Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:25
Static task
static1
Behavioral task
behavioral1
Sample
d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
Resource
win10v2004-20220812-en
General
-
Target
d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
-
Size
274KB
-
MD5
1e6d7bd19bf1ad8f5497369e7dcf6d30
-
SHA1
a72d042bc0682f0757e1f6ebc5d11b862262d563
-
SHA256
d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10
-
SHA512
4ed982c9eff9e8aeea3e39ea1254995509ddbe527f1818ff520205fe723dc354fe583ed33faa9c33957f7bf527c02769dbb941888a17543a58556afedc62ee0a
-
SSDEEP
6144:nuJ2NUrOiPlKkwMkti2k67yCB9Lfdz3pT4QtEuKW:Sok5kLLfdz3pTNtE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Logo1_.exed9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exepid process 308 Logo1_.exe 1120 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1472 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1472 cmd.exe 1472 cmd.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exedescription ioc process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exedescription ioc process File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\STS2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Basic\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Outlook.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
Processes:
d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exeLogo1_.exedescription ioc process File created C:\Windows\rundl132.exe d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe File created C:\Windows\Logo1_.exe d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Logo1_.exepid process 308 Logo1_.exe 308 Logo1_.exe 308 Logo1_.exe 308 Logo1_.exe 308 Logo1_.exe 308 Logo1_.exe 308 Logo1_.exe 308 Logo1_.exe 308 Logo1_.exe 308 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.execmd.exeLogo1_.exenet.exedescription pid process target process PID 1112 wrote to memory of 1472 1112 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe cmd.exe PID 1112 wrote to memory of 1472 1112 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe cmd.exe PID 1112 wrote to memory of 1472 1112 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe cmd.exe PID 1112 wrote to memory of 1472 1112 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe cmd.exe PID 1112 wrote to memory of 308 1112 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe Logo1_.exe PID 1112 wrote to memory of 308 1112 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe Logo1_.exe PID 1112 wrote to memory of 308 1112 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe Logo1_.exe PID 1112 wrote to memory of 308 1112 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe Logo1_.exe PID 1472 wrote to memory of 1120 1472 cmd.exe d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe PID 1472 wrote to memory of 1120 1472 cmd.exe d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe PID 1472 wrote to memory of 1120 1472 cmd.exe d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe PID 1472 wrote to memory of 1120 1472 cmd.exe d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe PID 308 wrote to memory of 964 308 Logo1_.exe net.exe PID 308 wrote to memory of 964 308 Logo1_.exe net.exe PID 308 wrote to memory of 964 308 Logo1_.exe net.exe PID 308 wrote to memory of 964 308 Logo1_.exe net.exe PID 964 wrote to memory of 1704 964 net.exe net1.exe PID 964 wrote to memory of 1704 964 net.exe net1.exe PID 964 wrote to memory of 1704 964 net.exe net1.exe PID 964 wrote to memory of 1704 964 net.exe net1.exe PID 308 wrote to memory of 1272 308 Logo1_.exe Explorer.EXE PID 308 wrote to memory of 1272 308 Logo1_.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe"C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aF49C.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe"C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe"4⤵
- Executes dropped EXE
PID:1120 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5290c93edf9c2dc8b2e63870ad996b9be
SHA134dcef54bdae4b60db96506da80860d05f3a855c
SHA2563d1e63e39db89b43e9fc629e75adaf0762c598530895af0a8e034571b93a3765
SHA5128715e95667a78a6e35553b7e7909674c5a3e8ead8bced0a5fab66799ba8eba034289e4cc1995ee44569ae1afc7ea58d2bdf70812b33acd431fa4d2975e6a0855
-
C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
Filesize245KB
MD50509f528b74e3dab7f6391704c72b225
SHA1aced5e9bb5e9cf3bdbff1e416e553a17b998eab4
SHA2562b8d62db7e8d56111532683b4fafccad7f5ce1ef1deac13f1116a552d7cf2ece
SHA51281803ca64d7d72db03ec6fcefdede8db46244df60a6d3c5f1d5cb9d5b7836238042fda7116cd4e6a5b003b45f7c77e1febcc2b5c134f2f2b0fd28ba5952e0e6a
-
C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe.exe
Filesize245KB
MD50509f528b74e3dab7f6391704c72b225
SHA1aced5e9bb5e9cf3bdbff1e416e553a17b998eab4
SHA2562b8d62db7e8d56111532683b4fafccad7f5ce1ef1deac13f1116a552d7cf2ece
SHA51281803ca64d7d72db03ec6fcefdede8db46244df60a6d3c5f1d5cb9d5b7836238042fda7116cd4e6a5b003b45f7c77e1febcc2b5c134f2f2b0fd28ba5952e0e6a
-
Filesize
29KB
MD52872f62ba008526accca6e87b9112e83
SHA18a5ae449ead9f5b7ed4621644297054d9e2b6dcc
SHA25642ebc4014f8f8ab4505ba8184222160deb146eb8c934965231e1b2d2c6c46195
SHA512c94f2900cf9d5761ac33b6fb3122a7ce655cc33deaeda98cbe1d8a2a5ddce3271ed752ba100de013d6fc7ac2d6c096a67d73d7deb3bd9e072ece6db2c4df5abb
-
Filesize
29KB
MD52872f62ba008526accca6e87b9112e83
SHA18a5ae449ead9f5b7ed4621644297054d9e2b6dcc
SHA25642ebc4014f8f8ab4505ba8184222160deb146eb8c934965231e1b2d2c6c46195
SHA512c94f2900cf9d5761ac33b6fb3122a7ce655cc33deaeda98cbe1d8a2a5ddce3271ed752ba100de013d6fc7ac2d6c096a67d73d7deb3bd9e072ece6db2c4df5abb
-
Filesize
29KB
MD52872f62ba008526accca6e87b9112e83
SHA18a5ae449ead9f5b7ed4621644297054d9e2b6dcc
SHA25642ebc4014f8f8ab4505ba8184222160deb146eb8c934965231e1b2d2c6c46195
SHA512c94f2900cf9d5761ac33b6fb3122a7ce655cc33deaeda98cbe1d8a2a5ddce3271ed752ba100de013d6fc7ac2d6c096a67d73d7deb3bd9e072ece6db2c4df5abb
-
\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
Filesize245KB
MD50509f528b74e3dab7f6391704c72b225
SHA1aced5e9bb5e9cf3bdbff1e416e553a17b998eab4
SHA2562b8d62db7e8d56111532683b4fafccad7f5ce1ef1deac13f1116a552d7cf2ece
SHA51281803ca64d7d72db03ec6fcefdede8db46244df60a6d3c5f1d5cb9d5b7836238042fda7116cd4e6a5b003b45f7c77e1febcc2b5c134f2f2b0fd28ba5952e0e6a
-
\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
Filesize245KB
MD50509f528b74e3dab7f6391704c72b225
SHA1aced5e9bb5e9cf3bdbff1e416e553a17b998eab4
SHA2562b8d62db7e8d56111532683b4fafccad7f5ce1ef1deac13f1116a552d7cf2ece
SHA51281803ca64d7d72db03ec6fcefdede8db46244df60a6d3c5f1d5cb9d5b7836238042fda7116cd4e6a5b003b45f7c77e1febcc2b5c134f2f2b0fd28ba5952e0e6a