Analysis
-
max time kernel
31s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe
-
Size
93KB
-
MD5
da2c3124b37b03be53cf43a96b160660
-
SHA1
1bd706e5010e53d585daaa3c23eb6bcbeb160dfb
-
SHA256
61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758
-
SHA512
ccf2c231d60948f70bddf222aebe02f0bb53c7a0eb515594fff24f124bde0daacc190ad26b970a8a4b4365e2a39732d27e37c45cd299a2e0ffdcbfa107751cb6
-
SSDEEP
1536:2HvaYzMXqtGNttyeiZnZLYm1byapmebn4ddJZeY86iLflLJYEIs67rxo:2HvaY46tGNttyeQLYm1WLK4ddJMY86iL
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 4728 Logo1_.exe 2140 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe 4728 Logo1_.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1824 wrote to memory of 4340 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 83 PID 1824 wrote to memory of 4340 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 83 PID 1824 wrote to memory of 4340 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 83 PID 4340 wrote to memory of 5100 4340 net.exe 85 PID 4340 wrote to memory of 5100 4340 net.exe 85 PID 4340 wrote to memory of 5100 4340 net.exe 85 PID 1824 wrote to memory of 4916 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 89 PID 1824 wrote to memory of 4916 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 89 PID 1824 wrote to memory of 4916 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 89 PID 1824 wrote to memory of 4728 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 91 PID 1824 wrote to memory of 4728 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 91 PID 1824 wrote to memory of 4728 1824 61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe 91 PID 4728 wrote to memory of 4616 4728 Logo1_.exe 92 PID 4728 wrote to memory of 4616 4728 Logo1_.exe 92 PID 4728 wrote to memory of 4616 4728 Logo1_.exe 92 PID 4916 wrote to memory of 2140 4916 cmd.exe 94 PID 4916 wrote to memory of 2140 4916 cmd.exe 94 PID 4616 wrote to memory of 2360 4616 net.exe 95 PID 4616 wrote to memory of 2360 4616 net.exe 95 PID 4616 wrote to memory of 2360 4616 net.exe 95 PID 4728 wrote to memory of 4416 4728 Logo1_.exe 97 PID 4728 wrote to memory of 4416 4728 Logo1_.exe 97 PID 4728 wrote to memory of 4416 4728 Logo1_.exe 97 PID 4416 wrote to memory of 652 4416 net.exe 99 PID 4416 wrote to memory of 652 4416 net.exe 99 PID 4416 wrote to memory of 652 4416 net.exe 99 PID 4728 wrote to memory of 3448 4728 Logo1_.exe 56 PID 4728 wrote to memory of 3448 4728 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe"C:\Users\Admin\AppData\Local\Temp\61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:5100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a80C9.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe"C:\Users\Admin\AppData\Local\Temp\61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe"4⤵
- Executes dropped EXE
PID:2140
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2360
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:652
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5b1f63d61f2190aa72e9e0322e4305965
SHA175e4825775a44a3dab84eff578b832f4fa016c76
SHA25607e7bbd817f89ce1544d483f891e1527d5fa294fab747d3a9dbb94a713769446
SHA5121305924ca2b1b5c28d5965d249620504eb6452ad3989e9a6278644ad43b60cb8076a580a577030ee58f95f749208d142c307a3e21eaff63528a443ce77ab2201
-
C:\Users\Admin\AppData\Local\Temp\61127259cb98eb425a7347c4193d8188e1dbb8d0bf7be272bdbb7d88981f4758.exe.exe
Filesize59KB
MD5dfc18f7068913dde25742b856788d7ca
SHA1cbaa23f782c2ddcd7c9ff024fd0b096952a2b387
SHA256ff4ac75c02247000da084de006c214d3dd3583867bd3533ba788e22734c7a2bf
SHA512d0c7ec1dae41a803325b51c12490c355ed779d297daa35247889950491e52427810132f0829fc7ffa3022f1a106f4e4ba78ed612223395313a6f267e9ab24945
-
Filesize
33KB
MD5bee6df131a9c9bccab2c2e85139f6842
SHA1d7d095b827384b3b5f4e0cf9b8afb543998f1796
SHA2561a8911fd47aa3e98991935402374717b26afeed5d8eb431edcd4625f1a16f962
SHA5122457aa406a3010ce789237d55fa17fc0f5694c847699af8044f21ea935179ffc69056c0c2ba4ba3eee3158c51afb2d11d2c372eca3e1ca77c44545cb74cd4812
-
Filesize
842B
MD56f4adf207ef402d9ef40c6aa52ffd245
SHA14b05b495619c643f02e278dede8f5b1392555a57
SHA256d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47