Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22/08/2023, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe
Resource
win10v2004-20230703-en
General
-
Target
badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe
-
Size
61KB
-
MD5
2f8ab388bb2c9c5dd9833b755241b8d2
-
SHA1
a9bca13e1bfff683ee6a1cf65412e884ffbe95bd
-
SHA256
badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0
-
SHA512
3393464f51e653fcb15742ded933635ce2ae52243fab2b2460777e0571cda04e1fb3fed661078629a9a8be766855461eca37aa2fc1f06864d84c44ea2f2a89bd
-
SSDEEP
1536:T43SHuJV9QaxSzc1kVQctbHB1gTXL7heiEE:T4kuJVFSqctbHB1ufQJE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2404 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1992 Logo1_.exe 2164 badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe -
Loads dropped DLL 1 IoCs
pid Process 2404 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\plugins\logger\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Oasis\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe File created C:\Windows\Logo1_.exe badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1992 Logo1_.exe 1992 Logo1_.exe 1992 Logo1_.exe 1992 Logo1_.exe 1992 Logo1_.exe 1992 Logo1_.exe 1992 Logo1_.exe 1992 Logo1_.exe 1992 Logo1_.exe 1992 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2404 2212 badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe 30 PID 2212 wrote to memory of 2404 2212 badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe 30 PID 2212 wrote to memory of 2404 2212 badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe 30 PID 2212 wrote to memory of 2404 2212 badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe 30 PID 2212 wrote to memory of 1992 2212 badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe 32 PID 2212 wrote to memory of 1992 2212 badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe 32 PID 2212 wrote to memory of 1992 2212 badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe 32 PID 2212 wrote to memory of 1992 2212 badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe 32 PID 2404 wrote to memory of 2164 2404 cmd.exe 34 PID 2404 wrote to memory of 2164 2404 cmd.exe 34 PID 2404 wrote to memory of 2164 2404 cmd.exe 34 PID 2404 wrote to memory of 2164 2404 cmd.exe 34 PID 1992 wrote to memory of 1640 1992 Logo1_.exe 33 PID 1992 wrote to memory of 1640 1992 Logo1_.exe 33 PID 1992 wrote to memory of 1640 1992 Logo1_.exe 33 PID 1992 wrote to memory of 1640 1992 Logo1_.exe 33 PID 1640 wrote to memory of 2428 1640 net.exe 36 PID 1640 wrote to memory of 2428 1640 net.exe 36 PID 1640 wrote to memory of 2428 1640 net.exe 36 PID 1640 wrote to memory of 2428 1640 net.exe 36 PID 1992 wrote to memory of 1348 1992 Logo1_.exe 20 PID 1992 wrote to memory of 1348 1992 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe"C:\Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aEC42.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe"C:\Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe"4⤵
- Executes dropped EXE
PID:2164
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2428
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD55427c8355686e9236966d4dcd2119f7d
SHA1441677316f5b657a05982f73fce0c439e7155a44
SHA256678007290f0ed12852fcdeb88dd9cdb7b40913508d8cc9772cfcb40a7e217936
SHA51267cdc1309d3e076088b3d16875b92f2bd0f060576441319e325560eca7d7c5f0afd15165cc76f49887fff67c869c5c835925d81288ad2add23d0d89a5647f97b
-
Filesize
722B
MD539f3441cd1eef35bab4eb356d2cabe2c
SHA18ce3de8e23c10a011342869caadd5d468fe21e26
SHA256a7eb87290344a3800cea02bb98c5328d002449999263404fce5e602085c5020c
SHA5125941ac4eaacf7873deb2ecd408467fc9ac7bf8ff2a6aaf38981026b585ac1bb107cedc0390b2f54fc636ca4af5c1d180b8660a313f623a18642a41be8cccf59c
-
Filesize
722B
MD539f3441cd1eef35bab4eb356d2cabe2c
SHA18ce3de8e23c10a011342869caadd5d468fe21e26
SHA256a7eb87290344a3800cea02bb98c5328d002449999263404fce5e602085c5020c
SHA5125941ac4eaacf7873deb2ecd408467fc9ac7bf8ff2a6aaf38981026b585ac1bb107cedc0390b2f54fc636ca4af5c1d180b8660a313f623a18642a41be8cccf59c
-
C:\Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe
Filesize32KB
MD53de16cea01950aac6a7a5eeb8cb102b0
SHA1c89dd3ce02600d1ef68a83e85947d7e8c4e62cc8
SHA256cd60e89b2ff2743bad3c298ab6f44e005e4986413d1cf97bede0185ac3f12280
SHA5127120b8226aac32933bc1561b432093422a4d708b3c75bd4eea506f7f6586b0014ce2debf7da71874947274632db6f7ffd67b5ec0c88dd9d8f2ecff0b34e12df2
-
C:\Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe.exe
Filesize32KB
MD53de16cea01950aac6a7a5eeb8cb102b0
SHA1c89dd3ce02600d1ef68a83e85947d7e8c4e62cc8
SHA256cd60e89b2ff2743bad3c298ab6f44e005e4986413d1cf97bede0185ac3f12280
SHA5127120b8226aac32933bc1561b432093422a4d708b3c75bd4eea506f7f6586b0014ce2debf7da71874947274632db6f7ffd67b5ec0c88dd9d8f2ecff0b34e12df2
-
Filesize
29KB
MD5243b2978a3e87c6a237767247bbbf6ef
SHA1b592a11def8ab37d926ab4bc5601aaf1fc852c2a
SHA256ea5e030c047d36a2bd930bd50153e3bf228e7644a3e30ce24bc9cb0f92f48a9c
SHA512f8a617e6c1b790984b8df091938966b68916033b596b0fad51e2c19e0f33ccead7fe35032d0b8db2747fa20f065b87b36226c15e7e46eef73686699f142d71f6
-
Filesize
29KB
MD5243b2978a3e87c6a237767247bbbf6ef
SHA1b592a11def8ab37d926ab4bc5601aaf1fc852c2a
SHA256ea5e030c047d36a2bd930bd50153e3bf228e7644a3e30ce24bc9cb0f92f48a9c
SHA512f8a617e6c1b790984b8df091938966b68916033b596b0fad51e2c19e0f33ccead7fe35032d0b8db2747fa20f065b87b36226c15e7e46eef73686699f142d71f6
-
Filesize
29KB
MD5243b2978a3e87c6a237767247bbbf6ef
SHA1b592a11def8ab37d926ab4bc5601aaf1fc852c2a
SHA256ea5e030c047d36a2bd930bd50153e3bf228e7644a3e30ce24bc9cb0f92f48a9c
SHA512f8a617e6c1b790984b8df091938966b68916033b596b0fad51e2c19e0f33ccead7fe35032d0b8db2747fa20f065b87b36226c15e7e46eef73686699f142d71f6
-
Filesize
29KB
MD5243b2978a3e87c6a237767247bbbf6ef
SHA1b592a11def8ab37d926ab4bc5601aaf1fc852c2a
SHA256ea5e030c047d36a2bd930bd50153e3bf228e7644a3e30ce24bc9cb0f92f48a9c
SHA512f8a617e6c1b790984b8df091938966b68916033b596b0fad51e2c19e0f33ccead7fe35032d0b8db2747fa20f065b87b36226c15e7e46eef73686699f142d71f6
-
Filesize
9B
MD5e2742b3f8546170da6c8260d83888060
SHA1ec4a745e18cde4c927f9730e3fcd45ef70af6fb9
SHA256f3d078bebcd8afbc9b72b18b103ded277477821ac1e41595bcef62e69536b50d
SHA5123dcd2e307dda0423ada567825cca9eed0d271c9f2ce4220b2009cd63a0f569f6c9761083aa631ade7fef7e7b9f22aa2c158d804275220d991a3ca11cff1dfbac
-
\Users\Admin\AppData\Local\Temp\badf669f5978cb57fc19ae2e6b0c07982cefe23381a3e3976a93ff334ba442e0.exe
Filesize32KB
MD53de16cea01950aac6a7a5eeb8cb102b0
SHA1c89dd3ce02600d1ef68a83e85947d7e8c4e62cc8
SHA256cd60e89b2ff2743bad3c298ab6f44e005e4986413d1cf97bede0185ac3f12280
SHA5127120b8226aac32933bc1561b432093422a4d708b3c75bd4eea506f7f6586b0014ce2debf7da71874947274632db6f7ffd67b5ec0c88dd9d8f2ecff0b34e12df2