Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/08/2023, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe
Resource
win10v2004-20230703-en
General
-
Target
3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe
-
Size
137KB
-
MD5
e400f8c5e64b9ba4c1ebcadeae338ae5
-
SHA1
b03fb476aff7fac14b6e8fb706c844fd54f8b95a
-
SHA256
3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12
-
SHA512
9518c94b80d62bd39e41eb7888da60c1c0dfd0280e88337cb84e583f729ba89e97173479c4378056b6b15043f827701f1ce7c0e1aac6ced9f8fc2496d8d4f260
-
SSDEEP
3072:CMftffjmN8dbyxzDs10QEE6ATFGRs/Fh8Of20twqj:CUVfjmNM+xzAqERTU6Fh8OfOqj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1496 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2248 Logo1_.exe 2340 3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe -
Loads dropped DLL 1 IoCs
pid Process 1496 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\STS2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\InfoPathOMFormServicesV12\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe File created C:\Windows\Logo1_.exe 3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2248 Logo1_.exe 2248 Logo1_.exe 2248 Logo1_.exe 2248 Logo1_.exe 2248 Logo1_.exe 2248 Logo1_.exe 2248 Logo1_.exe 2248 Logo1_.exe 2248 Logo1_.exe 2248 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1496 1600 3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe 28 PID 1600 wrote to memory of 1496 1600 3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe 28 PID 1600 wrote to memory of 1496 1600 3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe 28 PID 1600 wrote to memory of 1496 1600 3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe 28 PID 1600 wrote to memory of 2248 1600 3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe 30 PID 1600 wrote to memory of 2248 1600 3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe 30 PID 1600 wrote to memory of 2248 1600 3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe 30 PID 1600 wrote to memory of 2248 1600 3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe 30 PID 2248 wrote to memory of 2592 2248 Logo1_.exe 31 PID 2248 wrote to memory of 2592 2248 Logo1_.exe 31 PID 2248 wrote to memory of 2592 2248 Logo1_.exe 31 PID 2248 wrote to memory of 2592 2248 Logo1_.exe 31 PID 1496 wrote to memory of 2340 1496 cmd.exe 33 PID 1496 wrote to memory of 2340 1496 cmd.exe 33 PID 1496 wrote to memory of 2340 1496 cmd.exe 33 PID 1496 wrote to memory of 2340 1496 cmd.exe 33 PID 2592 wrote to memory of 2504 2592 net.exe 34 PID 2592 wrote to memory of 2504 2592 net.exe 34 PID 2592 wrote to memory of 2504 2592 net.exe 34 PID 2592 wrote to memory of 2504 2592 net.exe 34 PID 2248 wrote to memory of 1376 2248 Logo1_.exe 13 PID 2248 wrote to memory of 1376 2248 Logo1_.exe 13
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe"C:\Users\Admin\AppData\Local\Temp\3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aCA9F.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe"C:\Users\Admin\AppData\Local\Temp\3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe"4⤵
- Executes dropped EXE
PID:2340
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2504
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5299ab7dbaeb02447f377af6a205c48f8
SHA100ca08a1744471210b83edb2dbbd88223fe1edce
SHA256bd8886ea6cffa00bb88a3bf690aee0944e9c3fbe6a4cbf382c58993381278362
SHA51282ad942b87226bb545120b3972ad4e90fcf9068e58f61943b4dc447e490a3c5233b55ee8abc9a493b9be13e07cb3662bae2d26f409c6c3b4539d58b940047f7f
-
Filesize
722B
MD576f26769546c3481c9f2f995e523af41
SHA1812d40b879a17a478d018ba41726ab27da1d6ead
SHA256e2795bae333701ce813de8b4cb29f64f15273daf7fd8a2cc9a40713674dc4498
SHA51244e88cbe840a8f3bb35e8bce4f8fec6a287b82197bec4fb2d9f33bbd82792ed74a717549a1a7f3e13625c2727dfa20a95cef955e80cb3dd0cff50ff2691742fb
-
Filesize
722B
MD576f26769546c3481c9f2f995e523af41
SHA1812d40b879a17a478d018ba41726ab27da1d6ead
SHA256e2795bae333701ce813de8b4cb29f64f15273daf7fd8a2cc9a40713674dc4498
SHA51244e88cbe840a8f3bb35e8bce4f8fec6a287b82197bec4fb2d9f33bbd82792ed74a717549a1a7f3e13625c2727dfa20a95cef955e80cb3dd0cff50ff2691742fb
-
C:\Users\Admin\AppData\Local\Temp\3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe
Filesize110KB
MD534e1cc36388a755a38492c7f932b5257
SHA1847b4f43d627bfe7c35ddfba20aed4d93001f6cc
SHA256c4366e7e84950feb88c77325cde96923e0487af3ca8bae9aa5cb0077f0763f46
SHA5121b6ba8276b8f7d1ae69739394182e10196fcd6c0a9c1b41fe553e570848a7f248e68958d634ee83f5efe87e3a01fc3448066e6a7821ab1e3590ff9584f5f8df5
-
C:\Users\Admin\AppData\Local\Temp\3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe.exe
Filesize110KB
MD534e1cc36388a755a38492c7f932b5257
SHA1847b4f43d627bfe7c35ddfba20aed4d93001f6cc
SHA256c4366e7e84950feb88c77325cde96923e0487af3ca8bae9aa5cb0077f0763f46
SHA5121b6ba8276b8f7d1ae69739394182e10196fcd6c0a9c1b41fe553e570848a7f248e68958d634ee83f5efe87e3a01fc3448066e6a7821ab1e3590ff9584f5f8df5
-
Filesize
26KB
MD5bcba863fad08b47d4a766181d455e05f
SHA1d155fc0a4769bd10b1bdf2b582c4973dbdb8d15c
SHA25640cf326f6c0152dc5fa9dfe0b2314e273d858ba3f6b18fd534d924604ddf55f7
SHA5121dbec3b132c9bd0e5fb8da83d1e567db061eb2362da1fb339c5eef6a464ab4f69d625c2492c237262090f20b7fc2adc11fc362d2540bd955ecbbd85602e8c093
-
Filesize
26KB
MD5bcba863fad08b47d4a766181d455e05f
SHA1d155fc0a4769bd10b1bdf2b582c4973dbdb8d15c
SHA25640cf326f6c0152dc5fa9dfe0b2314e273d858ba3f6b18fd534d924604ddf55f7
SHA5121dbec3b132c9bd0e5fb8da83d1e567db061eb2362da1fb339c5eef6a464ab4f69d625c2492c237262090f20b7fc2adc11fc362d2540bd955ecbbd85602e8c093
-
Filesize
26KB
MD5bcba863fad08b47d4a766181d455e05f
SHA1d155fc0a4769bd10b1bdf2b582c4973dbdb8d15c
SHA25640cf326f6c0152dc5fa9dfe0b2314e273d858ba3f6b18fd534d924604ddf55f7
SHA5121dbec3b132c9bd0e5fb8da83d1e567db061eb2362da1fb339c5eef6a464ab4f69d625c2492c237262090f20b7fc2adc11fc362d2540bd955ecbbd85602e8c093
-
Filesize
26KB
MD5bcba863fad08b47d4a766181d455e05f
SHA1d155fc0a4769bd10b1bdf2b582c4973dbdb8d15c
SHA25640cf326f6c0152dc5fa9dfe0b2314e273d858ba3f6b18fd534d924604ddf55f7
SHA5121dbec3b132c9bd0e5fb8da83d1e567db061eb2362da1fb339c5eef6a464ab4f69d625c2492c237262090f20b7fc2adc11fc362d2540bd955ecbbd85602e8c093
-
Filesize
9B
MD54a4922bdf377baedb0460540a7e52405
SHA182789c7c3ee038da34ac62e38ddde0fe667d52ac
SHA256589848447b17adf03dfa9db6e17b5ec00d1fabf203fa496bae29ed64764a052f
SHA512fe635f97709f5f3df9290c6c53a374351481f13aa45105f48fe3709c15532313eb4d032eed20f2a278b9837c84bba9ba7a7fa2d83cd2a1e3adc0bc930d40c2a1
-
\Users\Admin\AppData\Local\Temp\3ad611e6dc108e6ebdc9b8baf0ed446d78cf4f1018a22906e83b8170ace10f12.exe
Filesize110KB
MD534e1cc36388a755a38492c7f932b5257
SHA1847b4f43d627bfe7c35ddfba20aed4d93001f6cc
SHA256c4366e7e84950feb88c77325cde96923e0487af3ca8bae9aa5cb0077f0763f46
SHA5121b6ba8276b8f7d1ae69739394182e10196fcd6c0a9c1b41fe553e570848a7f248e68958d634ee83f5efe87e3a01fc3448066e6a7821ab1e3590ff9584f5f8df5