Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe
Resource
win10v2004-20241007-en
General
-
Target
90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe
-
Size
98KB
-
MD5
68eef72f6e7db681bd6ecde8e66284df
-
SHA1
f53438226cee27773bfdd953a6c615c7abf34401
-
SHA256
90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a
-
SHA512
75e7742724c1d650b3300e12e0763bff527e7d8bc721bb755cb77cae9d2b2695f865503adf6e47d3f8c6c3052137c875cd5b7e12ba393b49f4fd6eb6ef190a88
-
SSDEEP
3072:pjkuJVLlBJu2A88ElzYyNhZk1EJZf++pufg5s:GuJlzYw5Kq5s
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2428 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2424 Logo1_.exe 1940 90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe -
Loads dropped DLL 2 IoCs
pid Process 2428 cmd.exe 2428 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1041\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE Logo1_.exe File created C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1036\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Portal\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe File created C:\Windows\Logo1_.exe 90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2428 1656 90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe 28 PID 1656 wrote to memory of 2428 1656 90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe 28 PID 1656 wrote to memory of 2428 1656 90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe 28 PID 1656 wrote to memory of 2428 1656 90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe 28 PID 1656 wrote to memory of 2424 1656 90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe 29 PID 1656 wrote to memory of 2424 1656 90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe 29 PID 1656 wrote to memory of 2424 1656 90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe 29 PID 1656 wrote to memory of 2424 1656 90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe 29 PID 2424 wrote to memory of 2220 2424 Logo1_.exe 30 PID 2424 wrote to memory of 2220 2424 Logo1_.exe 30 PID 2424 wrote to memory of 2220 2424 Logo1_.exe 30 PID 2424 wrote to memory of 2220 2424 Logo1_.exe 30 PID 2220 wrote to memory of 1544 2220 net.exe 33 PID 2220 wrote to memory of 1544 2220 net.exe 33 PID 2220 wrote to memory of 1544 2220 net.exe 33 PID 2220 wrote to memory of 1544 2220 net.exe 33 PID 2428 wrote to memory of 1940 2428 cmd.exe 34 PID 2428 wrote to memory of 1940 2428 cmd.exe 34 PID 2428 wrote to memory of 1940 2428 cmd.exe 34 PID 2428 wrote to memory of 1940 2428 cmd.exe 34 PID 2424 wrote to memory of 1192 2424 Logo1_.exe 21 PID 2424 wrote to memory of 1192 2424 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe"C:\Users\Admin\AppData\Local\Temp\90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a955D.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe"C:\Users\Admin\AppData\Local\Temp\90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe"4⤵
- Executes dropped EXE
PID:1940
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:1544
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD578843da8f30797c7e99e58214267f874
SHA19e4845871e797277ec74fd3334a872065e436556
SHA25696e050efc3859f010c2a482d8a7fd0c07c22570ae0b91b37c9efdf5198134e61
SHA51232eb69334be5db065e335ceff9f4fd2e116d1b8604dea26c922d1893563a872e3af4434f675927a1643dccf872eb435b54ac3f27ff79c65c3efece6354306c3a
-
Filesize
474KB
MD52faaad87f08521fcc8daee0d433d478b
SHA1a75b87049a6c122b921f66cddeabb12502857a2f
SHA25670546de82df8bdbcd9022e1bd74a8f50d61dd19532aeaa32a69582acda025b25
SHA5121dff24a69a25f323075c8553c643c1b5bbe83a5c6d975467dabd6027ff48d0c9d0cd06ecdbf6b6a5f97a060e0353eb31898d66a9e1adcc5497e05bac06566f27
-
Filesize
722B
MD5c96c6649c5f9fe38fd2d7f19bec7b1a2
SHA196433e05569b463ea6271d28946ef325fc66ebdd
SHA25626a85f9b57e7735b883d46d08084cb0c8039054951bb4842e9ca52bf4dae6400
SHA512a0a17e35f746c29f77d0df991a5283444df5c5dea20f8e541636ab139bf117886988dea840e43f3257e9a0948361ff61025cf00463c502b00de0b48c67a843a6
-
C:\Users\Admin\AppData\Local\Temp\90647d1e5bc5abef414d1b4ae8ef3cc4855a1456202229b621cc554bd8b7b02a.exe.exe
Filesize68KB
MD50cafef40fa8905f2001dd019140d6440
SHA13ef1a11c803c0b0e1d4c9ee1f049a98ca538524a
SHA2567b9fcf4d30c5dd337bb7b46b077e400bea0caae56d69899b1441ac6cac6155f3
SHA51206486241c46be7e0f83716cb944d2281d8e0856bf818aaa5e98cc3a04917e20dc247b03076d5a2f51d3d102d0aac3611860b77483ef1cecede99401395e59f05
-
Filesize
29KB
MD57a40ca98824decf9cd5833327cc00541
SHA12d499bbdb969dfd75795a24250d530bb70220106
SHA2562177d280001b67dbf89342b11a421028050b90e50b7cee96186d258c66a62115
SHA512bf9fc1fad0ffddc4561378cfcf777ddba9e736a796db590d3c7578800041afc08ab18c0698fd9816df8411b5b3c02bd914e6afcb37aeaf01f466acafcefe03d4
-
Filesize
10B
MD5688d58fa5756a393f9472937ef284c25
SHA118ee07a5ee8de4fbd046763cd4a55ef2e6c3f808
SHA256e21f27bdf2d90c77d75658b5217d5af4519a6c1bfc326a109eb4a085a2b83302
SHA512c84930eb323c71ffc1edac543a2f60e366de40b39a88b18dba09c1272fae0b12262f4fae496bc9546598507fc37729d829f93b101bbec4739a05be33e0010a3f