Analysis
-
max time kernel
172s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 22:48
Static task
static1
Behavioral task
behavioral1
Sample
26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe
Resource
win10v2004-20220812-en
General
-
Target
26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe
-
Size
120KB
-
MD5
5a2544acd855a22edf79e6764abceea0
-
SHA1
4eef795e46737c9438dec461414d4895a41fce77
-
SHA256
26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850
-
SHA512
42d7ab20b4fdae8be27bd951458f0af2886f50342aedb62f6dbefae32d301f98ae59e77a5b870ef4ec8e0f5fa3c098e57d91ff7286ff0238e3b9684d316a9732
-
SSDEEP
1536:3fgLdQAQfcfymNWE3L2JugxhQR2TV8RRp0M22CR:3ftffjmNWiL82iV8RRp0MC
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2020 Logo1_.exe 1656 26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe -
Deletes itself 1 IoCs
pid Process 1020 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1020 cmd.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Filters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Services\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\89.0.4389.114\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe Logo1_.exe File created C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe File created C:\Windows\Logo1_.exe 26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2020 Logo1_.exe 2020 Logo1_.exe 2020 Logo1_.exe 2020 Logo1_.exe 2020 Logo1_.exe 2020 Logo1_.exe 2020 Logo1_.exe 2020 Logo1_.exe 2020 Logo1_.exe 2020 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1020 1880 26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe 27 PID 1880 wrote to memory of 1020 1880 26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe 27 PID 1880 wrote to memory of 1020 1880 26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe 27 PID 1880 wrote to memory of 1020 1880 26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe 27 PID 1880 wrote to memory of 2020 1880 26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe 29 PID 1880 wrote to memory of 2020 1880 26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe 29 PID 1880 wrote to memory of 2020 1880 26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe 29 PID 1880 wrote to memory of 2020 1880 26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe 29 PID 1020 wrote to memory of 1656 1020 cmd.exe 31 PID 1020 wrote to memory of 1656 1020 cmd.exe 31 PID 1020 wrote to memory of 1656 1020 cmd.exe 31 PID 1020 wrote to memory of 1656 1020 cmd.exe 31 PID 2020 wrote to memory of 1976 2020 Logo1_.exe 30 PID 2020 wrote to memory of 1976 2020 Logo1_.exe 30 PID 2020 wrote to memory of 1976 2020 Logo1_.exe 30 PID 2020 wrote to memory of 1976 2020 Logo1_.exe 30 PID 1976 wrote to memory of 1840 1976 net.exe 33 PID 1976 wrote to memory of 1840 1976 net.exe 33 PID 1976 wrote to memory of 1840 1976 net.exe 33 PID 1976 wrote to memory of 1840 1976 net.exe 33 PID 2020 wrote to memory of 1216 2020 Logo1_.exe 11 PID 2020 wrote to memory of 1216 2020 Logo1_.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe"C:\Users\Admin\AppData\Local\Temp\26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a6AC5.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe"C:\Users\Admin\AppData\Local\Temp\26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe"4⤵
- Executes dropped EXE
PID:1656
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1840
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5990eff652ec261b3b4070a148fa74b13
SHA19256120d5589630ebfe5617baaf64aca3ac0e2dc
SHA256ae67d6546c3831b5b8ea364a38dea9704d4d883cf99d48c3471be48a8dc76328
SHA5129617626e398f5dec1fa2b8e7ccecc5e853d01aa38cda911f955c01d933225ec271c4e863f852ff2c52a7afd1f36560d4ad68ee17d2e177af5fc4f5db0edc88e4
-
C:\Users\Admin\AppData\Local\Temp\26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe
Filesize93KB
MD5df4a6f0c5e694d6ec28dd0dd41a3bd51
SHA1773718bc6ab7a0b2419563a1bc4932281593277f
SHA256a793b09eea4c6a830f3269fe6efc6efb1f1b939b791a01dedb727c94d59378b1
SHA512b5695ee6333cff90bbb7967741179a979ed53bf433dbad780908a827f2824a7473a72632f6dd3b8ae706c7015dbe62373bfb7af58710deed93d944c470b4e9be
-
C:\Users\Admin\AppData\Local\Temp\26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe.exe
Filesize93KB
MD5df4a6f0c5e694d6ec28dd0dd41a3bd51
SHA1773718bc6ab7a0b2419563a1bc4932281593277f
SHA256a793b09eea4c6a830f3269fe6efc6efb1f1b939b791a01dedb727c94d59378b1
SHA512b5695ee6333cff90bbb7967741179a979ed53bf433dbad780908a827f2824a7473a72632f6dd3b8ae706c7015dbe62373bfb7af58710deed93d944c470b4e9be
-
Filesize
26KB
MD57b24f127dde4a0274a463d4581605702
SHA101fba4bb403a7477474d8485230837c14f87c8cc
SHA2568ab4a210f5eb79f6ea976a238eeb8879b4e647dd9b8e47c701d73603957be1ce
SHA512646372a9ec7fe495ad07de375880c779c57be400e1f0dce520329d805508a20d096bffd3a0d25dbe2636e1195f5150cb70e86a101175894835b9a170fd155a8d
-
Filesize
26KB
MD57b24f127dde4a0274a463d4581605702
SHA101fba4bb403a7477474d8485230837c14f87c8cc
SHA2568ab4a210f5eb79f6ea976a238eeb8879b4e647dd9b8e47c701d73603957be1ce
SHA512646372a9ec7fe495ad07de375880c779c57be400e1f0dce520329d805508a20d096bffd3a0d25dbe2636e1195f5150cb70e86a101175894835b9a170fd155a8d
-
Filesize
26KB
MD57b24f127dde4a0274a463d4581605702
SHA101fba4bb403a7477474d8485230837c14f87c8cc
SHA2568ab4a210f5eb79f6ea976a238eeb8879b4e647dd9b8e47c701d73603957be1ce
SHA512646372a9ec7fe495ad07de375880c779c57be400e1f0dce520329d805508a20d096bffd3a0d25dbe2636e1195f5150cb70e86a101175894835b9a170fd155a8d
-
\Users\Admin\AppData\Local\Temp\26dbbc77f17cb09e51bbd5b5783457aa1615c15a3a3610a5a01bef8cc2af9850.exe
Filesize93KB
MD5df4a6f0c5e694d6ec28dd0dd41a3bd51
SHA1773718bc6ab7a0b2419563a1bc4932281593277f
SHA256a793b09eea4c6a830f3269fe6efc6efb1f1b939b791a01dedb727c94d59378b1
SHA512b5695ee6333cff90bbb7967741179a979ed53bf433dbad780908a827f2824a7473a72632f6dd3b8ae706c7015dbe62373bfb7af58710deed93d944c470b4e9be