5fa921
-
SSDEEP
6144:2VfjmNGCAmFrmNzVzf3tYN5gPNv5+9WgSHpx3FUdXOKFNnokn:Y7+GCSVzf3i64WJJTUhO0rn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1504 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2292 Logo1_.exe 2864 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe -
Loads dropped DLL 1 IoCs
pid Process 1504 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Computers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\QUAD\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Bibliography\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1042\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ku_IQ\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe File created C:\Windows\Logo1_.exe 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1504 2540 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 30 PID 2540 wrote to memory of 1504 2540 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 30 PID 2540 wrote to memory of 1504 2540 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 30 PID 2540 wrote to memory of 1504 2540 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 30 PID 2540 wrote to memory of 2292 2540 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 31 PID 2540 wrote to memory of 2292 2540 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 31 PID 2540 wrote to memory of 2292 2540 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 31 PID 2540 wrote to memory of 2292 2540 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 31 PID 2292 wrote to memory of 2336 2292 Logo1_.exe 33 PID 2292 wrote to memory of 2336 2292 Logo1_.exe 33 PID 2292 wrote to memory of 2336 2292 Logo1_.exe 33 PID 2292 wrote to memory of 2336 2292 Logo1_.exe 33 PID 2336 wrote to memory of 2780 2336 net.exe 35 PID 2336 wrote to memory of 2780 2336 net.exe 35 PID 2336 wrote to memory of 2780 2336 net.exe 35 PID 2336 wrote to memory of 2780 2336 net.exe 35 PID 1504 wrote to memory of 2864 1504 cmd.exe 36 PID 1504 wrote to memory of 2864 1504 cmd.exe 36 PID 1504 wrote to memory of 2864 1504 cmd.exe 36 PID 1504 wrote to memory of 2864 1504 cmd.exe 36 PID 2292 wrote to memory of 1212 2292 Logo1_.exe 21 PID 2292 wrote to memory of 1212 2292 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe"C:\Users\Admin\AppData\Local\Temp\51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aAA91.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe"C:\Users\Admin\AppData\Local\Temp\51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe"4⤵
- Executes dropped EXE
PID:2864
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD57d5bbd46ae5b27be567572677573e918
SHA1cb8e5769b17adfc9998bee2812ee880e486807d2
SHA256cd68a8cc2fe7d2b115c2248f2d94dd8fa47aae4b39cbe32c9a9eee1378da1881
SHA51267a4a9d29c329a5527cc67b52c14e270d1ade7988203d65fe9be9114301900a460f481f0f1bc1e99b10c8f3f52f5e17e0eaf28130c33c8d07acf3211a879356e
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD59a831883b96ca57b07fd0ff46933e204
SHA176e3e5eb8743f385045f0b164ea543bc9372fe5e
SHA2567c27ba7a181a8b11294e86ec56bd091db8ea7095faf89bed4c34095e93fbc5d9
SHA51245d42b38303b34a39ec64e771554ab14ded9c7d5750d6e27888e00537397e2b20244dfd5f53845bf7d6bf4b43d9de42c738569929276e31f8792b9ae03e78c6f
-
C:\Users\Admin\AppData\Local\Temp\51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe.exe
Filesize288KB
MD59bd7f6c66aeee6d240517c0dc78dff19
SHA1627084a7b0900adec1be08d3f08fb01c7aaed4c2
SHA2562a37971200dda9141321e7ac09681822d2b0af1935360328e96601edf963efcf
SHA512a188a44f63841e13ce5b9fbac07d59bbd1772a4d8169ffccd395df36591ec9aa916b38b1f65c6bc4e3d629ae62f7e3c79879ed69ed5378381e52578b2a260195
-
Filesize
26KB
MD59bdf847671dc3903890f77077bcb0901
SHA111c0c0b5032d088b270e41a2b4ef84e6dbce0903
SHA256f3b0988c673f8190dd9ca5e66522f8844ec26a2abb7eaed78815a4f54f76cf64
SHA5129476560001bd604b35a27b0d2f15e7e43df643831104be4669a320425a61d8b48f2d24899b7b70cbdd8107e69aa498e412632bec7876d9394c3744866d04ac43
-
Filesize
9B
MD5c20162cff0e529974834e150d7e6691f
SHA1512e9821581354bd8078227ddf386b17e771ff38
SHA25682f2070eb6138ab12ec2a1f0c3ca7b3b97db75cc19a5076ed382b017f309bdd6
SHA512c2c414232ac5fc3d7ff195523c49610795d0ea4d95c69748ef9ddd4a42203ace52a7da8594cb20102743a21b6eb5bd9e7ee5915513a9c11a0db319323538d744