Analysis
-
max time kernel
253s -
max time network
333s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:25
Static task
static1
Behavioral task
behavioral1
Sample
94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe
Resource
win10v2004-20220812-en
General
-
Target
94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe
-
Size
53KB
-
MD5
15b4d598b8bdeb47f73743eb269204d6
-
SHA1
b0aaa32741d2e47db653a0331de1d76e4714691e
-
SHA256
94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1
-
SHA512
1680d666f59c87362de8f02bf9a3fa49f15577f5bb67113e2bd841991ec3f83184f2a8478bec88d238bdb16b88a19886b925ffe4dcadd12a60b5950b1be98682
-
SSDEEP
768:pYrqhex16GVRu1yK9fMnJG2V9dHS8IdGd9sD+v:pQ403SHuJV9Nuk7v
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Logo1_.exe94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exepid process 556 Logo1_.exe 752 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 520 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 520 cmd.exe 520 cmd.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exedescription ioc process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
Processes:
94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exeLogo1_.exedescription ioc process File created C:\Windows\rundl132.exe 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe File created C:\Windows\Logo1_.exe 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Logo1_.exepid process 556 Logo1_.exe 556 Logo1_.exe 556 Logo1_.exe 556 Logo1_.exe 556 Logo1_.exe 556 Logo1_.exe 556 Logo1_.exe 556 Logo1_.exe 556 Logo1_.exe 556 Logo1_.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exedescription pid process Token: SeDebugPrivilege 752 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exepid process 752 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.execmd.exeLogo1_.exenet.exedescription pid process target process PID 1112 wrote to memory of 520 1112 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe cmd.exe PID 1112 wrote to memory of 520 1112 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe cmd.exe PID 1112 wrote to memory of 520 1112 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe cmd.exe PID 1112 wrote to memory of 520 1112 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe cmd.exe PID 1112 wrote to memory of 556 1112 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe Logo1_.exe PID 1112 wrote to memory of 556 1112 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe Logo1_.exe PID 1112 wrote to memory of 556 1112 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe Logo1_.exe PID 1112 wrote to memory of 556 1112 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe Logo1_.exe PID 520 wrote to memory of 752 520 cmd.exe 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe PID 520 wrote to memory of 752 520 cmd.exe 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe PID 520 wrote to memory of 752 520 cmd.exe 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe PID 520 wrote to memory of 752 520 cmd.exe 94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe PID 556 wrote to memory of 1356 556 Logo1_.exe net.exe PID 556 wrote to memory of 1356 556 Logo1_.exe net.exe PID 556 wrote to memory of 1356 556 Logo1_.exe net.exe PID 556 wrote to memory of 1356 556 Logo1_.exe net.exe PID 1356 wrote to memory of 1800 1356 net.exe net1.exe PID 1356 wrote to memory of 1800 1356 net.exe net1.exe PID 1356 wrote to memory of 1800 1356 net.exe net1.exe PID 1356 wrote to memory of 1800 1356 net.exe net1.exe PID 556 wrote to memory of 1232 556 Logo1_.exe Explorer.EXE PID 556 wrote to memory of 1232 556 Logo1_.exe Explorer.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe"C:\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2740.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe"C:\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:752 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1800
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD59678c57a0494ffcf0ade471d309df6dc
SHA18e44b97077ae968d24b567f5967d6d8619916cc8
SHA2567da2e094ff59f04e2bc4dbbc4ca0af908be1de97a78c0cabfa197ab1282b08bc
SHA512b0b25b66fdc7b2f2425e3164ee940afb8412ed942f08a0be8cad0947fb349ad0808b85f88cb810b46f5bc6cf1e4898188f9fac2ba6fce79d9cfd85fd4d6c7fb7
-
C:\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe
Filesize24KB
MD583b6cdfe5da9e62c7d57221710d95fca
SHA168f40021b18d20a6b70706d97d22d96b04916b75
SHA2568ebb7afe356ba1f1d82803f59c841461340954f4fbb15ee3f17e783ea10656c6
SHA512024d04b61325be5412eabca2bbcfc6c58bf07cf91df2dbd5450c7b9b3acff8634050976399c2120e6a7edd9160573fee2560b28caf08d618b8b6d634068b9d90
-
C:\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe.exe
Filesize24KB
MD583b6cdfe5da9e62c7d57221710d95fca
SHA168f40021b18d20a6b70706d97d22d96b04916b75
SHA2568ebb7afe356ba1f1d82803f59c841461340954f4fbb15ee3f17e783ea10656c6
SHA512024d04b61325be5412eabca2bbcfc6c58bf07cf91df2dbd5450c7b9b3acff8634050976399c2120e6a7edd9160573fee2560b28caf08d618b8b6d634068b9d90
-
Filesize
29KB
MD5299ec53ce5b2365abe319f35679ddec0
SHA1c20f3a0e8103d8eae82a03ca33ecb67d85f3e565
SHA2562caef49efff30ab8eccfadb3f1e5ee1e5c04d857502bd2c7f7948e2944dee00a
SHA5121dcd58a5022c844b5ac15af8d6c555b9b13d1d263196525acaee1c4c82077671ce1eefb434b3318b65b6dc57a36a7385afee4b3cad21935d00b402cd5ef5b695
-
Filesize
29KB
MD5299ec53ce5b2365abe319f35679ddec0
SHA1c20f3a0e8103d8eae82a03ca33ecb67d85f3e565
SHA2562caef49efff30ab8eccfadb3f1e5ee1e5c04d857502bd2c7f7948e2944dee00a
SHA5121dcd58a5022c844b5ac15af8d6c555b9b13d1d263196525acaee1c4c82077671ce1eefb434b3318b65b6dc57a36a7385afee4b3cad21935d00b402cd5ef5b695
-
Filesize
29KB
MD5299ec53ce5b2365abe319f35679ddec0
SHA1c20f3a0e8103d8eae82a03ca33ecb67d85f3e565
SHA2562caef49efff30ab8eccfadb3f1e5ee1e5c04d857502bd2c7f7948e2944dee00a
SHA5121dcd58a5022c844b5ac15af8d6c555b9b13d1d263196525acaee1c4c82077671ce1eefb434b3318b65b6dc57a36a7385afee4b3cad21935d00b402cd5ef5b695
-
\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe
Filesize24KB
MD583b6cdfe5da9e62c7d57221710d95fca
SHA168f40021b18d20a6b70706d97d22d96b04916b75
SHA2568ebb7afe356ba1f1d82803f59c841461340954f4fbb15ee3f17e783ea10656c6
SHA512024d04b61325be5412eabca2bbcfc6c58bf07cf91df2dbd5450c7b9b3acff8634050976399c2120e6a7edd9160573fee2560b28caf08d618b8b6d634068b9d90
-
\Users\Admin\AppData\Local\Temp\94f0c99a1176c429e3548497cd302abd35d0edb22262a4cfd1a8bfc513a234d1.exe
Filesize24KB
MD583b6cdfe5da9e62c7d57221710d95fca
SHA168f40021b18d20a6b70706d97d22d96b04916b75
SHA2568ebb7afe356ba1f1d82803f59c841461340954f4fbb15ee3f17e783ea10656c6
SHA512024d04b61325be5412eabca2bbcfc6c58bf07cf91df2dbd5450c7b9b3acff8634050976399c2120e6a7edd9160573fee2560b28caf08d618b8b6d634068b9d90