Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18/09/2023, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe
Resource
win10v2004-20230915-en
General
-
Target
4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe
-
Size
298KB
-
MD5
5b861b390e8f4e218e39c7763c422b1a
-
SHA1
a194287f9f67b360a9ad6ac062e944530d4778b0
-
SHA256
4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b
-
SHA512
b8f1c1ab672ac425d6956c95858089bfa1e51636f8c35c51c5d7626a78be8a748ef3221756fff6ceaa17ce85d8a2c1d579c64573081d0069dbc99df7c1d9f45b
-
SSDEEP
6144:DVfjmNrbUARyUgzPcLactVks94DJ9TBA3QvE:Z7+rlwUAPDsyLDJ9TagvE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3064 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1172 Logo1_.exe 2612 4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe 1268 Explorer.EXE -
Loads dropped DLL 1 IoCs
pid Process 3064 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1036\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PowerPoint.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\OneNote.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Lime\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Basic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe File created C:\Windows\Logo1_.exe 4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1172 Logo1_.exe 1172 Logo1_.exe 1172 Logo1_.exe 1172 Logo1_.exe 1172 Logo1_.exe 1172 Logo1_.exe 1172 Logo1_.exe 1172 Logo1_.exe 1172 Logo1_.exe 1172 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2116 wrote to memory of 3064 2116 4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe 28 PID 2116 wrote to memory of 3064 2116 4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe 28 PID 2116 wrote to memory of 3064 2116 4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe 28 PID 2116 wrote to memory of 3064 2116 4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe 28 PID 2116 wrote to memory of 1172 2116 4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe 30 PID 2116 wrote to memory of 1172 2116 4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe 30 PID 2116 wrote to memory of 1172 2116 4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe 30 PID 2116 wrote to memory of 1172 2116 4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe 30 PID 1172 wrote to memory of 2684 1172 Logo1_.exe 31 PID 1172 wrote to memory of 2684 1172 Logo1_.exe 31 PID 1172 wrote to memory of 2684 1172 Logo1_.exe 31 PID 1172 wrote to memory of 2684 1172 Logo1_.exe 31 PID 3064 wrote to memory of 2612 3064 cmd.exe 33 PID 3064 wrote to memory of 2612 3064 cmd.exe 33 PID 3064 wrote to memory of 2612 3064 cmd.exe 33 PID 3064 wrote to memory of 2612 3064 cmd.exe 33 PID 2684 wrote to memory of 2740 2684 net.exe 34 PID 2684 wrote to memory of 2740 2684 net.exe 34 PID 2684 wrote to memory of 2740 2684 net.exe 34 PID 2684 wrote to memory of 2740 2684 net.exe 34 PID 1172 wrote to memory of 1268 1172 Logo1_.exe 19 PID 1172 wrote to memory of 1268 1172 Logo1_.exe 19
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe"C:\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a41A2.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe"C:\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe"4⤵
- Executes dropped EXE
PID:2612
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2740
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD50b8ca9bd200cfc077367fafb2f5e99ba
SHA10a8494c1fb2a50067e6ecd63af5ce1431439ad0a
SHA256bb93e63dbe4a922d8a33ce7d446ef9c52e489991fb586884a28b0bb66a363263
SHA51239585db684d3a59d72bf049c9d4611dc7539ae7be7471bdacf7cdb9a63d8ac2b643658b77143e7827a6d3502f87c4cb48add5dc80966db3a5e2c4ec362389723
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5682963cf899a6cf383055a0b7cfdafc1
SHA169818753ce50c06752876d8bfd0a909ab92ef0b4
SHA25611322108f36203e4fa09431d8ee5be0250371b798447e7741e2b53dfe1e4bb3d
SHA5128d33c737441cfba08e662392a20d285f0b9585d25fa4344f5b84acdea2a43a93f53b136c3908ef61f1e84882f8bc84791258f550bbdbe32046e7600a8e7f8592
-
Filesize
722B
MD5682963cf899a6cf383055a0b7cfdafc1
SHA169818753ce50c06752876d8bfd0a909ab92ef0b4
SHA25611322108f36203e4fa09431d8ee5be0250371b798447e7741e2b53dfe1e4bb3d
SHA5128d33c737441cfba08e662392a20d285f0b9585d25fa4344f5b84acdea2a43a93f53b136c3908ef61f1e84882f8bc84791258f550bbdbe32046e7600a8e7f8592
-
C:\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe
Filesize271KB
MD563475fca261f68f0d42c9372f9a77308
SHA1e1ab1002db6723da4cdd0ebd5952ad21c41b9a72
SHA25677d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4
SHA512520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96
-
C:\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe.exe
Filesize271KB
MD563475fca261f68f0d42c9372f9a77308
SHA1e1ab1002db6723da4cdd0ebd5952ad21c41b9a72
SHA25677d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4
SHA512520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96
-
Filesize
26KB
MD57aa3f7d0ddde37d1ba8a81eb45ae6238
SHA1f6cfaf6008198edfb624e959404928c0fd860d5c
SHA2568aee1ead2b934856107773de256c27c38118249a07a88e5f3fb0e710f61f4fc8
SHA5125440020514ad92a5c52113cfd5077dd012cb0605530140a582d55a828d9b626cbc809593f1400685b1109f17e98e5f03e0e228ebca1ec19bf09430ce2fa11061
-
Filesize
26KB
MD57aa3f7d0ddde37d1ba8a81eb45ae6238
SHA1f6cfaf6008198edfb624e959404928c0fd860d5c
SHA2568aee1ead2b934856107773de256c27c38118249a07a88e5f3fb0e710f61f4fc8
SHA5125440020514ad92a5c52113cfd5077dd012cb0605530140a582d55a828d9b626cbc809593f1400685b1109f17e98e5f03e0e228ebca1ec19bf09430ce2fa11061
-
Filesize
26KB
MD57aa3f7d0ddde37d1ba8a81eb45ae6238
SHA1f6cfaf6008198edfb624e959404928c0fd860d5c
SHA2568aee1ead2b934856107773de256c27c38118249a07a88e5f3fb0e710f61f4fc8
SHA5125440020514ad92a5c52113cfd5077dd012cb0605530140a582d55a828d9b626cbc809593f1400685b1109f17e98e5f03e0e228ebca1ec19bf09430ce2fa11061
-
Filesize
26KB
MD57aa3f7d0ddde37d1ba8a81eb45ae6238
SHA1f6cfaf6008198edfb624e959404928c0fd860d5c
SHA2568aee1ead2b934856107773de256c27c38118249a07a88e5f3fb0e710f61f4fc8
SHA5125440020514ad92a5c52113cfd5077dd012cb0605530140a582d55a828d9b626cbc809593f1400685b1109f17e98e5f03e0e228ebca1ec19bf09430ce2fa11061
-
Filesize
9B
MD59871758f1c8c7fb518b6793d4aa66294
SHA12808f61dd22a0bf12c85bbc65326e0bfe2f7f627
SHA2561f836ee8dbd13a9f1fa0f2de0976570138232addb74f0a354ed9b499191dc80d
SHA512a261ec877b3ccc43db77712359d10c360a50f420fed5cf6a65fd6894d2cd5055f5b72f85edb823a1da22121955aaaa6da34550da9f825c12982602c579a6bb3d
-
\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe
Filesize271KB
MD563475fca261f68f0d42c9372f9a77308
SHA1e1ab1002db6723da4cdd0ebd5952ad21c41b9a72
SHA25677d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4
SHA512520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96
-
\Users\Admin\AppData\Local\Temp\4e4781721a8790307d7d001c31a10e7a1c18ad114cdbe869c85042100b8ce86b.exe
Filesize271KB
MD563475fca261f68f0d42c9372f9a77308
SHA1e1ab1002db6723da4cdd0ebd5952ad21c41b9a72
SHA25677d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4
SHA512520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96