Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 16:10
Static task
static1
Behavioral task
behavioral1
Sample
10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe
Resource
win7-20240903-en
General
-
Target
10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe
-
Size
163KB
-
MD5
83ab2ec3e3456bc3cc19457a7534576d
-
SHA1
3382b548d439bc16a4fd54aa49817109d13b8161
-
SHA256
10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2
-
SHA512
e603c8a683cbd1e259754c171c4066f3fe9aacd5d11636964041e38a25bdf8d6bdef4868f4c870a83214616770e89e1bd9c5ad1b3a3c830ee448610d0025b513
-
SSDEEP
3072:VftffhJCuU9Cw7vFoF3M9Z8oU8HyNftffhJCuUZROzoTq0+RO7IwnY:VVfhguMCysgZNSdVfhguikdNwB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2360 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2364 Logo1_.exe 2808 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe -
Loads dropped DLL 6 IoCs
pid Process 2360 cmd.exe 2360 cmd.exe 2964 WerFault.exe 2964 WerFault.exe 2964 WerFault.exe 2964 WerFault.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1031\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpconfig.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\cmm\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eo\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe File created C:\Windows\Logo1_.exe 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2964 2808 WerFault.exe 36 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2364 Logo1_.exe 2364 Logo1_.exe 2364 Logo1_.exe 2364 Logo1_.exe 2364 Logo1_.exe 2364 Logo1_.exe 2364 Logo1_.exe 2364 Logo1_.exe 2364 Logo1_.exe 2364 Logo1_.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2360 1224 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe 31 PID 1224 wrote to memory of 2360 1224 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe 31 PID 1224 wrote to memory of 2360 1224 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe 31 PID 1224 wrote to memory of 2360 1224 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe 31 PID 1224 wrote to memory of 2364 1224 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe 32 PID 1224 wrote to memory of 2364 1224 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe 32 PID 1224 wrote to memory of 2364 1224 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe 32 PID 1224 wrote to memory of 2364 1224 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe 32 PID 2364 wrote to memory of 848 2364 Logo1_.exe 34 PID 2364 wrote to memory of 848 2364 Logo1_.exe 34 PID 2364 wrote to memory of 848 2364 Logo1_.exe 34 PID 2364 wrote to memory of 848 2364 Logo1_.exe 34 PID 2360 wrote to memory of 2808 2360 cmd.exe 36 PID 2360 wrote to memory of 2808 2360 cmd.exe 36 PID 2360 wrote to memory of 2808 2360 cmd.exe 36 PID 2360 wrote to memory of 2808 2360 cmd.exe 36 PID 848 wrote to memory of 2860 848 net.exe 37 PID 848 wrote to memory of 2860 848 net.exe 37 PID 848 wrote to memory of 2860 848 net.exe 37 PID 848 wrote to memory of 2860 848 net.exe 37 PID 2808 wrote to memory of 2964 2808 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe 38 PID 2808 wrote to memory of 2964 2808 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe 38 PID 2808 wrote to memory of 2964 2808 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe 38 PID 2808 wrote to memory of 2964 2808 10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe 38 PID 2364 wrote to memory of 1152 2364 Logo1_.exe 20 PID 2364 wrote to memory of 1152 2364 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe"C:\Users\Admin\AppData\Local\Temp\10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE3AB.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe"C:\Users\Admin\AppData\Local\Temp\10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 365⤵
- Loads dropped DLL
- Program crash
PID:2964
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD50ebc6749e2c3264b0251feb3fb3c91f0
SHA13d51785703c577cd51e0c05df428fef65acde3ae
SHA2569a9efd253692b6b2bb8e358acd75ba07cfaa12644d8de5d12460df3b5df06172
SHA5126a2a18ecd874330f55d70a0898054b4e9c5454fd32ce4e5c08e141787a1116dd013456d4831730beca6d8e28261d3f6dbac147022b4e9d3fda70579cf2942929
-
Filesize
471KB
MD5f9fc019eacb573ec828d2d9ff6a48318
SHA1b91958dc8d178b6eeb35e829bab84d0fb12c2280
SHA256bf9ba3df2bad76d15f4efe42c0c59f37b9454907958892df8ab996552658934e
SHA512998ba7bc7cdd5df3e1acfda6f4f92ec9d27732e1e182177dff310f3c918f3be99626a3526bebdff5bb7eb980640434baf56e0f08bfd125168c0a9e37e7239305
-
Filesize
722B
MD5771ee5993f4aed49b582d230189c4758
SHA1cb2ceb4cb3748bf809aa93335e6a2f875e50d435
SHA256be37c89d222d5986ef430d86a3d84b936768b316f904093c01241759459d7036
SHA5123974844883b5e7f9a62ac322d4f9d797be564fe4999c7aecc14c275ce4e23152f9212d06dc8b3ba3f16a72fdbd2d540e3f7f1f837f8281e1a1ad10709a99535c
-
C:\Users\Admin\AppData\Local\Temp\10e75daab8d37ded5da2e87609c5a30a515d90dd305e180568cfdf30da41a9a2.exe.exe
Filesize137KB
MD556c765a6bae3953c3b3e2cdc70826731
SHA156aac813814e1d74914ed10252542e636bc4f330
SHA2567a0ef5a0bdb4a246847e7b31e49bd570d47630d634eb53130f642b061e4e82c9
SHA512dbcea75226a570a2ad5a600123a0d5ddf5f8cd38977eb6cf3d9566e59a7d6b8a1df9041e07259cf90049d24b0760802e0bb153a56a274dd301a53890aa870a90
-
Filesize
26KB
MD56d1897fce1d6586be0535a68800186c1
SHA1b7e726ce1efdd0faeb4e7815c135a2fc51e0a06f
SHA2565f37e266fe06751a70976dde002a6dc53df2df2d08147adcaa408cdfa43f2324
SHA512977e16961bfd2cd6fa9f4315887697be1c4bd3f98a79dd317a0db932ba5dc71bd779c333c4f56fa184618120a62caba9149ed047a52c4c5c73ba23b2aa1704ad
-
Filesize
10B
MD58b929bbff5206fb508d25ffd2036ed74
SHA1cd32d37ccaae75cc9bb7ba821161d084b6d3d173
SHA256e461dcb4d7e5d8f7940f58d1fb55b6934a26df6435436b8465461ecc002b172b
SHA5125c5816f7ff2ef7de725d9b2f97e9ab62f765e81d53bfc3623c6683a34609fa8c1fb6b472ae266154be61937f296b16ed4147e7d2024517fa1e7603975df82281