Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
23-09-2023 11:08
Static task
static1
Behavioral task
behavioral1
Sample
39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe
Resource
win10v2004-20230915-en
General
-
Target
39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe
-
Size
129KB
-
MD5
585146f6181281f751ea01fb0e622c94
-
SHA1
192a7c15248bc93434a0df30de5dcf6d168b33d1
-
SHA256
39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6
-
SHA512
4334acdcb925e066ee19f8b32b6a6d16085eafea49c459158be1ed452dd4b6dbfb5d71225267a90fddd6106c5b1949b6aa28642b545239ab6973c043fa7e5814
-
SSDEEP
3072:eBftffhJCuUJq42/TsRMIakSt2sWllgnaavyuurPo:eJVfhguMqd/TsRMCi2sg23MQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1256 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2040 Logo1_.exe 2528 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe -
Loads dropped DLL 1 IoCs
pid Process 1256 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Updater6\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\AccessWeb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Uninstall Information\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2040 Logo1_.exe 2040 Logo1_.exe 2040 Logo1_.exe 2040 Logo1_.exe 2040 Logo1_.exe 2040 Logo1_.exe 2040 Logo1_.exe 2040 Logo1_.exe 2040 Logo1_.exe 2040 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2160 wrote to memory of 1256 2160 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 28 PID 2160 wrote to memory of 1256 2160 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 28 PID 2160 wrote to memory of 1256 2160 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 28 PID 2160 wrote to memory of 1256 2160 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 28 PID 2160 wrote to memory of 2040 2160 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 30 PID 2160 wrote to memory of 2040 2160 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 30 PID 2160 wrote to memory of 2040 2160 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 30 PID 2160 wrote to memory of 2040 2160 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 30 PID 2040 wrote to memory of 2796 2040 Logo1_.exe 31 PID 2040 wrote to memory of 2796 2040 Logo1_.exe 31 PID 2040 wrote to memory of 2796 2040 Logo1_.exe 31 PID 2040 wrote to memory of 2796 2040 Logo1_.exe 31 PID 1256 wrote to memory of 2528 1256 cmd.exe 34 PID 1256 wrote to memory of 2528 1256 cmd.exe 34 PID 1256 wrote to memory of 2528 1256 cmd.exe 34 PID 1256 wrote to memory of 2528 1256 cmd.exe 34 PID 2796 wrote to memory of 2872 2796 net.exe 33 PID 2796 wrote to memory of 2872 2796 net.exe 33 PID 2796 wrote to memory of 2872 2796 net.exe 33 PID 2796 wrote to memory of 2872 2796 net.exe 33 PID 2040 wrote to memory of 1264 2040 Logo1_.exe 22 PID 2040 wrote to memory of 1264 2040 Logo1_.exe 22
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe"C:\Users\Admin\AppData\Local\Temp\39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4AD6.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe"C:\Users\Admin\AppData\Local\Temp\39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe"4⤵
- Executes dropped EXE
PID:2528
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2872
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5c10795b833d3a0a660032627eff4cca6
SHA113b7c0a7b3dce3ddadbb7b8e73cce3ccd133f297
SHA2569fa435904f4639c196ac7fb5a738683c3bb3ad4343a9a57eaf5a9831cae587e4
SHA512ae49e8c640a7dcfb2ae68f3d11fe630fb95df1b7e2da86e2ffa58ce7de71d4ce897da004d6c5a92f86f4c55b93ce69b8191ab3b30bed176e3bce17403b36e044
-
Filesize
471KB
MD5f9fc019eacb573ec828d2d9ff6a48318
SHA1b91958dc8d178b6eeb35e829bab84d0fb12c2280
SHA256bf9ba3df2bad76d15f4efe42c0c59f37b9454907958892df8ab996552658934e
SHA512998ba7bc7cdd5df3e1acfda6f4f92ec9d27732e1e182177dff310f3c918f3be99626a3526bebdff5bb7eb980640434baf56e0f08bfd125168c0a9e37e7239305
-
Filesize
722B
MD569078be549583d2467e09a8e5a6a83cc
SHA1f5c1edf874ddd4c2653d38ded2b8101c4f6343c2
SHA256968014b3f82ade3d967dbf1a538957a158d8778843be855a5ae5e1ee5cbd37e1
SHA512dc219c2e678458cd4a31a484c1dbb4c9031afbebfc8e744f7d69a82a76374e33a8ebbfcff5cafba14781d12ddf8f9459301f6e1b60ce6034da7317646d2745c4
-
Filesize
722B
MD569078be549583d2467e09a8e5a6a83cc
SHA1f5c1edf874ddd4c2653d38ded2b8101c4f6343c2
SHA256968014b3f82ade3d967dbf1a538957a158d8778843be855a5ae5e1ee5cbd37e1
SHA512dc219c2e678458cd4a31a484c1dbb4c9031afbebfc8e744f7d69a82a76374e33a8ebbfcff5cafba14781d12ddf8f9459301f6e1b60ce6034da7317646d2745c4
-
C:\Users\Admin\AppData\Local\Temp\39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe
Filesize102KB
MD51eadbd02c1393606dc08bd49561de137
SHA1468768b6df7f729ab4cf158fe86a952ad5db90c8
SHA256cc01b15a2f8e92b7af43650e62a58b7b36213d533fe4d2add481869b35085f7f
SHA5121804a6cd1f73ca0114a81c96af32f3776060ca9dfdbd283898de4bbc64ce142c9351355c2b9aeda01ee73a6444a1b89825ecb2f319e82837012cce1b4e7771fb
-
C:\Users\Admin\AppData\Local\Temp\39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe.exe
Filesize102KB
MD51eadbd02c1393606dc08bd49561de137
SHA1468768b6df7f729ab4cf158fe86a952ad5db90c8
SHA256cc01b15a2f8e92b7af43650e62a58b7b36213d533fe4d2add481869b35085f7f
SHA5121804a6cd1f73ca0114a81c96af32f3776060ca9dfdbd283898de4bbc64ce142c9351355c2b9aeda01ee73a6444a1b89825ecb2f319e82837012cce1b4e7771fb
-
Filesize
26KB
MD57963e73ae06c842251fcf42695ae8a1d
SHA1728ba0de7098ef0894de770de3a017495bd77398
SHA256dc1a8a5e80ac711b36d5344111575bfd7b84b812e30d7eb3ab90a44aeeae9eb8
SHA512d4b098bc93ceafed1676d9760ba64e125a90eddaed4fe9bb98faa740184041c33f3598dcb7bdfcc5475786812cb8233fc742b4757fb50021861f310cc6db69b0
-
Filesize
26KB
MD57963e73ae06c842251fcf42695ae8a1d
SHA1728ba0de7098ef0894de770de3a017495bd77398
SHA256dc1a8a5e80ac711b36d5344111575bfd7b84b812e30d7eb3ab90a44aeeae9eb8
SHA512d4b098bc93ceafed1676d9760ba64e125a90eddaed4fe9bb98faa740184041c33f3598dcb7bdfcc5475786812cb8233fc742b4757fb50021861f310cc6db69b0
-
Filesize
26KB
MD57963e73ae06c842251fcf42695ae8a1d
SHA1728ba0de7098ef0894de770de3a017495bd77398
SHA256dc1a8a5e80ac711b36d5344111575bfd7b84b812e30d7eb3ab90a44aeeae9eb8
SHA512d4b098bc93ceafed1676d9760ba64e125a90eddaed4fe9bb98faa740184041c33f3598dcb7bdfcc5475786812cb8233fc742b4757fb50021861f310cc6db69b0
-
Filesize
26KB
MD57963e73ae06c842251fcf42695ae8a1d
SHA1728ba0de7098ef0894de770de3a017495bd77398
SHA256dc1a8a5e80ac711b36d5344111575bfd7b84b812e30d7eb3ab90a44aeeae9eb8
SHA512d4b098bc93ceafed1676d9760ba64e125a90eddaed4fe9bb98faa740184041c33f3598dcb7bdfcc5475786812cb8233fc742b4757fb50021861f310cc6db69b0
-
Filesize
9B
MD503a43141897af885fcc64a27583fc743
SHA14aff71defd4db3cf0c35a21d2aeffec631855787
SHA256ffdcc2d1df4bcccda5ec03dbbc90933e7ea21cfc4fb6aeb60d32b8e63be4167e
SHA5122c742b215ae22c74c8af44dc77cf06cbc70c2c0cace3fb15d7f5c27ef506b304f723bdb1cb7584045ab0ea97ecddcf882208d9c5b8b48690dbcc6b987321ccbe
-
\Users\Admin\AppData\Local\Temp\39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe
Filesize102KB
MD51eadbd02c1393606dc08bd49561de137
SHA1468768b6df7f729ab4cf158fe86a952ad5db90c8
SHA256cc01b15a2f8e92b7af43650e62a58b7b36213d533fe4d2add481869b35085f7f
SHA5121804a6cd1f73ca0114a81c96af32f3776060ca9dfdbd283898de4bbc64ce142c9351355c2b9aeda01ee73a6444a1b89825ecb2f319e82837012cce1b4e7771fb