Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-09-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe
Resource
win10v2004-20240802-en
General
-
Target
c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe
-
Size
605KB
-
MD5
8a6afc4c2f670cba68b3e3a55ab0d275
-
SHA1
23a75ecaf493725a93a39ce997f9ac5257c9ecb2
-
SHA256
c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133
-
SHA512
d2a821a3f0ef0d78b4bd400e46b014f2a501de56df6b4f74cb55e44b8cd19eb6c5b879d4a0ae3d9f2678c67df2d41387d76b4b7663db0611fb267ce1b8def7ca
-
SSDEEP
6144:hVfjmNXvmOBXyDkJO4i8QUFvpLdJIO6MsubRuQM2NAxvQhKnmyc45tP/iYT:X7+Xvz/JQ0AxvSlM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2444 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 748 Logo1_.exe 2864 c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe -
Loads dropped DLL 1 IoCs
pid Process 2444 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Outlook.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\PROOF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\{26793F86-7A02-4BBD-B5DA-4AA3D83AA174}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe File created C:\Windows\Logo1_.exe c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 748 Logo1_.exe 748 Logo1_.exe 748 Logo1_.exe 748 Logo1_.exe 748 Logo1_.exe 748 Logo1_.exe 748 Logo1_.exe 748 Logo1_.exe 748 Logo1_.exe 748 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2444 1980 c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe 31 PID 1980 wrote to memory of 2444 1980 c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe 31 PID 1980 wrote to memory of 2444 1980 c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe 31 PID 1980 wrote to memory of 2444 1980 c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe 31 PID 1980 wrote to memory of 748 1980 c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe 32 PID 1980 wrote to memory of 748 1980 c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe 32 PID 1980 wrote to memory of 748 1980 c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe 32 PID 1980 wrote to memory of 748 1980 c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe 32 PID 748 wrote to memory of 2396 748 Logo1_.exe 34 PID 748 wrote to memory of 2396 748 Logo1_.exe 34 PID 748 wrote to memory of 2396 748 Logo1_.exe 34 PID 748 wrote to memory of 2396 748 Logo1_.exe 34 PID 2444 wrote to memory of 2864 2444 cmd.exe 36 PID 2444 wrote to memory of 2864 2444 cmd.exe 36 PID 2444 wrote to memory of 2864 2444 cmd.exe 36 PID 2444 wrote to memory of 2864 2444 cmd.exe 36 PID 2396 wrote to memory of 2704 2396 net.exe 37 PID 2396 wrote to memory of 2704 2396 net.exe 37 PID 2396 wrote to memory of 2704 2396 net.exe 37 PID 2396 wrote to memory of 2704 2396 net.exe 37 PID 748 wrote to memory of 1192 748 Logo1_.exe 21 PID 748 wrote to memory of 1192 748 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe"C:\Users\Admin\AppData\Local\Temp\c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDAB5.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe"C:\Users\Admin\AppData\Local\Temp\c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe"4⤵
- Executes dropped EXE
PID:2864
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD57ac11ecf9c463c889ce87df3d311fe3e
SHA1ce270b7acdfcf8387317d6835a6f712031a3b398
SHA256c19d6ef0e6b2d0a8776a84fb2f915dac93cc6cca47dfd68918c04726b4cc71eb
SHA512eb3baf3668cc23255a5af23edb78206f1213e5f24adb5093825a6e56dbbd6ef715d3ec6bfc639104ffe3c17f681d6e1a70704c37adcb0482096e7bb887bb5e85
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD50a044889078623a162ac9387a4758d43
SHA1527ce8f6705e1b9a3072285a04f7ccf659b8d25f
SHA25642d4171d7cd43ce5608b9e8c7e60990efa0f26cb1b44aa704b91b4c58a4787ad
SHA512381db41970e709d7e45c9d8a86cd2864be68f6ef720491c5bfec2e4eedab3fbe1f1d93e63e2a7a71dc735eaaeb37a228ddba7ae324dc69034aa21c570af1bc08
-
C:\Users\Admin\AppData\Local\Temp\c533f642d6100018650ac1ca68e3e9065e7a7d79d4689ace3684e6f98bbee133.exe.exe
Filesize579KB
MD5843cbb96157de047fd569a165d023d6c
SHA158701573dbd6e4317cf611fce392fcf996f25b1a
SHA256b3e3b58624289a27badf5db41781df1ef31fcb4c5a9556767f89360fbe5d6497
SHA512ee12344f9a237f945ffdc395b603ea83db2d1b0996775082b5bf6ffcac63f05772f84689597c5dbbaaadf1461dbb2a7bf3af232f969477ec617f8b02e8bc272e
-
Filesize
26KB
MD55a470351f22a7cc5e39cfe4bd86ca83e
SHA17ccd3612c28971f59a69b7c656628c6275a95274
SHA256fcca4abc09acb79b2616c2e3d131bf68e35a33c30f8cb5263eb5f3e83bdf2c3f
SHA512fe83aa3d8ecc99cb3fe5580414ce36f3f7e56b57689062df05ed16c8bc943a795588e7ceb9b4f9274f8d6a51cb54b896bf137470844d9e1442c814f021eea2e7
-
Filesize
8B
MD51c0fbf3204f05014248f47b58290aa63
SHA1233eb8afaf33fab1e8e7c12d4a28e9ecdce776af
SHA2565dad5b90d650fe88de482f53849dbbc0b9edc4e10d667217f21197ff4f9a3a7d
SHA5123427d4cdaede981196902eb08658304ace7b034e2043ed0bcc5daa285e3dafab17a1256f5c148af9e048ef9469ff4b930643c09263f2bf9a8adb6a15b26c2808