Analysis
-
max time kernel
188s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 00:43
Static task
static1
Behavioral task
behavioral1
Sample
93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe
Resource
win10v2004-20220812-en
General
-
Target
93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe
-
Size
112KB
-
MD5
6f5aac6e26ef2b4d76e96067186f6bd0
-
SHA1
35df376831b69ffcd7c7feefdc9c0f2f826b4365
-
SHA256
93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42
-
SHA512
4ddd6581525e0b5d234a1ad6bd224ed8502534d79361579d34dab6a5ce4608bdd4517b572d2e2cb925b47d26b3ee41c53421bd2ace0bb8e35c71135b44a7a01a
-
SSDEEP
3072:yftffV+RusUrMzkm8PL3E7Qw/STyr5Jks7M/2:CVfw8szkmIL3E7QPQLE2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1740 Logo1_.exe 956 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe -
Deletes itself 1 IoCs
pid Process 2044 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2044 cmd.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe File created C:\Windows\Logo1_.exe 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe 1740 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2044 1916 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 28 PID 1916 wrote to memory of 2044 1916 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 28 PID 1916 wrote to memory of 2044 1916 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 28 PID 1916 wrote to memory of 2044 1916 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 28 PID 1916 wrote to memory of 1740 1916 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 30 PID 1916 wrote to memory of 1740 1916 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 30 PID 1916 wrote to memory of 1740 1916 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 30 PID 1916 wrote to memory of 1740 1916 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 30 PID 1740 wrote to memory of 2028 1740 Logo1_.exe 31 PID 1740 wrote to memory of 2028 1740 Logo1_.exe 31 PID 1740 wrote to memory of 2028 1740 Logo1_.exe 31 PID 1740 wrote to memory of 2028 1740 Logo1_.exe 31 PID 2044 wrote to memory of 956 2044 cmd.exe 33 PID 2044 wrote to memory of 956 2044 cmd.exe 33 PID 2044 wrote to memory of 956 2044 cmd.exe 33 PID 2044 wrote to memory of 956 2044 cmd.exe 33 PID 2028 wrote to memory of 320 2028 net.exe 34 PID 2028 wrote to memory of 320 2028 net.exe 34 PID 2028 wrote to memory of 320 2028 net.exe 34 PID 2028 wrote to memory of 320 2028 net.exe 34 PID 1740 wrote to memory of 1220 1740 Logo1_.exe 10 PID 1740 wrote to memory of 1220 1740 Logo1_.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe"C:\Users\Admin\AppData\Local\Temp\93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a9619.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe"C:\Users\Admin\AppData\Local\Temp\93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe"4⤵
- Executes dropped EXE
PID:956
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:320
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5fd3e6ac6f233cceafd511f1e0817d1c4
SHA19d05af0bbe0b3c00e6dbddfa6b55e23eeeef40a3
SHA2561707db7eb30aa08b38eee11d07208063c19c8feb8ca8e6f63fe5bd860b1c33af
SHA51266e5cff8bcf44a2267192265eb1681dda2c3cd3d5ca89dd90f2c4d9940767b7e62d5a0d107a7b8ed49c0ffa95dba1cd0a8d4a9bb5c5727da1169bbd0980a5127
-
C:\Users\Admin\AppData\Local\Temp\93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe
Filesize86KB
MD572dfd72927e77f491f786648e74edfc5
SHA17fb9e4b3ab6a5bfe5e78a36194407f56ce96e61a
SHA2566c0473a4f79ad36f2526f190db19582af27988128b6fac96720bace7f5c271e1
SHA5120842a4866c8b78f502023c9430520f3595b4f3938f3be8ab3fbb7f72660a78c7219da817d4071d6908442b933f8f71840040188db86d5a97bc620345ce4bf695
-
C:\Users\Admin\AppData\Local\Temp\93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe.exe
Filesize86KB
MD572dfd72927e77f491f786648e74edfc5
SHA17fb9e4b3ab6a5bfe5e78a36194407f56ce96e61a
SHA2566c0473a4f79ad36f2526f190db19582af27988128b6fac96720bace7f5c271e1
SHA5120842a4866c8b78f502023c9430520f3595b4f3938f3be8ab3fbb7f72660a78c7219da817d4071d6908442b933f8f71840040188db86d5a97bc620345ce4bf695
-
Filesize
26KB
MD53d02e9a181d3ed5b125e56a1987b5bdb
SHA1a9ef3500a71f0a29260039de0f4d80bc51f43912
SHA256882c4645013972204e5c933033fa05512a17a5205bbef8144b96fb6ebb4d6825
SHA512b0de499cef5cf1dfcb44c7cee3ccde49e23a061818f55a55bb766855c7e7c98d043ab54ea9f21c76f94c42f41fe272100e22f1d35fa88331f01c2a83245444b1
-
Filesize
26KB
MD53d02e9a181d3ed5b125e56a1987b5bdb
SHA1a9ef3500a71f0a29260039de0f4d80bc51f43912
SHA256882c4645013972204e5c933033fa05512a17a5205bbef8144b96fb6ebb4d6825
SHA512b0de499cef5cf1dfcb44c7cee3ccde49e23a061818f55a55bb766855c7e7c98d043ab54ea9f21c76f94c42f41fe272100e22f1d35fa88331f01c2a83245444b1
-
Filesize
26KB
MD53d02e9a181d3ed5b125e56a1987b5bdb
SHA1a9ef3500a71f0a29260039de0f4d80bc51f43912
SHA256882c4645013972204e5c933033fa05512a17a5205bbef8144b96fb6ebb4d6825
SHA512b0de499cef5cf1dfcb44c7cee3ccde49e23a061818f55a55bb766855c7e7c98d043ab54ea9f21c76f94c42f41fe272100e22f1d35fa88331f01c2a83245444b1
-
\Users\Admin\AppData\Local\Temp\93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe
Filesize86KB
MD572dfd72927e77f491f786648e74edfc5
SHA17fb9e4b3ab6a5bfe5e78a36194407f56ce96e61a
SHA2566c0473a4f79ad36f2526f190db19582af27988128b6fac96720bace7f5c271e1
SHA5120842a4866c8b78f502023c9430520f3595b4f3938f3be8ab3fbb7f72660a78c7219da817d4071d6908442b933f8f71840040188db86d5a97bc620345ce4bf695