Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe
Resource
win10v2004-20241007-en
General
-
Target
ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe
-
Size
52KB
-
MD5
881dd0fc2ef489a84a7aa3fdff69dcb4
-
SHA1
f8fadbb90370903714cfe1a2673f60c48fdb951a
-
SHA256
ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa
-
SHA512
ebdddca2bbc649f8cdfcb69abd2ba4566d3904dcc6fdefb1bd461c26873c0bf9f94a25fa5023a52101ed9ab7dbba7390b03c6ff069f71ffb668dcf1082842b90
-
SSDEEP
768:49Mn16GVRu1yK9fMnJG2V9dLEqgt6jpYU5ltbDrYiI0oPxWExI:49M13SHuJV9k6jWWvr78Pxc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1244 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1740 Logo1_.exe 2756 ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe -
Loads dropped DLL 5 IoCs
pid Process 1244 cmd.exe 2972 WerFault.exe 2972 WerFault.exe 2972 WerFault.exe 2972 WerFault.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\InfoPathOMFormServicesV12\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Slate\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe File created C:\Windows\Logo1_.exe ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1244 2276 ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe 31 PID 2276 wrote to memory of 1244 2276 ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe 31 PID 2276 wrote to memory of 1244 2276 ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe 31 PID 2276 wrote to memory of 1244 2276 ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe 31 PID 2276 wrote to memory of 1740 2276 ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe 32 PID 2276 wrote to memory of 1740 2276 ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe 32 PID 2276 wrote to memory of 1740 2276 ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe 32 PID 2276 wrote to memory of 1740 2276 ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe 32 PID 1740 wrote to memory of 2228 1740 Logo1_.exe 34 PID 1740 wrote to memory of 2228 1740 Logo1_.exe 34 PID 1740 wrote to memory of 2228 1740 Logo1_.exe 34 PID 1740 wrote to memory of 2228 1740 Logo1_.exe 34 PID 2228 wrote to memory of 2688 2228 net.exe 36 PID 2228 wrote to memory of 2688 2228 net.exe 36 PID 2228 wrote to memory of 2688 2228 net.exe 36 PID 2228 wrote to memory of 2688 2228 net.exe 36 PID 1244 wrote to memory of 2756 1244 cmd.exe 37 PID 1244 wrote to memory of 2756 1244 cmd.exe 37 PID 1244 wrote to memory of 2756 1244 cmd.exe 37 PID 1244 wrote to memory of 2756 1244 cmd.exe 37 PID 2756 wrote to memory of 2972 2756 ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe 38 PID 2756 wrote to memory of 2972 2756 ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe 38 PID 2756 wrote to memory of 2972 2756 ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe 38 PID 1740 wrote to memory of 1184 1740 Logo1_.exe 21 PID 1740 wrote to memory of 1184 1740 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe"C:\Users\Admin\AppData\Local\Temp\ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDC0D.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe"C:\Users\Admin\AppData\Local\Temp\ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2756 -s 1245⤵
- Loads dropped DLL
PID:2972
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD59ae223947a503e976e1edc7875d53c72
SHA1fb15a478dfd690204c2584a9c2a1bc264995cfac
SHA256f597c0c63f5e46aafe0f0268ca163aeb7b0b6695d73042397e45f2063d64f23e
SHA512cd94c5e526d86fa376c95500c2886d487a057cdc071c3bdb99a43b0ff2637829b813b7826e09d9cc05ce7ead2dc42102a809ab644e3dc61230eeae151455a8c8
-
Filesize
474KB
MD5534b3a473ca3d525541b1289b316404f
SHA1c1e408bf066852bc1ebdbb3a9e835932e3e7bb72
SHA256f9719cc66a7a6dc9ff57786e474a1868b6696b4468dfc0f915533acea44291ca
SHA51299b77d6860209d482448490a6afde3d3144c8ca1a838d97de66c758f9ebab8b21a51f3257cd7b191cb4f254ba2f04ae69a8b5f29a9c95d768d400fb5e8f1e330
-
Filesize
722B
MD56fc9bb8dd0ce3f6bc2274a0d117717c3
SHA10bf5f002db4098cd953cb92bc60753611ccded7e
SHA256650ac7d4c4bdee8095e948dc013d767bcc899bacba28f2562096a72aa4cf12a7
SHA51236e9581f7fdc1b4e5064fd80827f2ad063fd6b050d809200ea1142bad5d4e2a74209015a1bd29079c094087575fd7b1abd3d23765553f1bd54ffe84ada670e59
-
C:\Users\Admin\AppData\Local\Temp\ccb5598576316f752c7d3155de78871f5e88eaa70fbf2ad689f83957d36f6aaa.exe
Filesize23KB
MD53f9dbfee668294872ef01b90740b01d0
SHA199a4702b65485cd14736b1c2cdfb81b455dda01c
SHA25640b32fea1fcadcb2db369475e2bba58b0b83f5c3bb647e2e63877726c35a9f86
SHA5120113cec160d97ea0cce70860cc5b79b502d16191ee237a3abb84309499be193aa0127dbcb41fc05a90fa61484b061ec4332ad29a918db598e32fe832b74bd1e3
-
Filesize
29KB
MD54c513a4884d5671553b53e59a8c5149a
SHA157afa0c2f1936a9adc9ddcb007499472a8a37d6d
SHA2560413d2f733470a6ae51171bd9de1abe1034020f8951e2c9c10156188471f3df3
SHA5122ac965599f0d154c1af515bd102436247fb8a83f0b34d0d01cde2d2063802d07258b0cc022e04f62eb06e5c983ff0ee2df4e727a0214f930ecc9b9e7be4a7924
-
Filesize
10B
MD51603436fb34d76c51d66ab1816519131
SHA13d5dc4ccfe3cc992c253dccfccf66ea727f66bf6
SHA2569072a674ab684ff3ef851bf4f0fdc4118d2bcbe765282f38f3f6de4360057d60
SHA51230d89b59822313e4b281b8f63b959f36262b2b948cf38e6389e9a1a7517c7c239349a41de9e35c8cd27d6b852ab5349206c2fb85b631dc59fab5421d997dbd46