Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe
Resource
win10v2004-20230703-en
General
-
Target
f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe
-
Size
1.2MB
-
MD5
bfd3f91d559172b38b954b86fd6ac252
-
SHA1
62dd42eeb22c0d78f77a9284ca0858479c607eae
-
SHA256
f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30
-
SHA512
53dd099329c93e013ade1c6d35d9ed80acfe01a7055cb23c29d782777f0ff6adff84b04fd99efca41b02e82d9c606968973a9fc7fc433284ba24c92017386082
-
SSDEEP
12288:k7+Lq+e48dJWBKlUgF1J0stz9o4D1DeDecOMehHgSDv0e9+nK+kOFHZz4:k7aqh4AXlU61JTw4DteDNehK5z4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 908 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1388 Logo1_.exe 2016 f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe -
Loads dropped DLL 1 IoCs
pid Process 908 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpenc.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe File created C:\Windows\Logo1_.exe f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1388 Logo1_.exe 1388 Logo1_.exe 1388 Logo1_.exe 1388 Logo1_.exe 1388 Logo1_.exe 1388 Logo1_.exe 1388 Logo1_.exe 1388 Logo1_.exe 1388 Logo1_.exe 1388 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2416 wrote to memory of 908 2416 f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe 28 PID 2416 wrote to memory of 908 2416 f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe 28 PID 2416 wrote to memory of 908 2416 f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe 28 PID 2416 wrote to memory of 908 2416 f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe 28 PID 2416 wrote to memory of 1388 2416 f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe 29 PID 2416 wrote to memory of 1388 2416 f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe 29 PID 2416 wrote to memory of 1388 2416 f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe 29 PID 2416 wrote to memory of 1388 2416 f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe 29 PID 1388 wrote to memory of 2984 1388 Logo1_.exe 31 PID 1388 wrote to memory of 2984 1388 Logo1_.exe 31 PID 1388 wrote to memory of 2984 1388 Logo1_.exe 31 PID 1388 wrote to memory of 2984 1388 Logo1_.exe 31 PID 908 wrote to memory of 2016 908 cmd.exe 34 PID 908 wrote to memory of 2016 908 cmd.exe 34 PID 908 wrote to memory of 2016 908 cmd.exe 34 PID 908 wrote to memory of 2016 908 cmd.exe 34 PID 2984 wrote to memory of 2968 2984 net.exe 33 PID 2984 wrote to memory of 2968 2984 net.exe 33 PID 2984 wrote to memory of 2968 2984 net.exe 33 PID 2984 wrote to memory of 2968 2984 net.exe 33 PID 1388 wrote to memory of 1256 1388 Logo1_.exe 21 PID 1388 wrote to memory of 1256 1388 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe"C:\Users\Admin\AppData\Local\Temp\f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a8298.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe"C:\Users\Admin\AppData\Local\Temp\f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe"4⤵
- Executes dropped EXE
PID:2016
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2968
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5b1c3f529ae9468536e29af683f7f6904
SHA1f8d9912a6b77c1af7ba76c6b0abf1aa6a1297e14
SHA256b654e90b97d92aa8a2cd388bbbe6d704a88cdbf54fdd4d987bd3eb83d8e277ad
SHA512959cd66618192751d4a4b0331b34f2be9931083b05a8e0c3c5f1abd998cae8421db89734ee529fcab1dbb46c6d4ab42139dad01a3554dab482c85a5e988e5213
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD54d8fcd090a0811fe8d9c1854eaa95fe7
SHA130bd71c07d2499e546860a85ed449b744b6e0808
SHA25667188c27be96310628d7e0171903f9c61032ab10fddfae948362fe08c223fabf
SHA512e7590241b7de7748a3c4a148edf681f398d21df8ded059c37bd4a6779c90552849222bdda707feab23acf5a7e6cb611b7c5e71a47245e96f0a375e270e704372
-
Filesize
722B
MD54d8fcd090a0811fe8d9c1854eaa95fe7
SHA130bd71c07d2499e546860a85ed449b744b6e0808
SHA25667188c27be96310628d7e0171903f9c61032ab10fddfae948362fe08c223fabf
SHA512e7590241b7de7748a3c4a148edf681f398d21df8ded059c37bd4a6779c90552849222bdda707feab23acf5a7e6cb611b7c5e71a47245e96f0a375e270e704372
-
C:\Users\Admin\AppData\Local\Temp\f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe
Filesize1.1MB
MD5e4a503435f3b6022248cfa641063c49c
SHA168e2275067ab7b1c0363596efd70dcbfa1e4d4f3
SHA25684f33048177e9fe9dcbd3e1480ff0ce845e351a15f09ecc3484c359079bebad9
SHA512bcdbc7b995177deb0fcc25d4addbdb728be09871639a82b72d77579a0f4c9a43115bea7404cdbd60bfcc63e858642c3b79fa52906a4dd952f05f818ad5339489
-
C:\Users\Admin\AppData\Local\Temp\f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe.exe
Filesize1.1MB
MD5e4a503435f3b6022248cfa641063c49c
SHA168e2275067ab7b1c0363596efd70dcbfa1e4d4f3
SHA25684f33048177e9fe9dcbd3e1480ff0ce845e351a15f09ecc3484c359079bebad9
SHA512bcdbc7b995177deb0fcc25d4addbdb728be09871639a82b72d77579a0f4c9a43115bea7404cdbd60bfcc63e858642c3b79fa52906a4dd952f05f818ad5339489
-
Filesize
26KB
MD5bb142134dd29c56728598cda72900166
SHA1e3039cefc0be0956af41a34276c8aa76dd735f1b
SHA2563065c37d9a533df1f04ea8498a59cfcf26cfe306da649ca89bcfe7597d49d1c7
SHA5128e7e1a78ccc65e48e8c66a09dcf7361fdd86e6d6466c22c50e33c68d6df919675d3b57214c588ae3715508db8b44b5933555a93f311443209217837ea3f4222c
-
Filesize
26KB
MD5bb142134dd29c56728598cda72900166
SHA1e3039cefc0be0956af41a34276c8aa76dd735f1b
SHA2563065c37d9a533df1f04ea8498a59cfcf26cfe306da649ca89bcfe7597d49d1c7
SHA5128e7e1a78ccc65e48e8c66a09dcf7361fdd86e6d6466c22c50e33c68d6df919675d3b57214c588ae3715508db8b44b5933555a93f311443209217837ea3f4222c
-
Filesize
26KB
MD5bb142134dd29c56728598cda72900166
SHA1e3039cefc0be0956af41a34276c8aa76dd735f1b
SHA2563065c37d9a533df1f04ea8498a59cfcf26cfe306da649ca89bcfe7597d49d1c7
SHA5128e7e1a78ccc65e48e8c66a09dcf7361fdd86e6d6466c22c50e33c68d6df919675d3b57214c588ae3715508db8b44b5933555a93f311443209217837ea3f4222c
-
Filesize
26KB
MD5bb142134dd29c56728598cda72900166
SHA1e3039cefc0be0956af41a34276c8aa76dd735f1b
SHA2563065c37d9a533df1f04ea8498a59cfcf26cfe306da649ca89bcfe7597d49d1c7
SHA5128e7e1a78ccc65e48e8c66a09dcf7361fdd86e6d6466c22c50e33c68d6df919675d3b57214c588ae3715508db8b44b5933555a93f311443209217837ea3f4222c
-
Filesize
9B
MD5c0232c2f01c543d260713210da47a57b
SHA163f2c13c2c5c83091133c2802e69993d52e3ec65
SHA256278e1b8fd3f40d95faaecf548098b8d9ee4b32e98a8878559c8c8dfcd5cd1197
SHA5122ccfd67393a63f03f588296bb798d7a7d4ec2ea5d6ac486cb7bdf8a5a66b1df944d8b548f317e58bfe17dea2ae54e536ffe77bc11a43c931f3d10e299ab3fca0
-
\Users\Admin\AppData\Local\Temp\f1f6b19b1d1d8c77b2cb5b0815d5f1e479912a33e1172ff35bbf05a07c1c4f30.exe
Filesize1.1MB
MD5e4a503435f3b6022248cfa641063c49c
SHA168e2275067ab7b1c0363596efd70dcbfa1e4d4f3
SHA25684f33048177e9fe9dcbd3e1480ff0ce845e351a15f09ecc3484c359079bebad9
SHA512bcdbc7b995177deb0fcc25d4addbdb728be09871639a82b72d77579a0f4c9a43115bea7404cdbd60bfcc63e858642c3b79fa52906a4dd952f05f818ad5339489