Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
b9d52b79e93d62ef5deb7a7567839940N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b9d52b79e93d62ef5deb7a7567839940N.exe
Resource
win10v2004-20240802-en
General
-
Target
b9d52b79e93d62ef5deb7a7567839940N.exe
-
Size
38KB
-
MD5
b9d52b79e93d62ef5deb7a7567839940
-
SHA1
a9d63580b314d7fd1922d29ed298694815fbb7f5
-
SHA256
7068e9a5d5452a1d38a05500a22e3be40366d42a3513e4795c0cd2dc2231f1fc
-
SHA512
182aa92c2f62f7ea88253ef0f2012a13a7e268815e105132fc2b1d97d25985ac18b724395de5a1ebe0e1a136d20db59254a3d5eb7319c1cd628ca4c792ddf107
-
SSDEEP
384:NbbJ1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJhKPMSfh:pl16GVRu1yK9fMnJG2V9dHS8WPNUGJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 628 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2528 Logo1_.exe 2784 b9d52b79e93d62ef5deb7a7567839940N.exe -
Loads dropped DLL 6 IoCs
pid Process 628 cmd.exe 2120 WerFault.exe 2120 WerFault.exe 2120 WerFault.exe 2120 WerFault.exe 2120 WerFault.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wab.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe b9d52b79e93d62ef5deb7a7567839940N.exe File created C:\Windows\Logo1_.exe b9d52b79e93d62ef5deb7a7567839940N.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2120 2784 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9d52b79e93d62ef5deb7a7567839940N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9d52b79e93d62ef5deb7a7567839940N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1644 wrote to memory of 628 1644 b9d52b79e93d62ef5deb7a7567839940N.exe 30 PID 1644 wrote to memory of 628 1644 b9d52b79e93d62ef5deb7a7567839940N.exe 30 PID 1644 wrote to memory of 628 1644 b9d52b79e93d62ef5deb7a7567839940N.exe 30 PID 1644 wrote to memory of 628 1644 b9d52b79e93d62ef5deb7a7567839940N.exe 30 PID 1644 wrote to memory of 2528 1644 b9d52b79e93d62ef5deb7a7567839940N.exe 31 PID 1644 wrote to memory of 2528 1644 b9d52b79e93d62ef5deb7a7567839940N.exe 31 PID 1644 wrote to memory of 2528 1644 b9d52b79e93d62ef5deb7a7567839940N.exe 31 PID 1644 wrote to memory of 2528 1644 b9d52b79e93d62ef5deb7a7567839940N.exe 31 PID 2528 wrote to memory of 1184 2528 Logo1_.exe 33 PID 2528 wrote to memory of 1184 2528 Logo1_.exe 33 PID 2528 wrote to memory of 1184 2528 Logo1_.exe 33 PID 2528 wrote to memory of 1184 2528 Logo1_.exe 33 PID 628 wrote to memory of 2784 628 cmd.exe 35 PID 628 wrote to memory of 2784 628 cmd.exe 35 PID 628 wrote to memory of 2784 628 cmd.exe 35 PID 628 wrote to memory of 2784 628 cmd.exe 35 PID 628 wrote to memory of 2784 628 cmd.exe 35 PID 628 wrote to memory of 2784 628 cmd.exe 35 PID 628 wrote to memory of 2784 628 cmd.exe 35 PID 1184 wrote to memory of 2876 1184 net.exe 36 PID 1184 wrote to memory of 2876 1184 net.exe 36 PID 1184 wrote to memory of 2876 1184 net.exe 36 PID 1184 wrote to memory of 2876 1184 net.exe 36 PID 2784 wrote to memory of 2120 2784 b9d52b79e93d62ef5deb7a7567839940N.exe 37 PID 2784 wrote to memory of 2120 2784 b9d52b79e93d62ef5deb7a7567839940N.exe 37 PID 2784 wrote to memory of 2120 2784 b9d52b79e93d62ef5deb7a7567839940N.exe 37 PID 2784 wrote to memory of 2120 2784 b9d52b79e93d62ef5deb7a7567839940N.exe 37 PID 2528 wrote to memory of 1248 2528 Logo1_.exe 21 PID 2528 wrote to memory of 1248 2528 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\b9d52b79e93d62ef5deb7a7567839940N.exe"C:\Users\Admin\AppData\Local\Temp\b9d52b79e93d62ef5deb7a7567839940N.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aA41C.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\b9d52b79e93d62ef5deb7a7567839940N.exe"C:\Users\Admin\AppData\Local\Temp\b9d52b79e93d62ef5deb7a7567839940N.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 5485⤵
- Loads dropped DLL
- Program crash
PID:2120
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536B
MD5938dc8336f1ce5216aac0b8ccf269efc
SHA1de926358cbfc4cf68d470f2f75a80dfa0af96b3a
SHA2567504f33b07347a2574d9ef06ad6516a81541c2e132e6f87fe76a7cbb5e8f30fa
SHA512e32930341c0ed8404ab151e2b29091ef668328d0a4708c445c6f59b514c2649ce6d38284484a8eea75098012a3333396f68b5d92eef805566361eb33b905ae17
-
Filesize
9KB
MD5d43613c6ae1506ca4961aaebabf19b63
SHA1f0028e0908fd6bd170b3e297f137964526f2de8e
SHA25634ded1f940ea26bcdb8ee34e8adfab4f234f2748f21fa4cefed8f246cabb159b
SHA51284fafdd624daa3523d1e242c8a8ead793ff3df2db1eb456b2638fd78a6b3e192dfb0036ef828569c97ed522dee77347e978a5cef9c86ac9707d7d468a38bf9f4
-
Filesize
29KB
MD5668b9b2a023470ef8e41a8dd5913892a
SHA19459ca7efe49aa5573e0fca1c160c54dae9c2170
SHA256033b6cc47ebe0c706b32bbf040fe93350aa0118b49837fb97d3912542c37fb58
SHA5126c894b1c1610a888e5f8ddd204e4e3d150a73248c582fa305832e6e40a9b7f4cee4c10e5f7bb7a793714e89ca535f40c8f042ba4b51e1ac316e1644cb5b67c6d
-
Filesize
9B
MD5ee6da0916e43a13c40e1dec936bccc09
SHA13c41c332d37b563dad6d1c8ccec540428eae35f9
SHA2560259d8b67e15053053cf5d982948c58d2c6121d2f86b7aefa7c7948979c6e28c
SHA512b70fefd584ad9b4f8c71125a4be5e157cdcbccec18c7f64d235d10c98d4c6005b9c8b6261221211b48f5ceec417792d34750b488f0e2a33dfd702e0094f625a7