Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 22:15
Static task
static1
Behavioral task
behavioral1
Sample
27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe
Resource
win10v2004-20240802-en
General
-
Target
27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe
-
Size
136KB
-
MD5
24f1a3665d2e8debfa8b6ba55561df48
-
SHA1
5577d5985b111d3e3fdf077c6e45527dbf9c305a
-
SHA256
27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f
-
SHA512
082d56545f37720e57adb776b5a6ad9b76071f18edfece387a6fdf29d7f0cc2cad05fdcd0eb78c609331b8b2e99675c6e654d6047943c46602f7f53d98c8410d
-
SSDEEP
3072:oftffjmNUEcXdw/M+0vkLOj0udo5rzahM9:4VfjmN+6JOYuy5Hac
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2480 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2328 Logo1_.exe 2832 27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe -
Loads dropped DLL 1 IoCs
pid Process 2480 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe Logo1_.exe File opened for modification C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1042\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe File created C:\Windows\Logo1_.exe 27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 828 wrote to memory of 2480 828 27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe 31 PID 828 wrote to memory of 2480 828 27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe 31 PID 828 wrote to memory of 2480 828 27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe 31 PID 828 wrote to memory of 2480 828 27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe 31 PID 828 wrote to memory of 2328 828 27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe 32 PID 828 wrote to memory of 2328 828 27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe 32 PID 828 wrote to memory of 2328 828 27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe 32 PID 828 wrote to memory of 2328 828 27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe 32 PID 2328 wrote to memory of 2424 2328 Logo1_.exe 33 PID 2328 wrote to memory of 2424 2328 Logo1_.exe 33 PID 2328 wrote to memory of 2424 2328 Logo1_.exe 33 PID 2328 wrote to memory of 2424 2328 Logo1_.exe 33 PID 2424 wrote to memory of 2860 2424 net.exe 36 PID 2424 wrote to memory of 2860 2424 net.exe 36 PID 2424 wrote to memory of 2860 2424 net.exe 36 PID 2424 wrote to memory of 2860 2424 net.exe 36 PID 2328 wrote to memory of 1248 2328 Logo1_.exe 21 PID 2328 wrote to memory of 1248 2328 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe"C:\Users\Admin\AppData\Local\Temp\27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD143.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe"C:\Users\Admin\AppData\Local\Temp\27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe"4⤵
- Executes dropped EXE
PID:2832
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5e741eec1cc1c39e347cc923ad822c6ce
SHA111e83bc362aac4daf0f21aba1d70998cc9c796f6
SHA256ec59a4af66da09be379f8516fd48c96023588f34e3012ef939e67eebfd480fbf
SHA512e2d4dd97ba1604d1b006892117b28c4708a5692df88a3d82f311c76a39d3c48b30e6ec3a80993aa2108b9b7cff0f7daadb9c22bfb623a0cff14e11da4093bf0a
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5c794e800a38cad45a0d17acfac4004fb
SHA12ba9e6a0f01415bfcfe66fcbf8011ffd1ddf1a46
SHA256a35b4f62a4bd070de75fc066761d4eb7df7759bf5b6184ef1fb3d064302a47da
SHA51241a82cfa7299fd7b36db9b180c9588344d8f663ba156a16bc37a4ac7db111a6f9529025cc36d7cfcc7930cab3bff27c0cfa5328da6eab418cef2c27f42995b4b
-
C:\Users\Admin\AppData\Local\Temp\27ae3ea4dd4fdff2b447298edbef6033104126c46cd7f8c163659ea12913322f.exe.exe
Filesize110KB
MD5269f0a767c1d8ac7480795a94e0e2b79
SHA1041006a33fff863a72f46b6637abbf05f81bbac1
SHA25617772f59c1f0a0b5c6131c64e68efed8eaf99cba9c2b8b39133ae5481bb90395
SHA512546554125e278c6c1ba931811526bfeac286d6bc2374b56b31140f82f47c309a5bfb938f747693334712b3f241ed98e79184a103440e78ef89efff7efac8df31
-
Filesize
26KB
MD5805eb0ed66c18e1531e50f439bd22fe6
SHA1c950b6aa47401447d6e25784e84ffbf33c649a22
SHA256c29a834c4a3081af2865ccdd21dc8255ce461cbc601ea9a30cddf6a6e18df4e2
SHA512d06e428f19253a44ccc30692afa7237aea6c6b800bd959321084520de29837fb17b775349c69c224925c2b462adad4214ee59a05bc9cc09dde9de7689b9efb93
-
Filesize
9B
MD5475984718232cf008bb73666d834f1f4
SHA112f23c9301c222f599a279e02a811d274d0f4abc
SHA256a5b32591119f87eb3c8a00c0c39e26ea6d6414aa9887d85fcb4903e1c14921b5
SHA51280235dc2560b7991d79f9550cdeca6ac02c00cee6bf186f8f20d4ff3fbd7718be937b73ab768d71c4027e153557b08bbfd95ea88d2e0857a7c70cf1da6fa9937