Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/09/2023, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe
Resource
win10v2004-20230831-en
General
-
Target
5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe
-
Size
553KB
-
MD5
9e8d4831830ae5adf60857656659a9e7
-
SHA1
9a5a9f255f26d32762429c76160cc4de7a7c2a3a
-
SHA256
5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb
-
SHA512
b652d17bd708beb75d1944666d4544f01dac89e2e787ba24608c31bbf61c8ed908420fae5a7a34b3ce6d083b179f0646969727bcee60890614da925224548025
-
SSDEEP
6144:V9TuJbruuAVc13OKegKtK1nOEThioZsqmUfAf0J6eYKpWldq1Jg:b9a13OHgztjZ6yIq1m
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2816 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1868 Logo1_.exe 2740 5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe -
Loads dropped DLL 1 IoCs
pid Process 2816 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe Logo1_.exe File created C:\Program Files\Windows Journal\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Lime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\{11BE85C4-FDB6-4044-BF89-B05107AB6512}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Slate\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\QUAD\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe File created C:\Windows\Logo1_.exe 5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1868 Logo1_.exe 1868 Logo1_.exe 1868 Logo1_.exe 1868 Logo1_.exe 1868 Logo1_.exe 1868 Logo1_.exe 1868 Logo1_.exe 1868 Logo1_.exe 1868 Logo1_.exe 1868 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2816 2436 5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe 28 PID 2436 wrote to memory of 2816 2436 5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe 28 PID 2436 wrote to memory of 2816 2436 5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe 28 PID 2436 wrote to memory of 2816 2436 5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe 28 PID 2436 wrote to memory of 1868 2436 5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe 30 PID 2436 wrote to memory of 1868 2436 5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe 30 PID 2436 wrote to memory of 1868 2436 5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe 30 PID 2436 wrote to memory of 1868 2436 5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe 30 PID 1868 wrote to memory of 2784 1868 Logo1_.exe 31 PID 1868 wrote to memory of 2784 1868 Logo1_.exe 31 PID 1868 wrote to memory of 2784 1868 Logo1_.exe 31 PID 1868 wrote to memory of 2784 1868 Logo1_.exe 31 PID 2784 wrote to memory of 2920 2784 net.exe 33 PID 2784 wrote to memory of 2920 2784 net.exe 33 PID 2784 wrote to memory of 2920 2784 net.exe 33 PID 2784 wrote to memory of 2920 2784 net.exe 33 PID 2816 wrote to memory of 2740 2816 cmd.exe 34 PID 2816 wrote to memory of 2740 2816 cmd.exe 34 PID 2816 wrote to memory of 2740 2816 cmd.exe 34 PID 2816 wrote to memory of 2740 2816 cmd.exe 34 PID 1868 wrote to memory of 1252 1868 Logo1_.exe 20 PID 1868 wrote to memory of 1252 1868 Logo1_.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe"C:\Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4692.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe"C:\Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe"3⤵
- Executes dropped EXE
PID:2740
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2920
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5568f17750238ab463c745953a303648a
SHA125e9de37d6edb52c584c442e4f93a0448b4b37d4
SHA2565351b82387339c78b116a077f2ba633da2a6fef86a165d92bfe28c2c3770ac81
SHA5129034bc060e8155e07009d2142830f03b29c50525232fa1719038eae4fc742d460c5dad7b7fdd6957264c338072fbe71193a23d994510dc809ae240023b9f1ed3
-
Filesize
474KB
MD582d95ff3c368229d3ecd547bfc2e95e4
SHA105c2c8065f243260792924168f85c614057119e8
SHA2565fd8262ebaf159fa1ba5a2b80dad6f98477d1f549a651fc1a327f0dd207f2fdb
SHA51227815b93d6070f7026c23ceac6210a78e694616d6a6a2012369b271e2d2ec986438f80dd3a29db4c4419b08084cb5a5914af216177669b86d8e2ae7184691699
-
Filesize
722B
MD599ed722be4da29df26574fad88bdc79d
SHA114c663e78ceaf22218a64be330f7120d97634d84
SHA256cd4c19e5b7c63f2b6504d3a2a3afaa2e794c6348bb64bcd5acb5b5d7eb03b93c
SHA512e4f40aa9b4064b6d3938b8a67bfb803d08caf925e77bfc22786ab8c5608b9ad77f5fa2d15eb18a38b3085e41fb921a518c163f1fc27ff33d143cdd02525d5d0b
-
Filesize
722B
MD599ed722be4da29df26574fad88bdc79d
SHA114c663e78ceaf22218a64be330f7120d97634d84
SHA256cd4c19e5b7c63f2b6504d3a2a3afaa2e794c6348bb64bcd5acb5b5d7eb03b93c
SHA512e4f40aa9b4064b6d3938b8a67bfb803d08caf925e77bfc22786ab8c5608b9ad77f5fa2d15eb18a38b3085e41fb921a518c163f1fc27ff33d143cdd02525d5d0b
-
C:\Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe
Filesize524KB
MD57e082b8ab985d73267fa0ad76f12db93
SHA14dab44724431dc743aaac4762575e9d38084d55a
SHA256227c925e1dafa0c48fbee542678064c6718124fd02a0b8f656987fe8646298ec
SHA512f6286c1426f3ebde192a300822593a1c9fa6c26e09b5068b44630d10e1c33001bb42467a08f92c884a49dbdcff2cffe5721359ec044cb6b89c09c8622da65823
-
C:\Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe.exe
Filesize524KB
MD57e082b8ab985d73267fa0ad76f12db93
SHA14dab44724431dc743aaac4762575e9d38084d55a
SHA256227c925e1dafa0c48fbee542678064c6718124fd02a0b8f656987fe8646298ec
SHA512f6286c1426f3ebde192a300822593a1c9fa6c26e09b5068b44630d10e1c33001bb42467a08f92c884a49dbdcff2cffe5721359ec044cb6b89c09c8622da65823
-
Filesize
29KB
MD5a0a84e76a495cbe3dd66615625e80be3
SHA1e17712c6939d13dc78aa8306871ff685c9cf00b5
SHA256908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d
SHA512b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2
-
Filesize
29KB
MD5a0a84e76a495cbe3dd66615625e80be3
SHA1e17712c6939d13dc78aa8306871ff685c9cf00b5
SHA256908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d
SHA512b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2
-
Filesize
29KB
MD5a0a84e76a495cbe3dd66615625e80be3
SHA1e17712c6939d13dc78aa8306871ff685c9cf00b5
SHA256908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d
SHA512b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2
-
Filesize
29KB
MD5a0a84e76a495cbe3dd66615625e80be3
SHA1e17712c6939d13dc78aa8306871ff685c9cf00b5
SHA256908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d
SHA512b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2
-
Filesize
8B
MD5621383aab05ec88688f5cce893e26550
SHA103967cdd69bd47cd2ccede557778546ef7c015eb
SHA2560992c9b2d0872dece2ee570393745ccb6fbeadc2ded371a1f5406447aa872360
SHA512085e0e3da3ad9ebb7b05ad58803f979ad4873337f91e4e0f209756ecf02b5050e33c3ad4a38212308e8beaf1f81625003f28bdc52d41cb2853e8f5a7eeb7a18b
-
\Users\Admin\AppData\Local\Temp\5c03de90490c03b180df0fbb66a60da11f14cd512b79a19d9a86cfd2fa7772fb.exe
Filesize524KB
MD57e082b8ab985d73267fa0ad76f12db93
SHA14dab44724431dc743aaac4762575e9d38084d55a
SHA256227c925e1dafa0c48fbee542678064c6718124fd02a0b8f656987fe8646298ec
SHA512f6286c1426f3ebde192a300822593a1c9fa6c26e09b5068b44630d10e1c33001bb42467a08f92c884a49dbdcff2cffe5721359ec044cb6b89c09c8622da65823