Analysis
-
max time kernel
150s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe
Resource
win10v2004-20220812-en
General
-
Target
768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe
-
Size
84KB
-
MD5
d867e53a5cd6e3b7548b1507df96d5fa
-
SHA1
8bf9ce65c12591fd61adbc8ae1d085c358c52142
-
SHA256
768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf
-
SHA512
82300a489e25c47b9254618ae30e126de8ed240d8e5f323a4bc87006a9fbc3e0212caf125f14c7f2fecab6f004a2c4024ffbe44790ee345b3e438089771f673d
-
SSDEEP
1536:pfS3SHuJV9NxijD776HmzJWNb6/g3DWNp82lan:pfSkuJVLxiv8mzk6yDbn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1216 Logo1_.exe 624 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe -
resource yara_rule behavioral1/files/0x000a000000012324-61.dat upx behavioral1/files/0x000a000000012324-63.dat upx behavioral1/files/0x000a000000012324-65.dat upx behavioral1/files/0x000a000000012324-68.dat upx behavioral1/files/0x000a000000012324-69.dat upx behavioral1/files/0x000a000000012324-70.dat upx behavioral1/memory/624-72-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/624-87-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1700 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 1700 cmd.exe 624 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe 624 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe 624 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proofing.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe File created C:\Windows\Logo1_.exe 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1216 Logo1_.exe 1216 Logo1_.exe 1216 Logo1_.exe 1216 Logo1_.exe 1216 Logo1_.exe 1216 Logo1_.exe 1216 Logo1_.exe 1216 Logo1_.exe 1216 Logo1_.exe 1216 Logo1_.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 624 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe 624 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1700 1368 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe 27 PID 1368 wrote to memory of 1700 1368 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe 27 PID 1368 wrote to memory of 1700 1368 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe 27 PID 1368 wrote to memory of 1700 1368 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe 27 PID 1368 wrote to memory of 1216 1368 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe 29 PID 1368 wrote to memory of 1216 1368 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe 29 PID 1368 wrote to memory of 1216 1368 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe 29 PID 1368 wrote to memory of 1216 1368 768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe 29 PID 1216 wrote to memory of 1644 1216 Logo1_.exe 30 PID 1216 wrote to memory of 1644 1216 Logo1_.exe 30 PID 1216 wrote to memory of 1644 1216 Logo1_.exe 30 PID 1216 wrote to memory of 1644 1216 Logo1_.exe 30 PID 1700 wrote to memory of 624 1700 cmd.exe 32 PID 1700 wrote to memory of 624 1700 cmd.exe 32 PID 1700 wrote to memory of 624 1700 cmd.exe 32 PID 1700 wrote to memory of 624 1700 cmd.exe 32 PID 1700 wrote to memory of 624 1700 cmd.exe 32 PID 1700 wrote to memory of 624 1700 cmd.exe 32 PID 1700 wrote to memory of 624 1700 cmd.exe 32 PID 1644 wrote to memory of 1332 1644 net.exe 33 PID 1644 wrote to memory of 1332 1644 net.exe 33 PID 1644 wrote to memory of 1332 1644 net.exe 33 PID 1644 wrote to memory of 1332 1644 net.exe 33 PID 1216 wrote to memory of 1280 1216 Logo1_.exe 15 PID 1216 wrote to memory of 1280 1216 Logo1_.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe"C:\Users\Admin\AppData\Local\Temp\768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2A1D.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe"C:\Users\Admin\AppData\Local\Temp\768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:624
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1332
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5c1fb04681533b640ff23834122aa061a
SHA1b6b10d7ff23bb0a389bb4c5e442cdc33d5e64602
SHA256d5e8e63771ecd089950733e223d9ccc4e6b181de0efcd6df70823655c1d7a9d2
SHA512b6bdbe6ed07a2d0defe3a83a3a5d5ee397a8ee2c7e6933da32c1c7dfa5fbe84fb85023789a44bd4fa485c37a53c3ed14031c833f157ce69e722b9c3972648bb1
-
C:\Users\Admin\AppData\Local\Temp\768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe
Filesize55KB
MD57ad841410c2f76ef5d955b87dbad017b
SHA1cd713337b8015d3e2231ccda168107da27ea648c
SHA2567fc6c27909cd034a7c38c3f1f3c0edd8766be0385546a1397c8030a99fe47562
SHA51293b9b3e09575f8af6d9e083d9e0857797f6121b6fe7178b00434bcba302c7132b196db7cd7cd07d7002c64ef4aaf0432e287e61ca66c13a85e4a1e0cb41dd351
-
C:\Users\Admin\AppData\Local\Temp\768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe.exe
Filesize55KB
MD57ad841410c2f76ef5d955b87dbad017b
SHA1cd713337b8015d3e2231ccda168107da27ea648c
SHA2567fc6c27909cd034a7c38c3f1f3c0edd8766be0385546a1397c8030a99fe47562
SHA51293b9b3e09575f8af6d9e083d9e0857797f6121b6fe7178b00434bcba302c7132b196db7cd7cd07d7002c64ef4aaf0432e287e61ca66c13a85e4a1e0cb41dd351
-
Filesize
29KB
MD517c8a30885141f4bb23e27c55f732426
SHA1095b7402a6040dfab02296b757d8ce2dcbf8c34e
SHA256f04f97e6c7636fe10c31c1ca086cbc433443a4364b81df2c09ee213deee33fed
SHA512498a22646eba0fbcf8f50d94bb312b013eab0ffa89cf8a571f2cf2a4d92c0697ff8889502090a145c6e6ae04ed043a5cf3e0d5dcd42b034506fc155a7f6cee4d
-
Filesize
29KB
MD517c8a30885141f4bb23e27c55f732426
SHA1095b7402a6040dfab02296b757d8ce2dcbf8c34e
SHA256f04f97e6c7636fe10c31c1ca086cbc433443a4364b81df2c09ee213deee33fed
SHA512498a22646eba0fbcf8f50d94bb312b013eab0ffa89cf8a571f2cf2a4d92c0697ff8889502090a145c6e6ae04ed043a5cf3e0d5dcd42b034506fc155a7f6cee4d
-
Filesize
29KB
MD517c8a30885141f4bb23e27c55f732426
SHA1095b7402a6040dfab02296b757d8ce2dcbf8c34e
SHA256f04f97e6c7636fe10c31c1ca086cbc433443a4364b81df2c09ee213deee33fed
SHA512498a22646eba0fbcf8f50d94bb312b013eab0ffa89cf8a571f2cf2a4d92c0697ff8889502090a145c6e6ae04ed043a5cf3e0d5dcd42b034506fc155a7f6cee4d
-
\Users\Admin\AppData\Local\Temp\768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe
Filesize55KB
MD57ad841410c2f76ef5d955b87dbad017b
SHA1cd713337b8015d3e2231ccda168107da27ea648c
SHA2567fc6c27909cd034a7c38c3f1f3c0edd8766be0385546a1397c8030a99fe47562
SHA51293b9b3e09575f8af6d9e083d9e0857797f6121b6fe7178b00434bcba302c7132b196db7cd7cd07d7002c64ef4aaf0432e287e61ca66c13a85e4a1e0cb41dd351
-
\Users\Admin\AppData\Local\Temp\768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe
Filesize55KB
MD57ad841410c2f76ef5d955b87dbad017b
SHA1cd713337b8015d3e2231ccda168107da27ea648c
SHA2567fc6c27909cd034a7c38c3f1f3c0edd8766be0385546a1397c8030a99fe47562
SHA51293b9b3e09575f8af6d9e083d9e0857797f6121b6fe7178b00434bcba302c7132b196db7cd7cd07d7002c64ef4aaf0432e287e61ca66c13a85e4a1e0cb41dd351
-
\Users\Admin\AppData\Local\Temp\768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe
Filesize55KB
MD57ad841410c2f76ef5d955b87dbad017b
SHA1cd713337b8015d3e2231ccda168107da27ea648c
SHA2567fc6c27909cd034a7c38c3f1f3c0edd8766be0385546a1397c8030a99fe47562
SHA51293b9b3e09575f8af6d9e083d9e0857797f6121b6fe7178b00434bcba302c7132b196db7cd7cd07d7002c64ef4aaf0432e287e61ca66c13a85e4a1e0cb41dd351
-
\Users\Admin\AppData\Local\Temp\768403971ac3afebecadc376d519b3561a144f13014c8e57e8f4a46fedb14baf.exe
Filesize55KB
MD57ad841410c2f76ef5d955b87dbad017b
SHA1cd713337b8015d3e2231ccda168107da27ea648c
SHA2567fc6c27909cd034a7c38c3f1f3c0edd8766be0385546a1397c8030a99fe47562
SHA51293b9b3e09575f8af6d9e083d9e0857797f6121b6fe7178b00434bcba302c7132b196db7cd7cd07d7002c64ef4aaf0432e287e61ca66c13a85e4a1e0cb41dd351