Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe
Resource
win10v2004-20230703-en
General
-
Target
12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe
-
Size
324KB
-
MD5
1f35593dde298a212efcba3306c9b68a
-
SHA1
fafba4f5c116f38ea20402f74460c92261af1fe1
-
SHA256
12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5
-
SHA512
58e5ef5eb1f8c7c955a3cd652eaa7c8f42953d4b9f5dd4f2215ffee3f194b1e0aa8f543f50563f8d8d96b9f6b209d4144d564b87f37323a678b8fa4af50d44f8
-
SSDEEP
6144:YVfjmNiuxCSgxJtz5lAUbLUfiakbNTBBbTRxcbEMMcDN7Y7tcqGn6R43/:C7+SxlXUfrkJTLbTRxW1Mcp7YJhGnb3/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 800 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2848 Logo1_.exe 2736 12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe -
Loads dropped DLL 1 IoCs
pid Process 800 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Slate\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.WW\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proofing.en-us\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE Logo1_.exe File created C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\OneNote.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe File created C:\Windows\Logo1_.exe 12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1448 wrote to memory of 800 1448 12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe 28 PID 1448 wrote to memory of 800 1448 12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe 28 PID 1448 wrote to memory of 800 1448 12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe 28 PID 1448 wrote to memory of 800 1448 12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe 28 PID 1448 wrote to memory of 2848 1448 12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe 30 PID 1448 wrote to memory of 2848 1448 12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe 30 PID 1448 wrote to memory of 2848 1448 12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe 30 PID 1448 wrote to memory of 2848 1448 12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe 30 PID 2848 wrote to memory of 1528 2848 Logo1_.exe 31 PID 2848 wrote to memory of 1528 2848 Logo1_.exe 31 PID 2848 wrote to memory of 1528 2848 Logo1_.exe 31 PID 2848 wrote to memory of 1528 2848 Logo1_.exe 31 PID 1528 wrote to memory of 3004 1528 net.exe 33 PID 1528 wrote to memory of 3004 1528 net.exe 33 PID 1528 wrote to memory of 3004 1528 net.exe 33 PID 1528 wrote to memory of 3004 1528 net.exe 33 PID 800 wrote to memory of 2736 800 cmd.exe 34 PID 800 wrote to memory of 2736 800 cmd.exe 34 PID 800 wrote to memory of 2736 800 cmd.exe 34 PID 800 wrote to memory of 2736 800 cmd.exe 34 PID 2848 wrote to memory of 1276 2848 Logo1_.exe 21 PID 2848 wrote to memory of 1276 2848 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe"C:\Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a824A.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe"C:\Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe"4⤵
- Executes dropped EXE
PID:2736
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3004
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5b00440d6bd7b7056c3aed427243db648
SHA17f050fe9842b51432dc9dd8c6c6fd0bdc7e01d22
SHA2564482a95202b4fdf65ff0eb2393263c0a279beb3b2daadfe5e5587d68d0d13531
SHA5120faad1642e0074df2d6d19b36fdbd248bea2b34e770eaccc580ae69cdc39c1c6eb910966d0560225825ecc9d0fe482becb2266772c71d3f95c40967713031c07
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD50fe93e0f4105d5a94fc817fe889fa879
SHA17578f1b998245788022a06489ca5cd4f86109e48
SHA25667454b09c7435aeb179271347cafe9b2149485432007416e29bb5b8e13007d93
SHA5129342e428c2142164085174a3e9b095a74465b0544652af262b48d4798f28911277493bade4839cc8e38db0c78ba05ffccbd6ac6b0a72a00c3c92f8676cf127a6
-
Filesize
722B
MD50fe93e0f4105d5a94fc817fe889fa879
SHA17578f1b998245788022a06489ca5cd4f86109e48
SHA25667454b09c7435aeb179271347cafe9b2149485432007416e29bb5b8e13007d93
SHA5129342e428c2142164085174a3e9b095a74465b0544652af262b48d4798f28911277493bade4839cc8e38db0c78ba05ffccbd6ac6b0a72a00c3c92f8676cf127a6
-
C:\Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe
Filesize298KB
MD54ff9b36894a7222a67cd8872ecce1596
SHA110c2688097d85d75116bbba019c141ed0c5bd540
SHA2560baca8c2a891b818d3474ed09e2b6f474577e4fdcdb966c259c608840f04b39f
SHA512475cec734952c44c9765978ed4727cc8a4fe3150494fd1bc60fb27e999d93829f6fb4f40ff1fcb2b2fd877e15092ec4e3cbfc1b37fc974beaea17ae7cc2cd07f
-
C:\Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe.exe
Filesize298KB
MD54ff9b36894a7222a67cd8872ecce1596
SHA110c2688097d85d75116bbba019c141ed0c5bd540
SHA2560baca8c2a891b818d3474ed09e2b6f474577e4fdcdb966c259c608840f04b39f
SHA512475cec734952c44c9765978ed4727cc8a4fe3150494fd1bc60fb27e999d93829f6fb4f40ff1fcb2b2fd877e15092ec4e3cbfc1b37fc974beaea17ae7cc2cd07f
-
Filesize
26KB
MD546e5336e3ad9242352c0c3d72b6efb6d
SHA1d825c1883bafe2ac98918da291276dadd1a2f41f
SHA2561acd6390b27823123eb5e7e86dbf654aed0cb37362c1e72dc768fa404aa628d3
SHA512df93feae99900e6876df0b6e8cccf798ecbcb88267f76b3d4a9626c7ce400bcfc86b7d2838747087b7860f2eb254464f177be2e7386f4176cdf0f9e40e01c0a4
-
Filesize
26KB
MD546e5336e3ad9242352c0c3d72b6efb6d
SHA1d825c1883bafe2ac98918da291276dadd1a2f41f
SHA2561acd6390b27823123eb5e7e86dbf654aed0cb37362c1e72dc768fa404aa628d3
SHA512df93feae99900e6876df0b6e8cccf798ecbcb88267f76b3d4a9626c7ce400bcfc86b7d2838747087b7860f2eb254464f177be2e7386f4176cdf0f9e40e01c0a4
-
Filesize
26KB
MD546e5336e3ad9242352c0c3d72b6efb6d
SHA1d825c1883bafe2ac98918da291276dadd1a2f41f
SHA2561acd6390b27823123eb5e7e86dbf654aed0cb37362c1e72dc768fa404aa628d3
SHA512df93feae99900e6876df0b6e8cccf798ecbcb88267f76b3d4a9626c7ce400bcfc86b7d2838747087b7860f2eb254464f177be2e7386f4176cdf0f9e40e01c0a4
-
Filesize
26KB
MD546e5336e3ad9242352c0c3d72b6efb6d
SHA1d825c1883bafe2ac98918da291276dadd1a2f41f
SHA2561acd6390b27823123eb5e7e86dbf654aed0cb37362c1e72dc768fa404aa628d3
SHA512df93feae99900e6876df0b6e8cccf798ecbcb88267f76b3d4a9626c7ce400bcfc86b7d2838747087b7860f2eb254464f177be2e7386f4176cdf0f9e40e01c0a4
-
Filesize
9B
MD5c0232c2f01c543d260713210da47a57b
SHA163f2c13c2c5c83091133c2802e69993d52e3ec65
SHA256278e1b8fd3f40d95faaecf548098b8d9ee4b32e98a8878559c8c8dfcd5cd1197
SHA5122ccfd67393a63f03f588296bb798d7a7d4ec2ea5d6ac486cb7bdf8a5a66b1df944d8b548f317e58bfe17dea2ae54e536ffe77bc11a43c931f3d10e299ab3fca0
-
\Users\Admin\AppData\Local\Temp\12eea51a19b536c34e68c5298bb45e8ddcea65e15ccc6501bd46b19af90b23c5.exe
Filesize298KB
MD54ff9b36894a7222a67cd8872ecce1596
SHA110c2688097d85d75116bbba019c141ed0c5bd540
SHA2560baca8c2a891b818d3474ed09e2b6f474577e4fdcdb966c259c608840f04b39f
SHA512475cec734952c44c9765978ed4727cc8a4fe3150494fd1bc60fb27e999d93829f6fb4f40ff1fcb2b2fd877e15092ec4e3cbfc1b37fc974beaea17ae7cc2cd07f