Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe
Resource
win10v2004-20240802-en
General
-
Target
8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe
-
Size
711KB
-
MD5
22cb145ea16a8ab34dddefdc28dad816
-
SHA1
c34cdb812e763fb8d9cae9c6151a54558d4ba043
-
SHA256
8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d
-
SHA512
822ba4a2324021073bc29643b85f3db33925ee1fe7e9799a84d28898f04a2c72cd60ab1c11815217e09dfbe0ce24d8b494de84e145582dba46cb1a12e3ac1625
-
SSDEEP
12288:PpKfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:PpGLOS2opPIXV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1896 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1188 Logo1_.exe 2816 8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe 1228 Explorer.EXE -
Loads dropped DLL 2 IoCs
pid Process 1896 cmd.exe 1896 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FRAR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpconfig.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe File created C:\Windows\Logo1_.exe 8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1188 Logo1_.exe 1188 Logo1_.exe 1188 Logo1_.exe 1188 Logo1_.exe 1188 Logo1_.exe 1188 Logo1_.exe 1188 Logo1_.exe 1188 Logo1_.exe 1188 Logo1_.exe 1188 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1896 2540 8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe 30 PID 2540 wrote to memory of 1896 2540 8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe 30 PID 2540 wrote to memory of 1896 2540 8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe 30 PID 2540 wrote to memory of 1896 2540 8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe 30 PID 2540 wrote to memory of 1188 2540 8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe 31 PID 2540 wrote to memory of 1188 2540 8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe 31 PID 2540 wrote to memory of 1188 2540 8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe 31 PID 2540 wrote to memory of 1188 2540 8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe 31 PID 1188 wrote to memory of 2060 1188 Logo1_.exe 32 PID 1188 wrote to memory of 2060 1188 Logo1_.exe 32 PID 1188 wrote to memory of 2060 1188 Logo1_.exe 32 PID 1188 wrote to memory of 2060 1188 Logo1_.exe 32 PID 2060 wrote to memory of 2732 2060 net.exe 35 PID 2060 wrote to memory of 2732 2060 net.exe 35 PID 2060 wrote to memory of 2732 2060 net.exe 35 PID 2060 wrote to memory of 2732 2060 net.exe 35 PID 1896 wrote to memory of 2816 1896 cmd.exe 36 PID 1896 wrote to memory of 2816 1896 cmd.exe 36 PID 1896 wrote to memory of 2816 1896 cmd.exe 36 PID 1896 wrote to memory of 2816 1896 cmd.exe 36 PID 1188 wrote to memory of 1228 1188 Logo1_.exe 21 PID 1188 wrote to memory of 1228 1188 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe"C:\Users\Admin\AppData\Local\Temp\8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a9C8D.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe"C:\Users\Admin\AppData\Local\Temp\8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe"4⤵
- Executes dropped EXE
PID:2816
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD517602b406a36746889155c78f91e856e
SHA14e312f15759f1ea80cb3ab6aa79f3d28afb0535e
SHA2560f9b01e37d84b2fc3e5740225899b3b0a796fc9ce403fd8b9196abb6dc0fbcbb
SHA512127f4bafe1ce0c26480cb2d270f36b1eeb8a124da9873e88c187a72ab2db762cf8ebc2e7459708633f09e7c50588018e1b0145e4e7f7902234cd013901e0736c
-
C:\Users\Admin\AppData\Local\Temp\8782bb84be5f10882124df002668a4e6aabff8245902d05fe5626ba257ffea2d.exe.exe
Filesize684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
27KB
MD5d5e253eeea931f45b5ab08b0b128ee98
SHA1541127fb70fa0b3142456bae86c33c566b38d9a0
SHA256e25545f8dac555abbd4c7c906db9424aa0c708da3a2909b20459145ebe37a32b
SHA5122b078d72406fcca48d4d66e6612eb457923f963ff9caf19a94097927aa56024b3f4867c427b42317e46b416d8265dc497e14bb7cd6203da376ce0dedb4448e2c
-
Filesize
9B
MD54a3bb7dd20666e6acdbbb0a30534552a
SHA19734039e7de3c663de70f65e731dc3426e73940c
SHA25644b303f424240fd96e60c63ce757a0011734fd320fe031942712f1a1a083fd47
SHA5128b20f7e731d617da7c6d7c1fe1b50424ce3edc58cbc7598b662f0db6e0a31dc92e2d1ecd56021fe43e035bd36e4edd9d3cb80f22afc224096cc3974396076f07