Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03-09-2023 17:37
Static task
static1
Behavioral task
behavioral1
Sample
53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe
Resource
win10v2004-20230831-en
General
-
Target
53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe
-
Size
298KB
-
MD5
20bfd2f230e5a9786c4aad703fbaee3d
-
SHA1
d7805fcac6a95e766b8907e257236914abe48ee6
-
SHA256
53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9
-
SHA512
5fef25a19aa7012197b4269a03befcdcea5655862932436c293e6337850f8a8aa33486c293478fb822e45f6b7638b1766e1cbbf3fc68aa84dfba0ddfcbfb4474
-
SSDEEP
6144:nVfjmNrbUARyUgzPcLactVks94DJ9TBA3QvE:V7+rlwUAPDsyLDJ9TagvE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2456 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2196 Logo1_.exe 2704 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 1172 Explorer.EXE -
Loads dropped DLL 1 IoCs
pid Process 2456 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.WW\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe File created C:\Windows\Logo1_.exe 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2456 2000 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 28 PID 2000 wrote to memory of 2456 2000 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 28 PID 2000 wrote to memory of 2456 2000 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 28 PID 2000 wrote to memory of 2456 2000 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 28 PID 2000 wrote to memory of 2196 2000 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 29 PID 2000 wrote to memory of 2196 2000 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 29 PID 2000 wrote to memory of 2196 2000 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 29 PID 2000 wrote to memory of 2196 2000 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 29 PID 2196 wrote to memory of 2272 2196 Logo1_.exe 30 PID 2196 wrote to memory of 2272 2196 Logo1_.exe 30 PID 2196 wrote to memory of 2272 2196 Logo1_.exe 30 PID 2196 wrote to memory of 2272 2196 Logo1_.exe 30 PID 2272 wrote to memory of 2672 2272 net.exe 34 PID 2272 wrote to memory of 2672 2272 net.exe 34 PID 2272 wrote to memory of 2672 2272 net.exe 34 PID 2272 wrote to memory of 2672 2272 net.exe 34 PID 2456 wrote to memory of 2704 2456 cmd.exe 33 PID 2456 wrote to memory of 2704 2456 cmd.exe 33 PID 2456 wrote to memory of 2704 2456 cmd.exe 33 PID 2456 wrote to memory of 2704 2456 cmd.exe 33 PID 2196 wrote to memory of 1172 2196 Logo1_.exe 11 PID 2196 wrote to memory of 1172 2196 Logo1_.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe"C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a3498.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe"C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe"4⤵
- Executes dropped EXE
PID:2704
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2672
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD55725841defcb7e0548144bdc53e0b867
SHA1dd8c3c919b9ee5d068c5c42ba049cc2898add5c5
SHA2567a1876d6402a6e910fe1ace26d0fc6a0ae27599d0258f9352f6b81bc2b4b72a3
SHA512de6785d1de40c6b86ec99918bd3b0e884a81377ad1d353799cd34a3399cde727ccbcd48af0880cd5f48ee9ef1bb98fa8f870a83c38f8b9aea77cbea2ade0331c
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD558d211934349b47eaefdd18294831af4
SHA139c60a128d393a19d9cf7f2718f201d55f4c8f97
SHA256d77c3aca6a9d2339532014d80db7b2772c7996f9c7ab21ca6c0fdf7ed4d4eb7b
SHA5124abc81a4e097b63943f2791f1d0b7598feff09bae640dd84c8fb3ea6bfa8de2d7c3cebf3718ca77958ee3725dd2f172bfa75a568f6a2a5a89eb321b1b5e2897e
-
Filesize
722B
MD558d211934349b47eaefdd18294831af4
SHA139c60a128d393a19d9cf7f2718f201d55f4c8f97
SHA256d77c3aca6a9d2339532014d80db7b2772c7996f9c7ab21ca6c0fdf7ed4d4eb7b
SHA5124abc81a4e097b63943f2791f1d0b7598feff09bae640dd84c8fb3ea6bfa8de2d7c3cebf3718ca77958ee3725dd2f172bfa75a568f6a2a5a89eb321b1b5e2897e
-
C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe
Filesize271KB
MD563475fca261f68f0d42c9372f9a77308
SHA1e1ab1002db6723da4cdd0ebd5952ad21c41b9a72
SHA25677d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4
SHA512520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96
-
C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe.exe
Filesize271KB
MD563475fca261f68f0d42c9372f9a77308
SHA1e1ab1002db6723da4cdd0ebd5952ad21c41b9a72
SHA25677d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4
SHA512520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96
-
Filesize
26KB
MD52da5a57d1ba2ed4b46bc3c9817948557
SHA18b28792220f874e0abd68de5d946c3ae111f6abb
SHA256e3c3821d97d831fe32ef85bf7e78b397eba5cd839568aeae330e28e702eb662f
SHA51229940a2b80714d8f816a0d6b4f5d93cfb4aeae5e0303f6f06d5091a3e0dc405ae1a1def41ea5e2e709ed6c20d4f4fd8f1d9527ca6eb4eb6d6cf1bc5fce4a7e91
-
Filesize
26KB
MD52da5a57d1ba2ed4b46bc3c9817948557
SHA18b28792220f874e0abd68de5d946c3ae111f6abb
SHA256e3c3821d97d831fe32ef85bf7e78b397eba5cd839568aeae330e28e702eb662f
SHA51229940a2b80714d8f816a0d6b4f5d93cfb4aeae5e0303f6f06d5091a3e0dc405ae1a1def41ea5e2e709ed6c20d4f4fd8f1d9527ca6eb4eb6d6cf1bc5fce4a7e91
-
Filesize
26KB
MD52da5a57d1ba2ed4b46bc3c9817948557
SHA18b28792220f874e0abd68de5d946c3ae111f6abb
SHA256e3c3821d97d831fe32ef85bf7e78b397eba5cd839568aeae330e28e702eb662f
SHA51229940a2b80714d8f816a0d6b4f5d93cfb4aeae5e0303f6f06d5091a3e0dc405ae1a1def41ea5e2e709ed6c20d4f4fd8f1d9527ca6eb4eb6d6cf1bc5fce4a7e91
-
Filesize
26KB
MD52da5a57d1ba2ed4b46bc3c9817948557
SHA18b28792220f874e0abd68de5d946c3ae111f6abb
SHA256e3c3821d97d831fe32ef85bf7e78b397eba5cd839568aeae330e28e702eb662f
SHA51229940a2b80714d8f816a0d6b4f5d93cfb4aeae5e0303f6f06d5091a3e0dc405ae1a1def41ea5e2e709ed6c20d4f4fd8f1d9527ca6eb4eb6d6cf1bc5fce4a7e91
-
Filesize
8B
MD595127a81ba5781b47158c7bade11f958
SHA1fa289ca07d3998db8f732dc188ff099b7dcefd86
SHA2564b413fdd0fc873cb5cf1b957078e2786827cb8d3665159e02b7bfda486133aaf
SHA512c1403a7b2e462b09a03f09ba4ecff788db0d0402c09086b65c435c606a5c898ebc9959e47f77a5985881eee0e4364b035a3fa926672e8b61e2cc9bf7c3b169a0
-
\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe
Filesize271KB
MD563475fca261f68f0d42c9372f9a77308
SHA1e1ab1002db6723da4cdd0ebd5952ad21c41b9a72
SHA25677d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4
SHA512520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96
-
\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe
Filesize271KB
MD563475fca261f68f0d42c9372f9a77308
SHA1e1ab1002db6723da4cdd0ebd5952ad21c41b9a72
SHA25677d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4
SHA512520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96