Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe
Resource
win10v2004-20230703-en
General
-
Target
9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe
-
Size
271KB
-
MD5
46e9e8be2076e9e00ccebef922ac66a8
-
SHA1
de9f37c87d6fec9afba149cc25bc8f954104fabd
-
SHA256
9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2
-
SHA512
6df42bb3bf84b5456195351a51220dfd98c3522b78e68f7097a76d3e31d448c41a8f2720611b78f5a9ccec7d3929428b0fb47da942373300098ca1fd53da3988
-
SSDEEP
6144:4VfjmNv6iC5/7Z7mEGiin0u9HJAxdrt10xdUy95WkLmzdWsQELvLf884rxJp1Vsu:i7+2lGp0Bk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2092 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2356 Logo1_.exe 2904 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe -
Loads dropped DLL 1 IoCs
pid Process 2092 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.en\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PROPLUS\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe File created C:\Windows\Logo1_.exe 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2092 2272 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 28 PID 2272 wrote to memory of 2092 2272 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 28 PID 2272 wrote to memory of 2092 2272 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 28 PID 2272 wrote to memory of 2092 2272 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 28 PID 2272 wrote to memory of 2356 2272 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 30 PID 2272 wrote to memory of 2356 2272 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 30 PID 2272 wrote to memory of 2356 2272 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 30 PID 2272 wrote to memory of 2356 2272 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 30 PID 2356 wrote to memory of 2860 2356 Logo1_.exe 31 PID 2356 wrote to memory of 2860 2356 Logo1_.exe 31 PID 2356 wrote to memory of 2860 2356 Logo1_.exe 31 PID 2356 wrote to memory of 2860 2356 Logo1_.exe 31 PID 2092 wrote to memory of 2904 2092 cmd.exe 34 PID 2092 wrote to memory of 2904 2092 cmd.exe 34 PID 2092 wrote to memory of 2904 2092 cmd.exe 34 PID 2092 wrote to memory of 2904 2092 cmd.exe 34 PID 2860 wrote to memory of 2900 2860 net.exe 33 PID 2860 wrote to memory of 2900 2860 net.exe 33 PID 2860 wrote to memory of 2900 2860 net.exe 33 PID 2860 wrote to memory of 2900 2860 net.exe 33 PID 2356 wrote to memory of 1200 2356 Logo1_.exe 21 PID 2356 wrote to memory of 1200 2356 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe"C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a7F6D.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe"C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe"4⤵
- Executes dropped EXE
PID:2904
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2900
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5d6fa4af4febadf5acdb9e2307966c048
SHA1d1d5f9269989f1975821acac49d89859faad0cf1
SHA256c84003660b418a35570e293a333750259586e1b3ddec78893a7ccbd26d5c4589
SHA5123397ca12c77bdc2ffc92ae0baeee21ba829123a6c0d033084ac021ff68abef4111a9f6c7fa2cf6664ebed7f03c9f6bff02f22cd923a6fa34120432e6bfec8b1a
-
Filesize
471KB
MD5c6c8fde27f649c91ddaab8cb9ca344a6
SHA15e4865aec432a18107182f47edda176e8c566152
SHA25632c3fed53bfc1d890e9bd1d771fdc7e2c81480e03f1425bce07b4045a192d100
SHA512a8df7d1e852d871d7f16bae10c4ff049359583da88cc85a039f0298525839040d5363ce5ef4cbdb92a12a25785f73df83cf0df07752b78e6e6444f32160a2155
-
Filesize
722B
MD5e175665202ef13d3b1838de375bf4b92
SHA1078bd6b92d3a61da41af41c679b594b95dd0c369
SHA256c7d5408853f7ccc5bd34316c1a106b52d26c42ce9cc21909024bb9673958a04c
SHA5124865b1d0d82f1c7dcc53da8bdb35e9e850d7c2180111ae1148626824420b8e61296172a2b0ff0e82b5ca4981bc7921c8c8948b2d20763c736d21ce47b1f0064f
-
Filesize
722B
MD5e175665202ef13d3b1838de375bf4b92
SHA1078bd6b92d3a61da41af41c679b594b95dd0c369
SHA256c7d5408853f7ccc5bd34316c1a106b52d26c42ce9cc21909024bb9673958a04c
SHA5124865b1d0d82f1c7dcc53da8bdb35e9e850d7c2180111ae1148626824420b8e61296172a2b0ff0e82b5ca4981bc7921c8c8948b2d20763c736d21ce47b1f0064f
-
C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe
Filesize245KB
MD5f1e27bbd3a183c3c4021a792e651bb53
SHA19d7e96b9089584308a23773d4db2404b897c39fa
SHA25665fb354d75fe5d709a58c2f4e2e7e88f01ef8fc5aff80191479def0630783336
SHA512e7bc26c54b0dd190513b787e3d05ac4102e60997468f37c3db3e14e9fe338556635363ec5123a95aeb2513e184330a581b6ab4255d340b745c41e153b0e87203
-
C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe.exe
Filesize245KB
MD5f1e27bbd3a183c3c4021a792e651bb53
SHA19d7e96b9089584308a23773d4db2404b897c39fa
SHA25665fb354d75fe5d709a58c2f4e2e7e88f01ef8fc5aff80191479def0630783336
SHA512e7bc26c54b0dd190513b787e3d05ac4102e60997468f37c3db3e14e9fe338556635363ec5123a95aeb2513e184330a581b6ab4255d340b745c41e153b0e87203
-
Filesize
26KB
MD51c43d4ba8e4a702f49c25855c29bba2d
SHA12571c4428b580e6afbbd2d7fb92bc0c180107d2a
SHA25647f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140
SHA512ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869
-
Filesize
26KB
MD51c43d4ba8e4a702f49c25855c29bba2d
SHA12571c4428b580e6afbbd2d7fb92bc0c180107d2a
SHA25647f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140
SHA512ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869
-
Filesize
26KB
MD51c43d4ba8e4a702f49c25855c29bba2d
SHA12571c4428b580e6afbbd2d7fb92bc0c180107d2a
SHA25647f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140
SHA512ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869
-
Filesize
26KB
MD51c43d4ba8e4a702f49c25855c29bba2d
SHA12571c4428b580e6afbbd2d7fb92bc0c180107d2a
SHA25647f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140
SHA512ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869
-
Filesize
9B
MD5c0232c2f01c543d260713210da47a57b
SHA163f2c13c2c5c83091133c2802e69993d52e3ec65
SHA256278e1b8fd3f40d95faaecf548098b8d9ee4b32e98a8878559c8c8dfcd5cd1197
SHA5122ccfd67393a63f03f588296bb798d7a7d4ec2ea5d6ac486cb7bdf8a5a66b1df944d8b548f317e58bfe17dea2ae54e536ffe77bc11a43c931f3d10e299ab3fca0
-
\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe
Filesize245KB
MD5f1e27bbd3a183c3c4021a792e651bb53
SHA19d7e96b9089584308a23773d4db2404b897c39fa
SHA25665fb354d75fe5d709a58c2f4e2e7e88f01ef8fc5aff80191479def0630783336
SHA512e7bc26c54b0dd190513b787e3d05ac4102e60997468f37c3db3e14e9fe338556635363ec5123a95aeb2513e184330a581b6ab4255d340b745c41e153b0e87203