Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe
Resource
win10v2004-20240802-en
General
-
Target
beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe
-
Size
268KB
-
MD5
fe0f4ec241ed6f7a9eeec567ebbbe3f2
-
SHA1
ce34ba7ac037f1376ca4223046e8d87af4b81df3
-
SHA256
beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2
-
SHA512
498991cbc2053d8ee8a6c61812f0d8919c80782390e439ff4f184d4003aa046a499636a1df9d00c20f48034765f2cf7294520bd287c5179ecfbcfacb57746339
-
SSDEEP
6144:8VfjmNt1RAuOqXHNe/r3MVutniQ26fkdXJ:+7+tAWXA/rOciQ26f6
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0009000000015d62-32.dat acprotect -
Deletes itself 1 IoCs
pid Process 1504 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2292 Logo1_.exe 2864 beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe -
Loads dropped DLL 4 IoCs
pid Process 1504 cmd.exe 1504 cmd.exe 2864 beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe 2292 Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpenc.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Portal\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\setup_wm.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe File created C:\Windows\Logo1_.exe beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2864 beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe 2864 beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe 2864 beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1504 2540 beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe 30 PID 2540 wrote to memory of 1504 2540 beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe 30 PID 2540 wrote to memory of 1504 2540 beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe 30 PID 2540 wrote to memory of 1504 2540 beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe 30 PID 2540 wrote to memory of 2292 2540 beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe 31 PID 2540 wrote to memory of 2292 2540 beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe 31 PID 2540 wrote to memory of 2292 2540 beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe 31 PID 2540 wrote to memory of 2292 2540 beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe 31 PID 2292 wrote to memory of 2728 2292 Logo1_.exe 33 PID 2292 wrote to memory of 2728 2292 Logo1_.exe 33 PID 2292 wrote to memory of 2728 2292 Logo1_.exe 33 PID 2292 wrote to memory of 2728 2292 Logo1_.exe 33 PID 2728 wrote to memory of 2780 2728 net.exe 35 PID 2728 wrote to memory of 2780 2728 net.exe 35 PID 2728 wrote to memory of 2780 2728 net.exe 35 PID 2728 wrote to memory of 2780 2728 net.exe 35 PID 1504 wrote to memory of 2864 1504 cmd.exe 36 PID 1504 wrote to memory of 2864 1504 cmd.exe 36 PID 1504 wrote to memory of 2864 1504 cmd.exe 36 PID 1504 wrote to memory of 2864 1504 cmd.exe 36 PID 2292 wrote to memory of 1212 2292 Logo1_.exe 21 PID 2292 wrote to memory of 1212 2292 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe"C:\Users\Admin\AppData\Local\Temp\beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aAA91.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe"C:\Users\Admin\AppData\Local\Temp\beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5bb4b53663c070d58fd57960c5b404d14
SHA119cfc5274af434ab3fadb4b1781dffd7ac3864c8
SHA25689a35ce014bdbb94532c4a739d57d807b420d2f8b1c86791ae9c4b83bd79077a
SHA512aa63e653fc4a3ba6370af071c6c979743a487b50111fee1759cf4f7edc57d47e803a1723d626a0012bcf47b8932de7acb37418fe82b9986eec9e7d86dc8a9a00
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5b1d502f4528840aa7929e5becb7e233f
SHA14b8c33bb090803b5cfd49d66859376baad325682
SHA256dce37bd22918619db064e253045ad53c6aea80e0a23afdcc2ada905e3a079e7b
SHA51255921d137838741d56b7143024623c473b29a82968353dddffd4b817dd4042ceda859d29170e089efdd40ee07218a3b4abc4432e587ab09dcbdbd70967e0b1fb
-
C:\Users\Admin\AppData\Local\Temp\beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe.exe
Filesize241KB
MD534fc461f27a58b897e38adcb5dd25f49
SHA1952d24b184c7440fdae44c868b25b0c13afc4a71
SHA25601488ede48d1cc463b768563c91e2043e1622a3edb2e99ef1e9c217a299602fa
SHA512d1ae4a3e923637ba97b11ddc3d39f2b93eabfa284d64bae7858b706379c7af7523b7c34aed9af9e858d12e7b039d44b69234666ec337cfb844b6a9a34bc21a60
-
Filesize
26KB
MD5dfeb8bc493ae29fdfd9463961f22ffa1
SHA11665dc95dfb3977f5883eb18832cce97fdc82562
SHA25601e5d82665723f3fd606ec28df1235712effad7ff0c509f08cb88fdf4c322359
SHA51236cbe8b3820898910ebc32b67653311326ed7a2a828760d22219262328a835e8167a8ce2bafb853f9cff235668b28794845d32764240efb90cdd72f20a553cab
-
Filesize
9B
MD51d7eff79e14bea77e992f25202a6decc
SHA12481953494e9f17a5d9c8186bac1e89c460da06b
SHA2560bc3f26881fb44793cd3a989e616ce2b45848152d57eb4a38fd5f06df63f0a9a
SHA512e9cffe2ce1cc689a1a0c9bee4da9e0ab90625931729257893780b13eb9060ee26bf373c87c0ae33e3fcdc3e8614d415ac00fe57fd7f1fb4908212cc145c8d9ad
-
Filesize
172KB
MD54f407b29d53e9eb54e22d096fce82aa7
SHA1a4ee25b066cac19ff679dd491f5791652bb71185
SHA256cf0ecf30fc95800a34105acb9bcb484bb594a35b3ef26ace8f122af4f9f888dc
SHA512325f7b599455195101e4c0dafd3654906d20ed2c1ce2a5f38784635e16ab545df6ee44a83bed6128239be2dee5be110552c7b246b7f52482ab31552e14b54183