Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe
Resource
win10v2004-20230703-en
General
-
Target
90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe
-
Size
73KB
-
MD5
9737eabaab648bc92049174a2e50962e
-
SHA1
e08f8b08bd1b5985ce74820a720bcc56f00bc0a7
-
SHA256
90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8
-
SHA512
a09688927076688048fb6f008aabd106f90ade1699c7fccd9c19079f1cb27974869eeab9d99fa74fc876a3a6789da750b8b712490257b0c23f6082ecbad42d93
-
SSDEEP
1536:PfgLdQAQfcfymNUq0DnyvpQ8/g0biDGv0AcutQE:PftffjmNsyvO0gRrAcsH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2968 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3004 Logo1_.exe 2236 90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe -
Loads dropped DLL 2 IoCs
pid Process 2968 cmd.exe 2968 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Oasis\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe File created C:\Windows\Logo1_.exe 90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2968 2792 90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe 28 PID 2792 wrote to memory of 2968 2792 90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe 28 PID 2792 wrote to memory of 2968 2792 90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe 28 PID 2792 wrote to memory of 2968 2792 90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe 28 PID 2792 wrote to memory of 3004 2792 90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe 30 PID 2792 wrote to memory of 3004 2792 90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe 30 PID 2792 wrote to memory of 3004 2792 90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe 30 PID 2792 wrote to memory of 3004 2792 90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe 30 PID 3004 wrote to memory of 2020 3004 Logo1_.exe 31 PID 3004 wrote to memory of 2020 3004 Logo1_.exe 31 PID 3004 wrote to memory of 2020 3004 Logo1_.exe 31 PID 3004 wrote to memory of 2020 3004 Logo1_.exe 31 PID 2020 wrote to memory of 2736 2020 net.exe 33 PID 2020 wrote to memory of 2736 2020 net.exe 33 PID 2020 wrote to memory of 2736 2020 net.exe 33 PID 2020 wrote to memory of 2736 2020 net.exe 33 PID 2968 wrote to memory of 2236 2968 cmd.exe 34 PID 2968 wrote to memory of 2236 2968 cmd.exe 34 PID 2968 wrote to memory of 2236 2968 cmd.exe 34 PID 2968 wrote to memory of 2236 2968 cmd.exe 34 PID 3004 wrote to memory of 1272 3004 Logo1_.exe 21 PID 3004 wrote to memory of 1272 3004 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe"C:\Users\Admin\AppData\Local\Temp\90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a7955.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe"C:\Users\Admin\AppData\Local\Temp\90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe"4⤵
- Executes dropped EXE
PID:2236
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2736
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5f9355d276bece82a92f67e30ddffff08
SHA1b1f764a07e6ce8e450242845b9aaa978267f1259
SHA2562da96256524dc65e3e6a4b837fa793a48be6a69216174c72f8661fbdf50dce22
SHA5121cb5e6fbbaf89804642627f07e1c73230311fe1d28a055dfe551088d7e443dbbf1d93cf8e4c20c198f377ea201bf1aecfa329015202dff4f53ceb58006dcd92a
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5957f05ee7695d8e72b5e504ea9104be8
SHA16e70df98f8cfea20e9bebdb575f5841f1e6e18dd
SHA256f789a875928dbf4d646caecee08992b24314c87e634df0c07eb2068cfc94c331
SHA512d8c24b040cd80bce9d9c2a22049d12731e2f798fa19992624044272bf81c0f562b7d00f3283618ba03e86a34bc80f4eb6ba53ce88fdb348891f2bb8892c6a983
-
Filesize
722B
MD5957f05ee7695d8e72b5e504ea9104be8
SHA16e70df98f8cfea20e9bebdb575f5841f1e6e18dd
SHA256f789a875928dbf4d646caecee08992b24314c87e634df0c07eb2068cfc94c331
SHA512d8c24b040cd80bce9d9c2a22049d12731e2f798fa19992624044272bf81c0f562b7d00f3283618ba03e86a34bc80f4eb6ba53ce88fdb348891f2bb8892c6a983
-
C:\Users\Admin\AppData\Local\Temp\90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe
Filesize47KB
MD568826ea2108df610a59b6590648da99d
SHA1b934e775b7466ae16a920768230f2c6f473b446c
SHA2560fe0b4a2c17b507e77ece9c0c1b27e67ccead9f2bbb0e6efc26dcaccd5dd1b64
SHA5126ea1125a09a1f144c9aa426cf501694976ac3c4a32a31b39658e0298ebca6972bd2e4ae08710f82def7fb72cb096bae8af1b71f0d1a6e260984e36096ea7079c
-
C:\Users\Admin\AppData\Local\Temp\90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe.exe
Filesize47KB
MD568826ea2108df610a59b6590648da99d
SHA1b934e775b7466ae16a920768230f2c6f473b446c
SHA2560fe0b4a2c17b507e77ece9c0c1b27e67ccead9f2bbb0e6efc26dcaccd5dd1b64
SHA5126ea1125a09a1f144c9aa426cf501694976ac3c4a32a31b39658e0298ebca6972bd2e4ae08710f82def7fb72cb096bae8af1b71f0d1a6e260984e36096ea7079c
-
Filesize
26KB
MD557421e0ad6d6cde884d99ac4513935e2
SHA14c3bdbca37bac500488aa23842a4e77a1b65675c
SHA2569b7564d2d24f5a52f4b6c30260dd664ed84aba7d74f383c9051dc493dd2c75b0
SHA5128e5b55bd2bacc14ccc536b63e34dfe39efa8cd17644015c5c3ca99b0dadc678e22e6bc95a6aa03abdb4067516c1c97fb02f0c556e794eef0821cc753d1dddc1e
-
Filesize
26KB
MD557421e0ad6d6cde884d99ac4513935e2
SHA14c3bdbca37bac500488aa23842a4e77a1b65675c
SHA2569b7564d2d24f5a52f4b6c30260dd664ed84aba7d74f383c9051dc493dd2c75b0
SHA5128e5b55bd2bacc14ccc536b63e34dfe39efa8cd17644015c5c3ca99b0dadc678e22e6bc95a6aa03abdb4067516c1c97fb02f0c556e794eef0821cc753d1dddc1e
-
Filesize
26KB
MD557421e0ad6d6cde884d99ac4513935e2
SHA14c3bdbca37bac500488aa23842a4e77a1b65675c
SHA2569b7564d2d24f5a52f4b6c30260dd664ed84aba7d74f383c9051dc493dd2c75b0
SHA5128e5b55bd2bacc14ccc536b63e34dfe39efa8cd17644015c5c3ca99b0dadc678e22e6bc95a6aa03abdb4067516c1c97fb02f0c556e794eef0821cc753d1dddc1e
-
Filesize
26KB
MD557421e0ad6d6cde884d99ac4513935e2
SHA14c3bdbca37bac500488aa23842a4e77a1b65675c
SHA2569b7564d2d24f5a52f4b6c30260dd664ed84aba7d74f383c9051dc493dd2c75b0
SHA5128e5b55bd2bacc14ccc536b63e34dfe39efa8cd17644015c5c3ca99b0dadc678e22e6bc95a6aa03abdb4067516c1c97fb02f0c556e794eef0821cc753d1dddc1e
-
Filesize
9B
MD5ec7139d5bb99bcebaf0b91c58a9ec5aa
SHA170404362dd74e309722fd282c3492ec95674123c
SHA256eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582
SHA512b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48
-
\Users\Admin\AppData\Local\Temp\90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe
Filesize47KB
MD568826ea2108df610a59b6590648da99d
SHA1b934e775b7466ae16a920768230f2c6f473b446c
SHA2560fe0b4a2c17b507e77ece9c0c1b27e67ccead9f2bbb0e6efc26dcaccd5dd1b64
SHA5126ea1125a09a1f144c9aa426cf501694976ac3c4a32a31b39658e0298ebca6972bd2e4ae08710f82def7fb72cb096bae8af1b71f0d1a6e260984e36096ea7079c
-
\Users\Admin\AppData\Local\Temp\90a3c07bb5f9c86790a033a2a9124e66b11e23a2bd481a507d2aa51db3eac7d8.exe
Filesize47KB
MD568826ea2108df610a59b6590648da99d
SHA1b934e775b7466ae16a920768230f2c6f473b446c
SHA2560fe0b4a2c17b507e77ece9c0c1b27e67ccead9f2bbb0e6efc26dcaccd5dd1b64
SHA5126ea1125a09a1f144c9aa426cf501694976ac3c4a32a31b39658e0298ebca6972bd2e4ae08710f82def7fb72cb096bae8af1b71f0d1a6e260984e36096ea7079c