Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/09/2023, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe
Resource
win10v2004-20230831-en
General
-
Target
2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe
-
Size
606KB
-
MD5
e3bc9ccc7644df0190adfa8d206f2b38
-
SHA1
d33437f0c31f12e0ff0f0cfdd93241540ab6e7fd
-
SHA256
2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671
-
SHA512
29152ead9da272cd479d0c843def4e403cf72e5db4281b1d00bfa9aa0fc5e740eb201c247a06293a6bc5921c2048e60c9490ea7a4ab0b1d1505988167649e368
-
SSDEEP
12288:/p7++i4yNmAvR0DHyBtuiFZe5CnPUI+vfvE6XuFb+m5cPYqYP6aOvSDaI5q:B7Xi4ysMqXuFb+8cPY1P6acSDaP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2464 Logo1_.exe 2764 2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe -
Loads dropped DLL 2 IoCs
pid Process 3008 cmd.exe 3008 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\DESIGNER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\applet\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Biscay\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Slate\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe File created C:\Windows\Logo1_.exe 2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2464 Logo1_.exe 2464 Logo1_.exe 2464 Logo1_.exe 2464 Logo1_.exe 2464 Logo1_.exe 2464 Logo1_.exe 2464 Logo1_.exe 2464 Logo1_.exe 2464 Logo1_.exe 2464 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2040 wrote to memory of 3008 2040 2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe 28 PID 2040 wrote to memory of 3008 2040 2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe 28 PID 2040 wrote to memory of 3008 2040 2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe 28 PID 2040 wrote to memory of 3008 2040 2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe 28 PID 2040 wrote to memory of 2464 2040 2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe 30 PID 2040 wrote to memory of 2464 2040 2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe 30 PID 2040 wrote to memory of 2464 2040 2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe 30 PID 2040 wrote to memory of 2464 2040 2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe 30 PID 2464 wrote to memory of 2184 2464 Logo1_.exe 31 PID 2464 wrote to memory of 2184 2464 Logo1_.exe 31 PID 2464 wrote to memory of 2184 2464 Logo1_.exe 31 PID 2464 wrote to memory of 2184 2464 Logo1_.exe 31 PID 2184 wrote to memory of 2832 2184 net.exe 34 PID 2184 wrote to memory of 2832 2184 net.exe 34 PID 2184 wrote to memory of 2832 2184 net.exe 34 PID 2184 wrote to memory of 2832 2184 net.exe 34 PID 3008 wrote to memory of 2764 3008 cmd.exe 33 PID 3008 wrote to memory of 2764 3008 cmd.exe 33 PID 3008 wrote to memory of 2764 3008 cmd.exe 33 PID 3008 wrote to memory of 2764 3008 cmd.exe 33 PID 2464 wrote to memory of 1212 2464 Logo1_.exe 19 PID 2464 wrote to memory of 1212 2464 Logo1_.exe 19
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe"C:\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4328.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe"C:\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe"4⤵
- Executes dropped EXE
PID:2764
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2832
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD56f8e136610aea78787b73d5e33dc69c8
SHA1a5f2ce0d239bdedbcc203e4d2313cf2eba32901b
SHA256b0af8b222c36a83ae08bed1817cb525cf17fb1c42ae0dbe23226fab5419e6610
SHA512b6f5a3e8b9e7a0ec957a34dc485696b33a951fc9afb96c943ad33b6b4f6bd0a3a60944e7b0bac8e8b2d301ef79aed7cbf1f2e3196cdb2fbf874fdd3540a11ac1
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5eefd8db96f75cdf64ba7ed0f624b08de
SHA15394059ac69461c4ed8d5fea9b92d4296b1b583b
SHA256a30d189768421d8f7cd73d04733b9668d9bc6ac5f924c1718365905dfde99ea6
SHA5124fcec6ad77900a3d860a607112f926e1989d5096b6810d17faebff0a35f339e57b8bf80fc5ca67e31635547a14bb3e5cde3820027774c39345c2b7d319390851
-
Filesize
722B
MD5eefd8db96f75cdf64ba7ed0f624b08de
SHA15394059ac69461c4ed8d5fea9b92d4296b1b583b
SHA256a30d189768421d8f7cd73d04733b9668d9bc6ac5f924c1718365905dfde99ea6
SHA5124fcec6ad77900a3d860a607112f926e1989d5096b6810d17faebff0a35f339e57b8bf80fc5ca67e31635547a14bb3e5cde3820027774c39345c2b7d319390851
-
C:\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe
Filesize580KB
MD5aaa268594863d78a357c991987b1626b
SHA1dad656907fc580fa489664454a93f7549e4b7d6e
SHA256c4c225adcf8ed1f7eda4727350ccdc9844edafb41db4ad4e52c35081c74e72b2
SHA51242800a49b3baf62240dc1e73cf07acaea088910290727e9ff69a1b0519b87b9bc2fb36e635442374a7688b47aca1b5d590302d1dd803fa77693cabcfcd1160de
-
C:\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe.exe
Filesize580KB
MD5aaa268594863d78a357c991987b1626b
SHA1dad656907fc580fa489664454a93f7549e4b7d6e
SHA256c4c225adcf8ed1f7eda4727350ccdc9844edafb41db4ad4e52c35081c74e72b2
SHA51242800a49b3baf62240dc1e73cf07acaea088910290727e9ff69a1b0519b87b9bc2fb36e635442374a7688b47aca1b5d590302d1dd803fa77693cabcfcd1160de
-
Filesize
26KB
MD5fda0fdf5a333fae26c2a2e6175a04450
SHA11919de79be65650960729112e3494cc106c44ade
SHA256086b54378c9f0d4d25b0c9bc043b66e0117fe7d7a359993e5208ed437178a005
SHA5121f3b2c42bd0e0a0dd49712969c79462bae74373a7a46975796f0b679cc3e75b679e4e5251370e5926b98f56c9fa9aa18274de18943be4b7cc0c6ce2da40fcc7d
-
Filesize
26KB
MD5fda0fdf5a333fae26c2a2e6175a04450
SHA11919de79be65650960729112e3494cc106c44ade
SHA256086b54378c9f0d4d25b0c9bc043b66e0117fe7d7a359993e5208ed437178a005
SHA5121f3b2c42bd0e0a0dd49712969c79462bae74373a7a46975796f0b679cc3e75b679e4e5251370e5926b98f56c9fa9aa18274de18943be4b7cc0c6ce2da40fcc7d
-
Filesize
26KB
MD5fda0fdf5a333fae26c2a2e6175a04450
SHA11919de79be65650960729112e3494cc106c44ade
SHA256086b54378c9f0d4d25b0c9bc043b66e0117fe7d7a359993e5208ed437178a005
SHA5121f3b2c42bd0e0a0dd49712969c79462bae74373a7a46975796f0b679cc3e75b679e4e5251370e5926b98f56c9fa9aa18274de18943be4b7cc0c6ce2da40fcc7d
-
Filesize
26KB
MD5fda0fdf5a333fae26c2a2e6175a04450
SHA11919de79be65650960729112e3494cc106c44ade
SHA256086b54378c9f0d4d25b0c9bc043b66e0117fe7d7a359993e5208ed437178a005
SHA5121f3b2c42bd0e0a0dd49712969c79462bae74373a7a46975796f0b679cc3e75b679e4e5251370e5926b98f56c9fa9aa18274de18943be4b7cc0c6ce2da40fcc7d
-
Filesize
8B
MD56bdc569e34ba772e6a02bf98e5269208
SHA1d6e9053ccd9906f78c9f4dd12414246f31622d49
SHA256a2f6c9ea9fb63e52c84ba26b60450f841bafcf7378af3f8310c32c86701dc148
SHA512d25858c63ebf7077fbf1a96c3fbb6577cab1ebd3d133f6982672e6c721bebee655028a8f35292c1c3fc1d3d1a166256da32a54e3981c453fa0b30df3b2278ee0
-
\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe
Filesize580KB
MD5aaa268594863d78a357c991987b1626b
SHA1dad656907fc580fa489664454a93f7549e4b7d6e
SHA256c4c225adcf8ed1f7eda4727350ccdc9844edafb41db4ad4e52c35081c74e72b2
SHA51242800a49b3baf62240dc1e73cf07acaea088910290727e9ff69a1b0519b87b9bc2fb36e635442374a7688b47aca1b5d590302d1dd803fa77693cabcfcd1160de
-
\Users\Admin\AppData\Local\Temp\2f1bc94ed5373eaf6127a7f923e3c76c1e9988e25828b619eaae13c6b94ca671.exe
Filesize580KB
MD5aaa268594863d78a357c991987b1626b
SHA1dad656907fc580fa489664454a93f7549e4b7d6e
SHA256c4c225adcf8ed1f7eda4727350ccdc9844edafb41db4ad4e52c35081c74e72b2
SHA51242800a49b3baf62240dc1e73cf07acaea088910290727e9ff69a1b0519b87b9bc2fb36e635442374a7688b47aca1b5d590302d1dd803fa77693cabcfcd1160de