Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/08/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe
Resource
win7-20240708-en
General
-
Target
08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe
-
Size
246KB
-
MD5
f4d51d7353c8c1df734c3eec50d17c5e
-
SHA1
33cd092be8465311caaf2797110113e1d6837090
-
SHA256
08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f
-
SHA512
547980116b68bd3ce0ffc0766dbd24f62f42c36595ba79f331d1603c1e0ac1c80f1fc3fbd3a991e86f0ca7024622c95b82b149251e3d73e82cdbf285c5914860
-
SSDEEP
3072:pokuJVLZELWKy7h5TbXd9ycGEbjPAqhwtH7LQ5DDHV7qBmTYpyEV1r9gkAolK0:LuJQWKyFhrNco5DDH9rTOyEV1rL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 836 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1336 Logo1_.exe 2720 08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe -
Loads dropped DLL 2 IoCs
pid Process 836 cmd.exe 836 cmd.exe -
resource yara_rule behavioral1/files/0x0008000000016dd8-25.dat upx behavioral1/memory/2720-31-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2720-37-0x0000000000400000-0x000000000049C000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PrivateAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Library\Analysis\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\SystemV\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Skins\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\_desktop.ini Logo1_.exe File created C:\Program Files\Google\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe File created C:\Windows\Logo1_.exe 08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1336 Logo1_.exe 1336 Logo1_.exe 1336 Logo1_.exe 1336 Logo1_.exe 1336 Logo1_.exe 1336 Logo1_.exe 1336 Logo1_.exe 1336 Logo1_.exe 1336 Logo1_.exe 1336 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1736 wrote to memory of 836 1736 08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe 29 PID 1736 wrote to memory of 836 1736 08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe 29 PID 1736 wrote to memory of 836 1736 08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe 29 PID 1736 wrote to memory of 836 1736 08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe 29 PID 1736 wrote to memory of 1336 1736 08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe 30 PID 1736 wrote to memory of 1336 1736 08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe 30 PID 1736 wrote to memory of 1336 1736 08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe 30 PID 1736 wrote to memory of 1336 1736 08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe 30 PID 1336 wrote to memory of 2188 1336 Logo1_.exe 32 PID 1336 wrote to memory of 2188 1336 Logo1_.exe 32 PID 1336 wrote to memory of 2188 1336 Logo1_.exe 32 PID 1336 wrote to memory of 2188 1336 Logo1_.exe 32 PID 2188 wrote to memory of 1748 2188 net.exe 34 PID 2188 wrote to memory of 1748 2188 net.exe 34 PID 2188 wrote to memory of 1748 2188 net.exe 34 PID 2188 wrote to memory of 1748 2188 net.exe 34 PID 836 wrote to memory of 2720 836 cmd.exe 35 PID 836 wrote to memory of 2720 836 cmd.exe 35 PID 836 wrote to memory of 2720 836 cmd.exe 35 PID 836 wrote to memory of 2720 836 cmd.exe 35 PID 1336 wrote to memory of 1256 1336 Logo1_.exe 20 PID 1336 wrote to memory of 1256 1336 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe"C:\Users\Admin\AppData\Local\Temp\08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a90CB.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe"C:\Users\Admin\AppData\Local\Temp\08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:1748
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5b949c7bfabb7039f03ea27c7357d2680
SHA180890657a4a1f65cb05563ea007f1a6743bb408d
SHA25607a126ffd86760b78c147bb32c473d80f1bc37fac79a741197049cc878bf795f
SHA5127dfbf31a6eccaf83c4e1fe8e5586eea2fed58ebb0326e9c7d06974585f1028500157d3949400bd71b53f31479ed3b361be3d58376297b262437a4da48c485830
-
Filesize
474KB
MD5e00bb37f2870de4ab176bfec72cf7d6c
SHA1921f2f71ea208b9ccfd5d9cf6cf0620379a34245
SHA256fc9817a352ebbf8890eb2849fd80a0af54ca93b38965f512d7caf691b41a622c
SHA512946d88acf60b8da3c6cbd2af7137b66086d8849b1b36963f3d86b5eaee65667f64b9acf01482380e1d4805a9f42f14541bde97278d03fee9b86a1fa0bee3bfd2
-
Filesize
722B
MD50e647347bdff8211348709e33a394f68
SHA13f48b18f2a54b073b024a32f274e402bceeb0c81
SHA256ece5673387be1b5eaab01e6b7309ed7e41f33c107f886b69f98f55bfd33edd32
SHA5124d1ffa4e76b842d6e8881ee0700fc25b3132196ca2c8d1778e377e640eae6faaf5e69cf6350d9776a334828b903cab8a5ae94a5f734728883b9b1050be6d61af
-
C:\Users\Admin\AppData\Local\Temp\08230a0d4e279e4c9f08aee3900dcdd4553014b1b578b45592b0250ac558aa8f.exe.exe
Filesize217KB
MD5166e4e81eebec1f69479e021421ae0a3
SHA100db0eaff240a95aedca38d4c11b55f863fcac79
SHA256f7672fc4c2865403fe320a4226adb611263f4848744bca082670192fbea0a973
SHA512c7908b70bd6a56f1099710b1c34a94b28a6384427f8efe7e9817a3762bf4dc4206a8a2a5b083e906b580e86876876103b78c16fbf9c4c3293ccc55cc19e6a2e3
-
Filesize
29KB
MD53892a73a8feb14c363f9fc86355e24c1
SHA1b38d5e8b79fc76ac6c4c92b61f0e42ccbfcb15a8
SHA256abe3fc6cbe35adb6def32941c3b2244be5fe43c214a0fe4446ce889fbd8da8bb
SHA512099917ff9a2b844e33be0de5dca9cda472aee12a26c658b821f8098d0c0acd1c5a34eb5e90f0e1520b042dfe3571a558c9598346a7e4009d0e6c3e76ab5e7cf2
-
Filesize
8B
MD5a451cf229ab77d19c624b2e48ac11ec8
SHA10f3002921952d4e528750030d6340b77d10b5fc9
SHA25696a8bb2a4a11f6596cd7c59eee4a5ea4dcfb02550aadc0b233e6cc269883f222
SHA512699a221508bfee448d09720da926c818de965de39253e6c82fe79343d2916c59edb97ae5dc6d1e3b6343928fcefb636f5dfa13507e5ec53b3c4eeb1266caa3cd