Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe
Resource
win10v2004-20241007-en
General
-
Target
bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe
-
Size
959KB
-
MD5
5358b95179aeda8763370ed2e94ebf4d
-
SHA1
fb2917d7fa2fdf40150669df7579921901f57eb6
-
SHA256
bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7
-
SHA512
6b8a4ce3fb70fd8ad559cc2cb88462c0a155d85d54b251c3a46fcfbd2d455579bce7bf211cf1ac93fbe667aa55fb7f97b368ab11377384d53f9906b6a000ba28
-
SSDEEP
12288:kRKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:JBpDRmi78gkPXlyo0G/jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2384 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2540 Logo1_.exe 2872 bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe -
Loads dropped DLL 2 IoCs
pid Process 2384 cmd.exe 2384 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{49D76B3D-D6A1-4419-AFD0-EDBEA65C21F0}\chrome_installer.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENFR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe File created C:\Windows\Logo1_.exe bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2872 bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2872 bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe Token: 35 2872 bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2384 2508 bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe 30 PID 2508 wrote to memory of 2384 2508 bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe 30 PID 2508 wrote to memory of 2384 2508 bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe 30 PID 2508 wrote to memory of 2384 2508 bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe 30 PID 2508 wrote to memory of 2540 2508 bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe 31 PID 2508 wrote to memory of 2540 2508 bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe 31 PID 2508 wrote to memory of 2540 2508 bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe 31 PID 2508 wrote to memory of 2540 2508 bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe 31 PID 2540 wrote to memory of 2264 2540 Logo1_.exe 33 PID 2540 wrote to memory of 2264 2540 Logo1_.exe 33 PID 2540 wrote to memory of 2264 2540 Logo1_.exe 33 PID 2540 wrote to memory of 2264 2540 Logo1_.exe 33 PID 2264 wrote to memory of 2728 2264 net.exe 35 PID 2264 wrote to memory of 2728 2264 net.exe 35 PID 2264 wrote to memory of 2728 2264 net.exe 35 PID 2264 wrote to memory of 2728 2264 net.exe 35 PID 2384 wrote to memory of 2872 2384 cmd.exe 36 PID 2384 wrote to memory of 2872 2384 cmd.exe 36 PID 2384 wrote to memory of 2872 2384 cmd.exe 36 PID 2384 wrote to memory of 2872 2384 cmd.exe 36 PID 2540 wrote to memory of 1180 2540 Logo1_.exe 21 PID 2540 wrote to memory of 1180 2540 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe"C:\Users\Admin\AppData\Local\Temp\bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a85F2.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe"C:\Users\Admin\AppData\Local\Temp\bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD59ae223947a503e976e1edc7875d53c72
SHA1fb15a478dfd690204c2584a9c2a1bc264995cfac
SHA256f597c0c63f5e46aafe0f0268ca163aeb7b0b6695d73042397e45f2063d64f23e
SHA512cd94c5e526d86fa376c95500c2886d487a057cdc071c3bdb99a43b0ff2637829b813b7826e09d9cc05ce7ead2dc42102a809ab644e3dc61230eeae151455a8c8
-
Filesize
474KB
MD5534b3a473ca3d525541b1289b316404f
SHA1c1e408bf066852bc1ebdbb3a9e835932e3e7bb72
SHA256f9719cc66a7a6dc9ff57786e474a1868b6696b4468dfc0f915533acea44291ca
SHA51299b77d6860209d482448490a6afde3d3144c8ca1a838d97de66c758f9ebab8b21a51f3257cd7b191cb4f254ba2f04ae69a8b5f29a9c95d768d400fb5e8f1e330
-
Filesize
722B
MD516e0b7fed9647279ef8a4855ffb97139
SHA146070319dcfe4ea0dd63acefa4c33a26754a2a75
SHA2560a051f5a7eae76b5b59ac2f2ead2434de7b69b23919324ca4399f9e5c25b13f1
SHA5120e42a3ebd6f50346fdd8d80366987ac48c30bff223e59694464034f6e9a4fbf41cc143e5d640e15c840b141aa0da4181b0ed91e94401754b4ce1171e186dfe9e
-
C:\Users\Admin\AppData\Local\Temp\bbe80cbc26afe601c9872ec8b73abd419d584d846931b22cc39b28bec87e24a7.exe.exe
Filesize930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
29KB
MD54c513a4884d5671553b53e59a8c5149a
SHA157afa0c2f1936a9adc9ddcb007499472a8a37d6d
SHA2560413d2f733470a6ae51171bd9de1abe1034020f8951e2c9c10156188471f3df3
SHA5122ac965599f0d154c1af515bd102436247fb8a83f0b34d0d01cde2d2063802d07258b0cc022e04f62eb06e5c983ff0ee2df4e727a0214f930ecc9b9e7be4a7924
-
Filesize
10B
MD51603436fb34d76c51d66ab1816519131
SHA13d5dc4ccfe3cc992c253dccfccf66ea727f66bf6
SHA2569072a674ab684ff3ef851bf4f0fdc4118d2bcbe765282f38f3f6de4360057d60
SHA51230d89b59822313e4b281b8f63b959f36262b2b948cf38e6389e9a1a7517c7c239349a41de9e35c8cd27d6b852ab5349206c2fb85b631dc59fab5421d997dbd46