Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 23:08
Static task
static1
Behavioral task
behavioral1
Sample
e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe
Resource
win10v2004-20240802-en
General
-
Target
e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe
-
Size
662KB
-
MD5
86797766d109fafa84ec4d63c01382bd
-
SHA1
c27f5effe007014051abfc2e7cb879014fa246df
-
SHA256
e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e
-
SHA512
28cdf5ea913a9caf6ed91a3f1fefcf321b51f56811b0d9d21448e87ee254f06be13de02b606616bb7d8c488ec4f11ee79798a06c87f52b8fa5e9516df1afe0e6
-
SSDEEP
6144:tCuJpC9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcdEKFVAh7:SPFlTz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1528 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3024 Logo1_.exe 2788 e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe -
Loads dropped DLL 1 IoCs
pid Process 1528 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Groove.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\STS2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe File created C:\Windows\Logo1_.exe e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3024 Logo1_.exe 3024 Logo1_.exe 3024 Logo1_.exe 3024 Logo1_.exe 3024 Logo1_.exe 3024 Logo1_.exe 3024 Logo1_.exe 3024 Logo1_.exe 3024 Logo1_.exe 3024 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2808 wrote to memory of 1528 2808 e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe 31 PID 2808 wrote to memory of 1528 2808 e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe 31 PID 2808 wrote to memory of 1528 2808 e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe 31 PID 2808 wrote to memory of 1528 2808 e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe 31 PID 2808 wrote to memory of 3024 2808 e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe 32 PID 2808 wrote to memory of 3024 2808 e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe 32 PID 2808 wrote to memory of 3024 2808 e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe 32 PID 2808 wrote to memory of 3024 2808 e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe 32 PID 3024 wrote to memory of 2292 3024 Logo1_.exe 33 PID 3024 wrote to memory of 2292 3024 Logo1_.exe 33 PID 3024 wrote to memory of 2292 3024 Logo1_.exe 33 PID 3024 wrote to memory of 2292 3024 Logo1_.exe 33 PID 2292 wrote to memory of 2896 2292 net.exe 36 PID 2292 wrote to memory of 2896 2292 net.exe 36 PID 2292 wrote to memory of 2896 2292 net.exe 36 PID 2292 wrote to memory of 2896 2292 net.exe 36 PID 1528 wrote to memory of 2788 1528 cmd.exe 37 PID 1528 wrote to memory of 2788 1528 cmd.exe 37 PID 1528 wrote to memory of 2788 1528 cmd.exe 37 PID 1528 wrote to memory of 2788 1528 cmd.exe 37 PID 3024 wrote to memory of 1220 3024 Logo1_.exe 21 PID 3024 wrote to memory of 1220 3024 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe"C:\Users\Admin\AppData\Local\Temp\e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE678.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe"C:\Users\Admin\AppData\Local\Temp\e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe"4⤵
- Executes dropped EXE
PID:2788
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD513ab6f992499a26f664246ba9e6aa42b
SHA16f66a0e0c2a6b0c4d8ce6cae440390ec57b4122f
SHA256674a8940e5dedbcbd1ef3cb161df118cc5341fad90c8f0932e1da0894e363588
SHA512ee0702bc750ba4af65155435202aa2a2b411df32c4ad9216489dd85b645cb5113b1a9ad08a70af3eb0e94c889dc508caf251a53b9240aa79c66ae116226be886
-
Filesize
474KB
MD56eabc463f8025a7e6e65f38cba22f126
SHA13e430ee5ec01c5509ed750b88d3473e7990dfe95
SHA256cc8da3ecd355b519d81415d279ed037c725ba221bf323d250aa92ee2b2b88ca7
SHA512c8fde7026ac8633403bbefee4b044457184388fb7343d8c46f5f7f272724227976bf485ea91da49e2a85dd0cfb73f260ac705d8007333dd3e5539fe5ed67e3ab
-
Filesize
722B
MD5a7c39a852b08432ffcac926fd190869a
SHA17a146d3f0f6556f137f7f4dc2392b6997c2348b1
SHA256cd8c9815ab97f979eb1102c7c27c85a79942c872a7f5676a41ffe227e1db7130
SHA512711e56f95da8d3c597142fa0783066e773a4d09b4b91c9b97fb2b990d4295333cfddae2928633261ab4cc243f307434bb25dfab8468a5aff4fbd6b279d6ef543
-
C:\Users\Admin\AppData\Local\Temp\e66e0be4fd602049e595a37b4af5d95728f985108bfb1bfd809ed9037a7e166e.exe.exe
Filesize633KB
MD52e0d056ad62b6ef87a091003714fd512
SHA173150bddb5671c36413d9fbc94a668f132a2edc5
SHA256cb83f04591cc1d602e650dd5c12f4470cf21b04328477bd6a52081f37c04bd7c
SHA512b8e920f8b7547aec6f5771e3e6119b01157e5e36a92c67142b0d73ffe0d501d933581e1fc752e5bba9ce819e3897be9c146bebfc0018e91318b0c99d188a2580
-
Filesize
29KB
MD5c64b5702b462a9345363255cd38a3788
SHA19b6b6e857e544e61ee783065926c92d48337f0ce
SHA25616c685475090f9e09f57bb8836c127fb02a08926f76779de941fad5d6305f825
SHA51226c0c862561e1521891ee018bec7e128578343b2bc0e3471b87c5ef536e235c7ac9665c3ba84f9e0b9b206d3fae859ebefb1fd373123e0ee31b670e9bbe73836
-
Filesize
9B
MD5b7beb43f344015405dc34dab081d8434
SHA1f194ae965145f76e4825c67337ef69da96f3954f
SHA256d069f2206a0ca683611b357b347af3abd4c559602b5617591232512e6c0e1b02
SHA512ee85ee5a36f6fe3381a853d2e0a0209e3d83271f29a9f980d1cbfb0309430f26b2658eedc501c0639d0dd6c929b093b8f9bf1e1a3ff1179e581fc07ae635a678