Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe
Resource
win10v2004-20240802-en
General
-
Target
5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe
-
Size
662KB
-
MD5
749df83a7dba790f68372b526d9bddfe
-
SHA1
e2b40c61ccbf2443b3d04616d4720b218b493c0d
-
SHA256
5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0
-
SHA512
75fb9f871adf5aa8ce73bdfdb2089d82493e7168d16fc7e4309aceec41ab80d24ce0f4885de161d474dde28ae133198612015e57e1b64cbc97f0c8ec305e2352
-
SSDEEP
6144:iuJpC9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcdEKFVAh7f:4PFlTz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2968 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2956 Logo1_.exe 1072 5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe -
Loads dropped DLL 1 IoCs
pid Process 2968 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Hearts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\or_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\or_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ku_IQ\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\InfoPathOMFormServicesV12\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe File created C:\Windows\Logo1_.exe 5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2956 Logo1_.exe 2956 Logo1_.exe 2956 Logo1_.exe 2956 Logo1_.exe 2956 Logo1_.exe 2956 Logo1_.exe 2956 Logo1_.exe 2956 Logo1_.exe 2956 Logo1_.exe 2956 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2968 2712 5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe 30 PID 2712 wrote to memory of 2968 2712 5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe 30 PID 2712 wrote to memory of 2968 2712 5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe 30 PID 2712 wrote to memory of 2968 2712 5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe 30 PID 2712 wrote to memory of 2956 2712 5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe 31 PID 2712 wrote to memory of 2956 2712 5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe 31 PID 2712 wrote to memory of 2956 2712 5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe 31 PID 2712 wrote to memory of 2956 2712 5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe 31 PID 2956 wrote to memory of 2952 2956 Logo1_.exe 32 PID 2956 wrote to memory of 2952 2956 Logo1_.exe 32 PID 2956 wrote to memory of 2952 2956 Logo1_.exe 32 PID 2956 wrote to memory of 2952 2956 Logo1_.exe 32 PID 2952 wrote to memory of 2756 2952 net.exe 35 PID 2952 wrote to memory of 2756 2952 net.exe 35 PID 2952 wrote to memory of 2756 2952 net.exe 35 PID 2952 wrote to memory of 2756 2952 net.exe 35 PID 2968 wrote to memory of 1072 2968 cmd.exe 36 PID 2968 wrote to memory of 1072 2968 cmd.exe 36 PID 2968 wrote to memory of 1072 2968 cmd.exe 36 PID 2968 wrote to memory of 1072 2968 cmd.exe 36 PID 2956 wrote to memory of 1412 2956 Logo1_.exe 21 PID 2956 wrote to memory of 1412 2956 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe"C:\Users\Admin\AppData\Local\Temp\5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a5B79.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe"C:\Users\Admin\AppData\Local\Temp\5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe"4⤵
- Executes dropped EXE
PID:1072
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD53ca1bf22fc4c86f1ffd00a866ab6ff39
SHA1059063c11ade4cafeb9eea49592aa4a049ee9269
SHA2561123254ef1434c7002e054e89afbbb5a47cba9aff92916c03203e3dff7704220
SHA5125ff6e33ff4e45571b0684ddc95e4ffaf8260151b2fcd2ae9be2bd72be27ee8e8364e2185e1df5f1019e9d9d937b757bcd538483ca12d0eca6cc7f36bd88d81b0
-
Filesize
474KB
MD56eabc463f8025a7e6e65f38cba22f126
SHA13e430ee5ec01c5509ed750b88d3473e7990dfe95
SHA256cc8da3ecd355b519d81415d279ed037c725ba221bf323d250aa92ee2b2b88ca7
SHA512c8fde7026ac8633403bbefee4b044457184388fb7343d8c46f5f7f272724227976bf485ea91da49e2a85dd0cfb73f260ac705d8007333dd3e5539fe5ed67e3ab
-
Filesize
722B
MD536b401719d1f0b048410a84ca3c33b2c
SHA10be59f4bbb93a8f3697057936ce42813bee6f978
SHA256ec5df644df89fdd2d203b20b47580df623c42d88f189578ebe0b7d850e404b6f
SHA512ff2f4b6fac546251226156cf0cf81916d525f4c9004bcacfca89ba3385db77b0faedaee0cd77748c18c377046a92cc9dbf53a2b65f530e45f9f716e97d76e692
-
C:\Users\Admin\AppData\Local\Temp\5073d28b9f9c5801c2450785f26f0fce06c88864ece57d5f3ebedc5e70030fc0.exe.exe
Filesize633KB
MD52e0d056ad62b6ef87a091003714fd512
SHA173150bddb5671c36413d9fbc94a668f132a2edc5
SHA256cb83f04591cc1d602e650dd5c12f4470cf21b04328477bd6a52081f37c04bd7c
SHA512b8e920f8b7547aec6f5771e3e6119b01157e5e36a92c67142b0d73ffe0d501d933581e1fc752e5bba9ce819e3897be9c146bebfc0018e91318b0c99d188a2580
-
Filesize
29KB
MD5668b9b2a023470ef8e41a8dd5913892a
SHA19459ca7efe49aa5573e0fca1c160c54dae9c2170
SHA256033b6cc47ebe0c706b32bbf040fe93350aa0118b49837fb97d3912542c37fb58
SHA5126c894b1c1610a888e5f8ddd204e4e3d150a73248c582fa305832e6e40a9b7f4cee4c10e5f7bb7a793714e89ca535f40c8f042ba4b51e1ac316e1644cb5b67c6d
-
Filesize
9B
MD536657916738d378a6daf6ec7b690badd
SHA1e4d3726bd02e1e99b12ada04a242fd6ef7c2843c
SHA2567cd83d4ff3f3c6844b544fa7790bc1e7ed8bf829627657544861ac726071831c
SHA512b7878056ad1c2294fb0e659eee6c7861948010b69a43930d8a243f61cebbea83fcd6fb11db19c01f731a925a7a744c6cc4de2eb0ffdc3863acf71e4cc05b2d6b