Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe
Resource
win10v2004-20241007-en
General
-
Target
d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe
-
Size
168KB
-
MD5
56d6894cad03e4beebcb52881b5a00d6
-
SHA1
b23ce0a18492a99214ebeae061f706fd3e62066b
-
SHA256
d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2
-
SHA512
49f64c412a2746f5b7b42a89fa071c6358e698821a377f7bfa0cedb6cff68386ede82afe467392c0535dfd1489561774a7c0c324f3d46539107713e656c1c3d6
-
SSDEEP
3072:pAkuJVLUbFnBS1RkLRXo1ID0NBi+fgKwJP:7uJSbFnBS1R8gq0NBi+fk5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2708 Logo1_.exe 2628 d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe -
Loads dropped DLL 1 IoCs
pid Process 2748 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\or_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lo\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Temp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Slate\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe File created C:\Windows\Logo1_.exe d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2708 Logo1_.exe 2708 Logo1_.exe 2708 Logo1_.exe 2708 Logo1_.exe 2708 Logo1_.exe 2708 Logo1_.exe 2708 Logo1_.exe 2708 Logo1_.exe 2708 Logo1_.exe 2708 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2748 2936 d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe 30 PID 2936 wrote to memory of 2748 2936 d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe 30 PID 2936 wrote to memory of 2748 2936 d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe 30 PID 2936 wrote to memory of 2748 2936 d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe 30 PID 2936 wrote to memory of 2708 2936 d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe 31 PID 2936 wrote to memory of 2708 2936 d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe 31 PID 2936 wrote to memory of 2708 2936 d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe 31 PID 2936 wrote to memory of 2708 2936 d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe 31 PID 2708 wrote to memory of 2728 2708 Logo1_.exe 33 PID 2708 wrote to memory of 2728 2708 Logo1_.exe 33 PID 2708 wrote to memory of 2728 2708 Logo1_.exe 33 PID 2708 wrote to memory of 2728 2708 Logo1_.exe 33 PID 2748 wrote to memory of 2628 2748 cmd.exe 36 PID 2748 wrote to memory of 2628 2748 cmd.exe 36 PID 2748 wrote to memory of 2628 2748 cmd.exe 36 PID 2748 wrote to memory of 2628 2748 cmd.exe 36 PID 2728 wrote to memory of 2704 2728 net.exe 35 PID 2728 wrote to memory of 2704 2728 net.exe 35 PID 2728 wrote to memory of 2704 2728 net.exe 35 PID 2728 wrote to memory of 2704 2728 net.exe 35 PID 2708 wrote to memory of 1232 2708 Logo1_.exe 21 PID 2708 wrote to memory of 1232 2708 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe"C:\Users\Admin\AppData\Local\Temp\d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a784B.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe"C:\Users\Admin\AppData\Local\Temp\d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe"4⤵
- Executes dropped EXE
PID:2628
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5575ff180a27de35ec36af19aa4ed6e66
SHA1b3d71c10d88af12956ceebe984e9523523397a19
SHA2569b1df12519b89778f94ee6cc4e135eac2aeef6466587b09a2e8d90c69e283e2f
SHA5123322cee41c580d79a62031ae77b81c346cfb3577d3b960edaecbdca1a5e862a8c2e0ef60da66d339a8285b204c7917f83d24b1c524df73f510820535b7b3db6f
-
Filesize
474KB
MD5fa2fdaa379bd3cadb1c742596d15cd21
SHA1acde37ebbb6e0b7168ee3ed03c1098ba1ddc3826
SHA25616825fdfe8f416651a17ff2b21867a125f622e4efd7cd3547ecc24542886015d
SHA512f5af57ac6dfc99b9a346563e906ef7817920635619265efa20e428aa9a6ec7914e8bc16458e43915d64107e280d417bca319f66665df74c8cf63bb2d0ea850aa
-
Filesize
722B
MD50a062359b79faef364832303d0e8858b
SHA102590a6650fba9a7af9841c23b35ba49e5baa930
SHA2569dbac8becf8034d073e21f0fcbe52deff0560fdd9cdf7d4777f33d09e5c54e55
SHA512b03d695e564f9036d30365060e305428a445dcb4f08997f9d69b30c68a4c58adafc326be7558e4cdfb8f82a906c7890c788d000809014af96f01ab22f6fee6f4
-
C:\Users\Admin\AppData\Local\Temp\d81027e41501c7e8f97b1f5653b816ffd3b0c0ca2a706c61a0a959c877cb55e2.exe.exe
Filesize138KB
MD5b51fb63223915f23c60adc580c9a0531
SHA1a22bf33ac2769c31c922c45f314b4d6e42ed77db
SHA256b9eace03c8471717e3f98873527005dbd9a92367b954f8c48484d2b7b78efbac
SHA512cd72aac2128c48c34568db1ac7b33e6934f31f473278426ef2acf9cd4df545dea8424bedf79340eb74a966ce39a3a7d9910fcbe456047d83330c62761644194d
-
Filesize
29KB
MD5b597a8fe712fc5bbf5cdfc3c601aaccd
SHA1c9d85f8c12bb53976ffb8054ec04f98aa582c386
SHA25646b3f5e82795e0730bdaacbe6ddb2100ff8cc506dd96b895beceef106dfc18a4
SHA512af3f75224d8217e171f537aab78b0c4bb2b54612d0e5b33fb26c24305d44df7f641c3161bfd439aaeac421c2d4df237e6170a9dd27b86e1dddc517b1213c5298
-
Filesize
10B
MD552a225cec34530c05c340f9ae894aa31
SHA1d6553bc25b5bc40447184e9dd520dd7c88f5c2aa
SHA256bddf98f152ff77575c277b91c8f7aa5f69973cd3bfe7aa55ebe61b7d3df17fab
SHA512726f8a96e3dab9ec548bda81a01dc3e0d93afa2363c76c4bf639de4b0471f8a43a8e32e90b230b95639e82b7daa8da3e8d9c848755e2b58398aa48e46e5ba5b5