Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe
Resource
win10v2004-20240802-en
General
-
Target
32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe
-
Size
35KB
-
MD5
02cfb4130187dec11bd92eff544d2ac1
-
SHA1
e22a42564e6a8e93d8e54dc25f47f05616b8efe6
-
SHA256
32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086
-
SHA512
3599b027f199369857944b33fc1d179874c5b58b539cafb1139d90647f373c4348e7476a2062bdc83c6a9986e11306bae6deb6b2e52b8dc774618f3e79049e80
-
SSDEEP
768:V16GVRu1yK9fMFLKaTxsujCT7pZpY04O30pG2a:T3SHmLKarIpY04G9B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2664 Logo1_.exe 2708 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe -
Loads dropped DLL 1 IoCs
pid Process 2692 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{1A1CC958-2235-4531-8015-5AFE1D6CBF7D}\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe Logo1_.exe File created C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\3082\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\ja-JP\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2664 Logo1_.exe 2664 Logo1_.exe 2664 Logo1_.exe 2664 Logo1_.exe 2664 Logo1_.exe 2664 Logo1_.exe 2664 Logo1_.exe 2664 Logo1_.exe 2664 Logo1_.exe 2664 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2692 2276 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 30 PID 2276 wrote to memory of 2692 2276 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 30 PID 2276 wrote to memory of 2692 2276 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 30 PID 2276 wrote to memory of 2692 2276 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 30 PID 2276 wrote to memory of 2664 2276 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 31 PID 2276 wrote to memory of 2664 2276 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 31 PID 2276 wrote to memory of 2664 2276 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 31 PID 2276 wrote to memory of 2664 2276 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 31 PID 2664 wrote to memory of 2076 2664 Logo1_.exe 33 PID 2664 wrote to memory of 2076 2664 Logo1_.exe 33 PID 2664 wrote to memory of 2076 2664 Logo1_.exe 33 PID 2664 wrote to memory of 2076 2664 Logo1_.exe 33 PID 2692 wrote to memory of 2708 2692 cmd.exe 35 PID 2692 wrote to memory of 2708 2692 cmd.exe 35 PID 2692 wrote to memory of 2708 2692 cmd.exe 35 PID 2692 wrote to memory of 2708 2692 cmd.exe 35 PID 2076 wrote to memory of 2776 2076 net.exe 36 PID 2076 wrote to memory of 2776 2076 net.exe 36 PID 2076 wrote to memory of 2776 2076 net.exe 36 PID 2076 wrote to memory of 2776 2076 net.exe 36 PID 2664 wrote to memory of 1196 2664 Logo1_.exe 21 PID 2664 wrote to memory of 1196 2664 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe"C:\Users\Admin\AppData\Local\Temp\32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aF2C8.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe"C:\Users\Admin\AppData\Local\Temp\32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe"4⤵
- Executes dropped EXE
PID:2708
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5f5826cfacc154e7aa6fb97de70a4912e
SHA1cde823973e10dc87d7c1a5f3e7d4faba93822b54
SHA256f39116637559db2465b3cffccac76003c004398460f60301a77d5e5df5d2ec57
SHA5120e13ef0f841062bebf1f12f293ad38eabce246d98ee391adbd8a33dd69ce61a1c13709cb95edd9e39171943c79c8f7bb0357e6c3101b65bb62306825917a7bae
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD5b10f2c2bc884dfe35c0fe4e36056a2e3
SHA15d6b90b35c86fc85fe5c3b1883d5dafcea7b7347
SHA256f1fa3d83319c246c330fc335670b5903cea085c83f7275792490f13800b091bc
SHA512821eb22ea06b04d4e488b93fb401fad1f7854d50d8923a359f9838d564f29b3dcf55ea68febb6b6ed937b52e4e855ec89ce0a295e2274ba4eb50bd65670382de
-
C:\Users\Admin\AppData\Local\Temp\32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe.exe
Filesize8KB
MD55243ae7347809960a907a4494807de00
SHA1b40e0a218cf9982a3f546fa004e60e428d1bd7fc
SHA256ed9c09c62b604d67c46027c4a3fb868a8d89a30ba299a35c47f0ffed690c36c9
SHA512758b40e36b3037d40c1f4ec3426fc14c2b622af864f59a077309041171709f9d2c2ba25241eeeca1e0d6d767a328ab91e00c8bd114ae4fd4e599a9874ec5b60c
-
Filesize
27KB
MD5c1e93a00c76fe9038279108132881b11
SHA1db99e99d49c3ceec5aa5181573456c486696dd2a
SHA2567c29108cb820ca23779c64a8e419596bf53578df1329e8c4abde530daf8b0d5a
SHA51277c0e401c1a1782ee96c7f7f58748f898e8e7819952c81b04087c0dbc765b7e0b9591b8e17589a17ace293719a935525d79f376db53c9a82c3fc3f16dbc893b5
-
Filesize
9B
MD55412111268dd2c1fb1cf8697bfab9b6c
SHA116d0b289e83c74cb50a004edd7c5750ac706f321
SHA256f3aa35be7048ddbf11fc581e5f9476745d75bcf097e121ba2915614e360a0cdc
SHA51213fc5bf11faaf5471fde8a1bafdcc6d27521bad796e5e532c94d9c8232dd70088e70b6d5ac60c4c15d13e59926ac38e9a9e01b4dd4694a77d70bdd1ae7005ccf