Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe
Resource
win10v2004-20240802-en
General
-
Target
38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe
-
Size
713KB
-
MD5
8f611028b6eb10f2dc91d3515b62fcba
-
SHA1
4431412ab5f057b64f592f48dc8ba8a948ba4a3a
-
SHA256
38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7
-
SHA512
1ca318ce6b038ab563cbde483be4121069aaff4c1ef646e2344cf36f4ec034a265e8e2147c0279cd36d708b26951a9a4f26bc694fb8d942a0964cf68a27a40a6
-
SSDEEP
12288:bfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:LLOS2opPIXV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2392 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2148 Logo1_.exe 572 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 1124 Explorer.EXE -
Loads dropped DLL 3 IoCs
pid Process 2392 cmd.exe 2392 cmd.exe 1124 Explorer.EXE -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\PROOF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe Logo1_.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1031\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe File created C:\Windows\Logo1_.exe 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2148 Logo1_.exe 2148 Logo1_.exe 2148 Logo1_.exe 2148 Logo1_.exe 2148 Logo1_.exe 2148 Logo1_.exe 2148 Logo1_.exe 2148 Logo1_.exe 2148 Logo1_.exe 2148 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2392 2404 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 30 PID 2404 wrote to memory of 2392 2404 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 30 PID 2404 wrote to memory of 2392 2404 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 30 PID 2404 wrote to memory of 2392 2404 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 30 PID 2404 wrote to memory of 2148 2404 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 32 PID 2404 wrote to memory of 2148 2404 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 32 PID 2404 wrote to memory of 2148 2404 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 32 PID 2404 wrote to memory of 2148 2404 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 32 PID 2148 wrote to memory of 2576 2148 Logo1_.exe 33 PID 2148 wrote to memory of 2576 2148 Logo1_.exe 33 PID 2148 wrote to memory of 2576 2148 Logo1_.exe 33 PID 2148 wrote to memory of 2576 2148 Logo1_.exe 33 PID 2576 wrote to memory of 2008 2576 net.exe 35 PID 2576 wrote to memory of 2008 2576 net.exe 35 PID 2576 wrote to memory of 2008 2576 net.exe 35 PID 2576 wrote to memory of 2008 2576 net.exe 35 PID 2392 wrote to memory of 572 2392 cmd.exe 36 PID 2392 wrote to memory of 572 2392 cmd.exe 36 PID 2392 wrote to memory of 572 2392 cmd.exe 36 PID 2392 wrote to memory of 572 2392 cmd.exe 36 PID 2148 wrote to memory of 1124 2148 Logo1_.exe 20 PID 2148 wrote to memory of 1124 2148 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe"C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aADBD.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe"C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe"4⤵
- Executes dropped EXE
PID:572
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5ed9f0ef9c1a51f3bf8e890943d6e4388
SHA18b82939b7c42224dc54f01923ff8dac9b8369324
SHA2569341690494eac1a6fe0963f9d65299ed91d7e06181932eb609f3e44b09bf0e81
SHA5128e84e37330eb2ff3a9bd46fc743fc727e748fede576cbc8810274a0b905942b90270d5f4aab8f41ac914b87ca722caaf3b82993bb127bf6ea6c725d56e8c6736
-
Filesize
474KB
MD5435ec7fc3558bdbf956705f3e0282fef
SHA1ae79ad9fc50e6dd539a4e56937475ecd1a7b13df
SHA25659bff9f5ce89ab0392f0fa0dfe0cb65faa91c2d9a5fe3ad50ad26db603503174
SHA512dc8036e8dcf28f05a4b58093c9c5b3cf4909abf441fd296979325f3e6ba9db35f78107bad9988c5c440e0521685cdafbd78f77c7f6ed63d6933ffcaeb8bee4bf
-
Filesize
722B
MD57242f575c533771653cbc450c0c1d803
SHA1dad3a2d6c42554a9166d9e1209d7149737b1b821
SHA2565f05bf85f0d875a34ab7b67fc0fed675582264dd1b9d195808c066396b44b86d
SHA51276dcfd67b63f822aef2089a390e4a940f6eb03a2c4a1a0f797255a0eb5b4833625baf70f885dc5ed181cc767f1da884b52c445f714419a2cf84c2c41605f36c2
-
C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe.exe
Filesize684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
29KB
MD502c3a4e7f369c64fcc4c92be92bc6e29
SHA1031a8330543a7a12de06d356e5e2b75ec8bf760a
SHA256a737dfa46ed58e1ac2264b44e764be23b0d8548717967a4494c13d7669638ac0
SHA51269469ae10b8942fb7ba0e72b47e375dffb31dca5fd8a9ef738dad403b19d17b0e4bc55ebb4d25244d5d99e9e99972bc80675f16554bb8f72f17bfa7d010fa76f
-
Filesize
9B
MD501a8a4ee3580d4da5c60557485bef735
SHA1f792412989fd2ce56b5d859cceef65819bf0ddf0
SHA256e2897bad6bc31a67e597a2ef77fce6939385cf6bd64587f2cc006436c43a4f2b
SHA5128ae193b79f1861b54d2a26031b161bf9aa6929661871de0f2c1cd1db91c5384244332bafc72bea107045eb0b41d876053ce11f5ce70147832f1871816c641145