Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 06:51
Static task
static1
Behavioral task
behavioral1
Sample
c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe
Resource
win10v2004-20240802-en
General
-
Target
c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe
-
Size
3.8MB
-
MD5
0d4c92518a70d0fc214fd61ee80a651a
-
SHA1
7a308e41d6c3ea0e3f6a42fb0f2362f11fa9655e
-
SHA256
c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4
-
SHA512
c71b98c53377f83f20ad16ac20107d7b91aba11cd45ac5d0b084d8a104caf0152f6842e5d3208c11691f947a607a748de9b306bd94b4fe2e712197654d6e8363
-
SSDEEP
49152:+7uLUvuexrXt4siTfS1kfCm3k5ai5bd8sX87mwzOHTa3upnNoNuOPnzHPxvLPGuN:dLURtxyim3FQbd8O6u9NdQpFom
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Control Panel\International\Geo\Nation c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe -
Deletes itself 1 IoCs
pid Process 2244 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2916 Logo1_.exe 2988 c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe -
Loads dropped DLL 1 IoCs
pid Process 2244 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Uninstall Information\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe Logo1_.exe File created C:\Program Files (x86)\Google\Update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2244 3032 c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe 29 PID 3032 wrote to memory of 2244 3032 c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe 29 PID 3032 wrote to memory of 2244 3032 c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe 29 PID 3032 wrote to memory of 2244 3032 c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe 29 PID 3032 wrote to memory of 2916 3032 c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe 30 PID 3032 wrote to memory of 2916 3032 c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe 30 PID 3032 wrote to memory of 2916 3032 c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe 30 PID 3032 wrote to memory of 2916 3032 c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe 30 PID 2916 wrote to memory of 2756 2916 Logo1_.exe 32 PID 2916 wrote to memory of 2756 2916 Logo1_.exe 32 PID 2916 wrote to memory of 2756 2916 Logo1_.exe 32 PID 2916 wrote to memory of 2756 2916 Logo1_.exe 32 PID 2756 wrote to memory of 2880 2756 net.exe 34 PID 2756 wrote to memory of 2880 2756 net.exe 34 PID 2756 wrote to memory of 2880 2756 net.exe 34 PID 2756 wrote to memory of 2880 2756 net.exe 34 PID 2244 wrote to memory of 2988 2244 cmd.exe 35 PID 2244 wrote to memory of 2988 2244 cmd.exe 35 PID 2244 wrote to memory of 2988 2244 cmd.exe 35 PID 2244 wrote to memory of 2988 2244 cmd.exe 35 PID 2916 wrote to memory of 1392 2916 Logo1_.exe 20 PID 2916 wrote to memory of 1392 2916 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe"C:\Users\Admin\AppData\Local\Temp\c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a3360.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe"C:\Users\Admin\AppData\Local\Temp\c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2988
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD59b70af1ce9221986b2abbfad8a3fc0c0
SHA13eccc923a532afa2bd30bfac2d0e785f232b8197
SHA256a5f4c52c8c8a58eafbae19514988a87b06ddbb6a3aa8538fbce8cd4f549994b7
SHA51243b71fc5ebd24f73035b2995650b7b99cfb65f34cb57af7873dea29737228559bcf10748d194bc079e17e1a9e0b0f5d88f24329d094f837cd47689678db1ab4e
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5308dc6789cd94e7e570b56de4ee53869
SHA13cc2d3fc811ec32597bade405be8a86e2078ff36
SHA25648a78dd7c9bfebb98d7e2ae7ee43c87eb0313fdbf89632705a0cb1ccb6771f22
SHA512e2f8dd7a0f59c0c28c7889d0c883086caf0452a8420211087a889dda5436448f31b9dbeeb0dee094c68a6f6c3c4d378318765444e28408916aaa9f5663aeea39
-
C:\Users\Admin\AppData\Local\Temp\c94adfa8508665885124be863f7624ca72466dba0970af97ca27c95127b3d8c4.exe.exe
Filesize3.8MB
MD56582dd6bd38bfe986f09aea5b5b54ffc
SHA1d0368d7f1d1760f93858e970b4970e8eb399ef16
SHA2566e8261deb2c550a541b3391e0514a6dc1f00ca14594b8451ee1cbb14175c641a
SHA512003b51d233217056dbfeb2ef5f3e7445f95cd5c17237405dadac35c4168c56917adc88d8f110d41b5c4017bb41da30b9963680c3c2d9f4c20d1683bd5f29a9c8
-
Filesize
26KB
MD51de9441d703e634b101ddc6b68af5764
SHA10b78f86ac25ebbf70932df8e2b0a1637d68b4629
SHA256a00b09d9599e8d7fb2a6c8aab5634aa8337e2ce0cb0077087eb8aa930a426fc6
SHA51204e67d3d7409e890b48ae7d0c9d7cbc2b6b8a96a90e9d0f972e43b0c8300d1635bd6808dc8958b3ee13a745418262f7cc7cd3360a02a322e113b425757126959
-
Filesize
8B
MD50d72cd0b0aa46eeff2619cd2c58bf101
SHA15176d485e9a54ec517fd12c2aa7efcb1855286f2
SHA25648db671b8d392706b0784a38cfdbfc3e9090457cbb04901a9eed5e8248a76bb7
SHA512730ed8a629022a50a151646467a82228962c006a4fa23eadce4f586ef36df5fd311001c5ec502ddc4fe2e52b4f2a8da86e40950aefbcd51f8fd3dea8ebc304ba