Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03/09/2023, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe
Resource
win10v2004-20230831-en
General
-
Target
df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe
-
Size
242KB
-
MD5
cc5cb119d258e9884ad4dcdd30f8845e
-
SHA1
759adf9a75ed58233389b5a5dea4e3a456cfba3a
-
SHA256
df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19
-
SHA512
08c010dde6cc720c9cedda97235d843054b6da6319dae6c21a040300441de434fde2cdfc494d2a85a54a06e698df52e4792487c21325935c461d9bc6944f8e9f
-
SSDEEP
6144:3GuJgAGVNaPtpNZxI4sTBCFyn/7IwBrPi:+aFjdsTcFyn/7Iw5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2880 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1968 Logo1_.exe 2736 df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe -
Loads dropped DLL 1 IoCs
pid Process 2880 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SUMIPNTG\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Groove.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Basic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe File created C:\Windows\Logo1_.exe df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1968 Logo1_.exe 1968 Logo1_.exe 1968 Logo1_.exe 1968 Logo1_.exe 1968 Logo1_.exe 1968 Logo1_.exe 1968 Logo1_.exe 1968 Logo1_.exe 1968 Logo1_.exe 1968 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2880 1492 df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe 28 PID 1492 wrote to memory of 2880 1492 df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe 28 PID 1492 wrote to memory of 2880 1492 df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe 28 PID 1492 wrote to memory of 2880 1492 df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe 28 PID 1492 wrote to memory of 1968 1492 df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe 30 PID 1492 wrote to memory of 1968 1492 df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe 30 PID 1492 wrote to memory of 1968 1492 df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe 30 PID 1492 wrote to memory of 1968 1492 df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe 30 PID 1968 wrote to memory of 2712 1968 Logo1_.exe 31 PID 1968 wrote to memory of 2712 1968 Logo1_.exe 31 PID 1968 wrote to memory of 2712 1968 Logo1_.exe 31 PID 1968 wrote to memory of 2712 1968 Logo1_.exe 31 PID 2712 wrote to memory of 2732 2712 net.exe 33 PID 2712 wrote to memory of 2732 2712 net.exe 33 PID 2712 wrote to memory of 2732 2712 net.exe 33 PID 2712 wrote to memory of 2732 2712 net.exe 33 PID 2880 wrote to memory of 2736 2880 cmd.exe 34 PID 2880 wrote to memory of 2736 2880 cmd.exe 34 PID 2880 wrote to memory of 2736 2880 cmd.exe 34 PID 2880 wrote to memory of 2736 2880 cmd.exe 34 PID 1968 wrote to memory of 1192 1968 Logo1_.exe 7 PID 1968 wrote to memory of 1192 1968 Logo1_.exe 7
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe"C:\Users\Admin\AppData\Local\Temp\df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4AA7.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe"C:\Users\Admin\AppData\Local\Temp\df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe"4⤵
- Executes dropped EXE
PID:2736
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2732
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5e689c29da266201da624380c99210d7a
SHA1f2e582dab9e0b507c05a90b7d7b353253d1479cb
SHA25614563ed51a3a2161def033a46ba7c60499b6386484ed514c26f78b73e237a627
SHA51248975ab15b16c7035157649a41f212b01a91a57348bd8cdd412769839210ca308f91ea77ab6e804e903e174b72820e4280eecd14709493df0ea2e9da5efa030d
-
Filesize
474KB
MD54fd672068b4fa9ace0605d7554d11dfa
SHA18058f5be0c2800dc82e67ab31f303990c561e98e
SHA256264a00d6c978f93cd74998628bc8b6ce7904d428b21a8d81c4d26f3dffe0173f
SHA512f6543c1e11ff263c00597a204a111aa7192610baaeabb488dd533fea4da4c5901e8852985681bb3172a4b2d4a8454931beae47186e8bbf633d11b0dcbc6080da
-
Filesize
722B
MD511b15730ce6ee56ac7aae773d5b1c2d5
SHA123de4bb739ebb93fb4c3541658cced1e5f5eba38
SHA25687e01191d4e42cc4d362e6f2b32a430c582ed2a7638435f9ca6a18795597fea6
SHA5126c2bb5d61e785ff58c9dc35c47a1af621b605e228ca47b46f54523988c394ecc77e9bf8f5a49fea855c86adb34ced803f9bc6bede181a54977f2a6b682baf4da
-
Filesize
722B
MD511b15730ce6ee56ac7aae773d5b1c2d5
SHA123de4bb739ebb93fb4c3541658cced1e5f5eba38
SHA25687e01191d4e42cc4d362e6f2b32a430c582ed2a7638435f9ca6a18795597fea6
SHA5126c2bb5d61e785ff58c9dc35c47a1af621b605e228ca47b46f54523988c394ecc77e9bf8f5a49fea855c86adb34ced803f9bc6bede181a54977f2a6b682baf4da
-
C:\Users\Admin\AppData\Local\Temp\df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe
Filesize213KB
MD553dcf0ffa53be374a64f3d64bf355f60
SHA1b5632a6b9d2f140f60faa43fc79e7d238917b0c8
SHA2567bc8a09c86e637c9b99ffedad92c2b3f1f648cc457b0d3962d63e57c73c5c23c
SHA512821d82c905c05980a736968e80f3667c7fb3c6189d0a9a4b6af9a7858091869179d2be087890a9902e835fa1a31306894610eb27475876d404267aca16cd2267
-
C:\Users\Admin\AppData\Local\Temp\df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe.exe
Filesize213KB
MD553dcf0ffa53be374a64f3d64bf355f60
SHA1b5632a6b9d2f140f60faa43fc79e7d238917b0c8
SHA2567bc8a09c86e637c9b99ffedad92c2b3f1f648cc457b0d3962d63e57c73c5c23c
SHA512821d82c905c05980a736968e80f3667c7fb3c6189d0a9a4b6af9a7858091869179d2be087890a9902e835fa1a31306894610eb27475876d404267aca16cd2267
-
Filesize
29KB
MD591cc870a2e033845ccd705e5615229e3
SHA1ee50320fa6fb77dbd099443c67b5223dfc26817f
SHA2568cef20d8fbb35b4552ab0cd4cab0de1f186befbba4fa0d6f70e5505fda9a4341
SHA512c14e6dfb3c3a24ddda42710787077765f7dca3a2c9d94c898481ffdbaaa1e90469cdba75ff26f23206d48d125d685b67530c0a89456942f091651a8862f20b5b
-
Filesize
29KB
MD591cc870a2e033845ccd705e5615229e3
SHA1ee50320fa6fb77dbd099443c67b5223dfc26817f
SHA2568cef20d8fbb35b4552ab0cd4cab0de1f186befbba4fa0d6f70e5505fda9a4341
SHA512c14e6dfb3c3a24ddda42710787077765f7dca3a2c9d94c898481ffdbaaa1e90469cdba75ff26f23206d48d125d685b67530c0a89456942f091651a8862f20b5b
-
Filesize
29KB
MD591cc870a2e033845ccd705e5615229e3
SHA1ee50320fa6fb77dbd099443c67b5223dfc26817f
SHA2568cef20d8fbb35b4552ab0cd4cab0de1f186befbba4fa0d6f70e5505fda9a4341
SHA512c14e6dfb3c3a24ddda42710787077765f7dca3a2c9d94c898481ffdbaaa1e90469cdba75ff26f23206d48d125d685b67530c0a89456942f091651a8862f20b5b
-
Filesize
29KB
MD591cc870a2e033845ccd705e5615229e3
SHA1ee50320fa6fb77dbd099443c67b5223dfc26817f
SHA2568cef20d8fbb35b4552ab0cd4cab0de1f186befbba4fa0d6f70e5505fda9a4341
SHA512c14e6dfb3c3a24ddda42710787077765f7dca3a2c9d94c898481ffdbaaa1e90469cdba75ff26f23206d48d125d685b67530c0a89456942f091651a8862f20b5b
-
Filesize
8B
MD595127a81ba5781b47158c7bade11f958
SHA1fa289ca07d3998db8f732dc188ff099b7dcefd86
SHA2564b413fdd0fc873cb5cf1b957078e2786827cb8d3665159e02b7bfda486133aaf
SHA512c1403a7b2e462b09a03f09ba4ecff788db0d0402c09086b65c435c606a5c898ebc9959e47f77a5985881eee0e4364b035a3fa926672e8b61e2cc9bf7c3b169a0
-
\Users\Admin\AppData\Local\Temp\df229e3e0be5f93c097e4927b713d6b4f5a6090fb84cf3d07e1b6fc37a0dec19.exe
Filesize213KB
MD553dcf0ffa53be374a64f3d64bf355f60
SHA1b5632a6b9d2f140f60faa43fc79e7d238917b0c8
SHA2567bc8a09c86e637c9b99ffedad92c2b3f1f648cc457b0d3962d63e57c73c5c23c
SHA512821d82c905c05980a736968e80f3667c7fb3c6189d0a9a4b6af9a7858091869179d2be087890a9902e835fa1a31306894610eb27475876d404267aca16cd2267