Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22/08/2023, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
Resource
win10v2004-20230703-en
General
-
Target
8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
-
Size
46KB
-
MD5
869ba6ac819fe933a52089277ebd09ec
-
SHA1
ea07630fa1ae65bef5d1183648f09c10721f2774
-
SHA256
8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383
-
SHA512
bf16235827c7e8a7bdc3d5bac1deec3d3040cdbf3e2fcc42a112ad19567c61495c7681156ed8bdbdb0e1a61684f0492b8eac0f725f8e9c1020f866724f7c9afa
-
SSDEEP
768:pG1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLzXqv82FVvh:6fgLdQAQfcfymNv6v1h
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2444 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2100 Logo1_.exe 3044 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe -
Loads dropped DLL 2 IoCs
pid Process 2444 cmd.exe 2444 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1031\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File created C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe File created C:\Windows\Logo1_.exe 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2100 Logo1_.exe 2100 Logo1_.exe 2100 Logo1_.exe 2100 Logo1_.exe 2100 Logo1_.exe 2100 Logo1_.exe 2100 Logo1_.exe 2100 Logo1_.exe 2100 Logo1_.exe 2100 Logo1_.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3044 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 3044 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2444 2612 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 29 PID 2612 wrote to memory of 2444 2612 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 29 PID 2612 wrote to memory of 2444 2612 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 29 PID 2612 wrote to memory of 2444 2612 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 29 PID 2612 wrote to memory of 2100 2612 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 30 PID 2612 wrote to memory of 2100 2612 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 30 PID 2612 wrote to memory of 2100 2612 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 30 PID 2612 wrote to memory of 2100 2612 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 30 PID 2100 wrote to memory of 2388 2100 Logo1_.exe 31 PID 2100 wrote to memory of 2388 2100 Logo1_.exe 31 PID 2100 wrote to memory of 2388 2100 Logo1_.exe 31 PID 2100 wrote to memory of 2388 2100 Logo1_.exe 31 PID 2388 wrote to memory of 2992 2388 net.exe 33 PID 2388 wrote to memory of 2992 2388 net.exe 33 PID 2388 wrote to memory of 2992 2388 net.exe 33 PID 2388 wrote to memory of 2992 2388 net.exe 33 PID 2444 wrote to memory of 3044 2444 cmd.exe 34 PID 2444 wrote to memory of 3044 2444 cmd.exe 34 PID 2444 wrote to memory of 3044 2444 cmd.exe 34 PID 2444 wrote to memory of 3044 2444 cmd.exe 34 PID 2100 wrote to memory of 1276 2100 Logo1_.exe 14 PID 2100 wrote to memory of 1276 2100 Logo1_.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe"C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a89D8.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe"C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2992
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD54f1348ee8e879b893e03458ec71e1536
SHA1c333bbc16ce1a93206ffd251465f44211cb54b13
SHA2564d4dd3e9434b8b3155e6cb43e0651f207486f0cf23753c2ef6b644fe01e27a5c
SHA512562f732f9d9bcb991ad00dea0d032a81dd54dfd93aaeff6a4493e08b064f23ea992752dde18d132421c7b36b6699dea8dabdfa454808fb393368975c0c64f078
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD599e13d9ee68728849e1649c5a1fd77e1
SHA1acd5cd331db0c6ce96c77527a2680e50a5958e90
SHA25673d3036ccd8219ca8da6d1978b67533499f6804c96be1285cd9d335907910973
SHA51209910545bd0276312a209aca9796deac88e7b6a541a3fc4b07de46f1d8baa55de60ee270907f180d72019346e2da1a7009542f55344889b8162f1b9373b79688
-
Filesize
722B
MD599e13d9ee68728849e1649c5a1fd77e1
SHA1acd5cd331db0c6ce96c77527a2680e50a5958e90
SHA25673d3036ccd8219ca8da6d1978b67533499f6804c96be1285cd9d335907910973
SHA51209910545bd0276312a209aca9796deac88e7b6a541a3fc4b07de46f1d8baa55de60ee270907f180d72019346e2da1a7009542f55344889b8162f1b9373b79688
-
C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
Filesize20KB
MD546eff666c94e3f7cf93ce87feb23af51
SHA1fdb4d2878166c547b4fb61996f673ae345c2415c
SHA2565115438f3279d97dfef6f319688c0b154ed0e62a55dd8e8dc6cc370a4e1aa742
SHA5126f7db660cde8a89c11f7202f720d9805d1cddeb34013bf96cc400378a31e8c0af45ed681a45ed7a1c261c9c6d93504167519f2e91cc90f6afbde636cb881486b
-
C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe.exe
Filesize20KB
MD546eff666c94e3f7cf93ce87feb23af51
SHA1fdb4d2878166c547b4fb61996f673ae345c2415c
SHA2565115438f3279d97dfef6f319688c0b154ed0e62a55dd8e8dc6cc370a4e1aa742
SHA5126f7db660cde8a89c11f7202f720d9805d1cddeb34013bf96cc400378a31e8c0af45ed681a45ed7a1c261c9c6d93504167519f2e91cc90f6afbde636cb881486b
-
Filesize
26KB
MD5c8f519a43c76c60e8cbab32da4b85a13
SHA19d4378b66e2be1fad86098a540670de671229d29
SHA256480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1
SHA512959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a
-
Filesize
26KB
MD5c8f519a43c76c60e8cbab32da4b85a13
SHA19d4378b66e2be1fad86098a540670de671229d29
SHA256480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1
SHA512959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a
-
Filesize
26KB
MD5c8f519a43c76c60e8cbab32da4b85a13
SHA19d4378b66e2be1fad86098a540670de671229d29
SHA256480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1
SHA512959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a
-
Filesize
26KB
MD5c8f519a43c76c60e8cbab32da4b85a13
SHA19d4378b66e2be1fad86098a540670de671229d29
SHA256480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1
SHA512959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a
-
Filesize
9B
MD5e2742b3f8546170da6c8260d83888060
SHA1ec4a745e18cde4c927f9730e3fcd45ef70af6fb9
SHA256f3d078bebcd8afbc9b72b18b103ded277477821ac1e41595bcef62e69536b50d
SHA5123dcd2e307dda0423ada567825cca9eed0d271c9f2ce4220b2009cd63a0f569f6c9761083aa631ade7fef7e7b9f22aa2c158d804275220d991a3ca11cff1dfbac
-
\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
Filesize20KB
MD546eff666c94e3f7cf93ce87feb23af51
SHA1fdb4d2878166c547b4fb61996f673ae345c2415c
SHA2565115438f3279d97dfef6f319688c0b154ed0e62a55dd8e8dc6cc370a4e1aa742
SHA5126f7db660cde8a89c11f7202f720d9805d1cddeb34013bf96cc400378a31e8c0af45ed681a45ed7a1c261c9c6d93504167519f2e91cc90f6afbde636cb881486b
-
\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
Filesize20KB
MD546eff666c94e3f7cf93ce87feb23af51
SHA1fdb4d2878166c547b4fb61996f673ae345c2415c
SHA2565115438f3279d97dfef6f319688c0b154ed0e62a55dd8e8dc6cc370a4e1aa742
SHA5126f7db660cde8a89c11f7202f720d9805d1cddeb34013bf96cc400378a31e8c0af45ed681a45ed7a1c261c9c6d93504167519f2e91cc90f6afbde636cb881486b