Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe
Resource
win10v2004-20240802-en
General
-
Target
1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe
-
Size
227KB
-
MD5
410cf00310cdfcabb7cd2dbf1914bb56
-
SHA1
23ab165c3c02c793518d8f06661b0d225db0d4c4
-
SHA256
1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb
-
SHA512
00f2a4a3582f8ff2311973971b22bec33190f183ad168c05ddad4f6434fb31ca91124eaf1c56ef78fa8ac35bc6dca2e4364c4664d850b81c28aba4f60baacc0b
-
SSDEEP
3072:pdkuJVLUdeKzC/lzMPySe8DnpeIPipoHbKvXWXz9LRnsaJUS+6wPXD3fxNW7gq5n:UuJWdeKzC/leySe8AIqpoHbnDns1ND9m
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2940 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2568 Logo1_.exe 2728 1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe -
Loads dropped DLL 1 IoCs
pid Process 2940 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PowerPoint.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Argentina\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\extensions\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Outlook.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kab\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tt\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe File created C:\Windows\Logo1_.exe 1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2940 2364 1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe 30 PID 2364 wrote to memory of 2940 2364 1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe 30 PID 2364 wrote to memory of 2940 2364 1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe 30 PID 2364 wrote to memory of 2940 2364 1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe 30 PID 2364 wrote to memory of 2568 2364 1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe 31 PID 2364 wrote to memory of 2568 2364 1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe 31 PID 2364 wrote to memory of 2568 2364 1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe 31 PID 2364 wrote to memory of 2568 2364 1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe 31 PID 2568 wrote to memory of 2160 2568 Logo1_.exe 32 PID 2568 wrote to memory of 2160 2568 Logo1_.exe 32 PID 2568 wrote to memory of 2160 2568 Logo1_.exe 32 PID 2568 wrote to memory of 2160 2568 Logo1_.exe 32 PID 2160 wrote to memory of 2488 2160 net.exe 35 PID 2160 wrote to memory of 2488 2160 net.exe 35 PID 2160 wrote to memory of 2488 2160 net.exe 35 PID 2160 wrote to memory of 2488 2160 net.exe 35 PID 2940 wrote to memory of 2728 2940 cmd.exe 36 PID 2940 wrote to memory of 2728 2940 cmd.exe 36 PID 2940 wrote to memory of 2728 2940 cmd.exe 36 PID 2940 wrote to memory of 2728 2940 cmd.exe 36 PID 2568 wrote to memory of 1192 2568 Logo1_.exe 21 PID 2568 wrote to memory of 1192 2568 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe"C:\Users\Admin\AppData\Local\Temp\1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aA728.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe"C:\Users\Admin\AppData\Local\Temp\1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe"4⤵
- Executes dropped EXE
PID:2728
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2488
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
474KB
MD5e00bb37f2870de4ab176bfec72cf7d6c
SHA1921f2f71ea208b9ccfd5d9cf6cf0620379a34245
SHA256fc9817a352ebbf8890eb2849fd80a0af54ca93b38965f512d7caf691b41a622c
SHA512946d88acf60b8da3c6cbd2af7137b66086d8849b1b36963f3d86b5eaee65667f64b9acf01482380e1d4805a9f42f14541bde97278d03fee9b86a1fa0bee3bfd2
-
Filesize
722B
MD50cca7e408cc74cfbfb2fda33f3a989a1
SHA15013bef2654b9ed19991ea4438ccf0b9556be8b9
SHA256a8b5b444e0a30fdf6bd31f72fb999eb858c8881d4c2d747043c952d1f818fa6a
SHA5129cd7780a50caf6ba457cba97bd23f83b49a69df38f4cbe2f3ec6ae979f1db34bd6b787329f4c1f8ed3c34e57a75b18dc7e2dd121ae5dfaf6de95f76d194fccf3
-
C:\Users\Admin\AppData\Local\Temp\1aa7b0b0a8c4155233d7800cb914c43e86db08fedc570f16865c8eb37c8316cb.exe.exe
Filesize198KB
MD5e133c2d85cff4edd7fe8e8f0f8be6cdb
SHA1b8269209ebb6fe44bc50dab35f97b0ae244701b4
SHA2566c5e7d9c81a409e67c143cd3aed33bddc3967fa4c9ab3b98560b7d3bf57d093d
SHA512701b7d1c7e154519d77043f7de09d60c1ff76c95f820fc1c9afca19724efb0847d646686053354156fd4e8a9dab1f29a79d3223f939a3ff1b3613770dc8603b1
-
Filesize
29KB
MD5fd12aea21ff2c350162bcd3d2a9699d8
SHA16164f1eb5148cdec25615a4f01dcba4cdd0061dd
SHA256741e4e569a8c103af61c5fac46266974ae6b49c6ed2a20923cf21d4ae675653f
SHA512d803227aaac9756c2b47ae326eed208a5c4afb8f4791d447fa566b05cd066f2802d985af64e4ece5cb18198fd3fe3ac3504faf0f2bd41eee97a202ab1bb5a09d
-
Filesize
9B
MD5cd0bf5c2efb8cc7ddbff2ab5d2cb7e87
SHA16830a1817f2055b6beba9063b87af16bbef7fa19
SHA256d00701a279110fcafdaa6a9dcb36385845f9d2aac5b1ac1c52c015c61718dcbd
SHA5126fabfd6bced63153d3dd6b376a92e824c95b15ef046607b89376a17c7ac863e92c95770ed86d8ecec3639d280dd6256a7ab1ec2d8119799fb3a479fbce96254a