Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/10/2023, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe
Resource
win10v2004-20230915-en
General
-
Target
eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe
-
Size
168KB
-
MD5
b78fa119b0f670308d842d5c8c1ccbd1
-
SHA1
452a2ba1e7e29ef83082285ebbeeb7e878964e38
-
SHA256
eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8
-
SHA512
df6f7057d41bc254185bca58598ae1d0fc7f366e000c637f0d0b9960426e7c9e425df287c27c61fe631386112ba73bb8f348f7a8d18a92693356f73ea99a1605
-
SSDEEP
3072:AftffhJCuUq2aACAMfVxHsjqUwkMejsRkCdvR0FlgHIRXmUa9Il6:AVfhguD2dMQRcR0FZXpw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2880 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2292 Logo1_.exe 2748 eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe -
Loads dropped DLL 1 IoCs
pid Process 2880 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\PublicAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\STS2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Portal\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EURO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PROPLUS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Groove.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zG.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe File created C:\Windows\Logo1_.exe eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe 2292 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2880 1492 eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe 28 PID 1492 wrote to memory of 2880 1492 eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe 28 PID 1492 wrote to memory of 2880 1492 eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe 28 PID 1492 wrote to memory of 2880 1492 eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe 28 PID 1492 wrote to memory of 2292 1492 eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe 30 PID 1492 wrote to memory of 2292 1492 eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe 30 PID 1492 wrote to memory of 2292 1492 eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe 30 PID 1492 wrote to memory of 2292 1492 eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe 30 PID 2292 wrote to memory of 2704 2292 Logo1_.exe 31 PID 2292 wrote to memory of 2704 2292 Logo1_.exe 31 PID 2292 wrote to memory of 2704 2292 Logo1_.exe 31 PID 2292 wrote to memory of 2704 2292 Logo1_.exe 31 PID 2880 wrote to memory of 2748 2880 cmd.exe 33 PID 2880 wrote to memory of 2748 2880 cmd.exe 33 PID 2880 wrote to memory of 2748 2880 cmd.exe 33 PID 2880 wrote to memory of 2748 2880 cmd.exe 33 PID 2704 wrote to memory of 1944 2704 net.exe 34 PID 2704 wrote to memory of 1944 2704 net.exe 34 PID 2704 wrote to memory of 1944 2704 net.exe 34 PID 2704 wrote to memory of 1944 2704 net.exe 34 PID 2292 wrote to memory of 1192 2292 Logo1_.exe 18 PID 2292 wrote to memory of 1192 2292 Logo1_.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe"C:\Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4AA7.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe"C:\Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe"4⤵
- Executes dropped EXE
PID:2748
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1944
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5caee131315efa751ebd002e137cbfcee
SHA183a35c118b2a8b1327ef95d608ed2e1b8068e57e
SHA256512774feac23e5acd64ba67883e932f9f5bccb5139e48656acedb62a3d202c7c
SHA512e0b19a2e3c6932802dd43fbfcfe8de5ec860af2f1da72fe4f99e5f214ca53ee87dce9a5457969d5637b12ac3afcd1e2209e64b524a8bea9490ce2dd7616c2a23
-
Filesize
471KB
MD5f9fc019eacb573ec828d2d9ff6a48318
SHA1b91958dc8d178b6eeb35e829bab84d0fb12c2280
SHA256bf9ba3df2bad76d15f4efe42c0c59f37b9454907958892df8ab996552658934e
SHA512998ba7bc7cdd5df3e1acfda6f4f92ec9d27732e1e182177dff310f3c918f3be99626a3526bebdff5bb7eb980640434baf56e0f08bfd125168c0a9e37e7239305
-
Filesize
722B
MD5c0158fb91fb8c9a621eba9338f5ff175
SHA144882966e283d2661927d45c95360457a4da3a0d
SHA25620ce42a177f26446d2760c130050f513a632861c6315c6378d1116afa93e7185
SHA5125df32bfe98ff7dac5f6b6eaa4bb325bf8923e6b4f4c465d81995477b6a4e56dab9071117a30f69965a99b99ff336fb4dab16f8cd36c69a76381acb597a0a25ce
-
Filesize
722B
MD5c0158fb91fb8c9a621eba9338f5ff175
SHA144882966e283d2661927d45c95360457a4da3a0d
SHA25620ce42a177f26446d2760c130050f513a632861c6315c6378d1116afa93e7185
SHA5125df32bfe98ff7dac5f6b6eaa4bb325bf8923e6b4f4c465d81995477b6a4e56dab9071117a30f69965a99b99ff336fb4dab16f8cd36c69a76381acb597a0a25ce
-
C:\Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe
Filesize141KB
MD55a432a042dae460abe7199b758e8606c
SHA1821b965267ee15c6c59178777ae7a8dcfc80f4ba
SHA2566e5d1f477d290905be27cebf9572bac6b05ffef2fad901d3c8e11f665f8b9a71
SHA51272823cc212c585a8080122c416e66fe28cb5a1787ae384d52b2068aec4a16944ed10731c622c1db0d8035aee7b5706bc7d2a4e6295a6ce3e50eb4895cc968c75
-
C:\Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe.exe
Filesize141KB
MD55a432a042dae460abe7199b758e8606c
SHA1821b965267ee15c6c59178777ae7a8dcfc80f4ba
SHA2566e5d1f477d290905be27cebf9572bac6b05ffef2fad901d3c8e11f665f8b9a71
SHA51272823cc212c585a8080122c416e66fe28cb5a1787ae384d52b2068aec4a16944ed10731c622c1db0d8035aee7b5706bc7d2a4e6295a6ce3e50eb4895cc968c75
-
Filesize
26KB
MD578761f691ce89e5780f17a32aca842dc
SHA141d328d56c86eafcc5fbc9505f4d3815c31db648
SHA256449ac0cadf5032548397b51ec9af0353a900dd337bab222504b4bd516f054812
SHA512dba1b6a631327c3b106f9e9f93aae3a75c4d0b1866ea7a1ad9e2b4a65df5d8eee12ee7861d497671cd409d92ff2ec3fc0e91a59058fceac242734264d6c6b142
-
Filesize
26KB
MD578761f691ce89e5780f17a32aca842dc
SHA141d328d56c86eafcc5fbc9505f4d3815c31db648
SHA256449ac0cadf5032548397b51ec9af0353a900dd337bab222504b4bd516f054812
SHA512dba1b6a631327c3b106f9e9f93aae3a75c4d0b1866ea7a1ad9e2b4a65df5d8eee12ee7861d497671cd409d92ff2ec3fc0e91a59058fceac242734264d6c6b142
-
Filesize
26KB
MD578761f691ce89e5780f17a32aca842dc
SHA141d328d56c86eafcc5fbc9505f4d3815c31db648
SHA256449ac0cadf5032548397b51ec9af0353a900dd337bab222504b4bd516f054812
SHA512dba1b6a631327c3b106f9e9f93aae3a75c4d0b1866ea7a1ad9e2b4a65df5d8eee12ee7861d497671cd409d92ff2ec3fc0e91a59058fceac242734264d6c6b142
-
Filesize
26KB
MD578761f691ce89e5780f17a32aca842dc
SHA141d328d56c86eafcc5fbc9505f4d3815c31db648
SHA256449ac0cadf5032548397b51ec9af0353a900dd337bab222504b4bd516f054812
SHA512dba1b6a631327c3b106f9e9f93aae3a75c4d0b1866ea7a1ad9e2b4a65df5d8eee12ee7861d497671cd409d92ff2ec3fc0e91a59058fceac242734264d6c6b142
-
Filesize
9B
MD50387f4acd0cfa16ac07fab88bff7f344
SHA160da1a37a16077ad337f6a91cc4acb9fba2940b3
SHA2560b1b21f717a6f4add9692073f01b9b560898213b197ef3b47165d56be17c617d
SHA5127d52216da22ceed1afe2b9d31fcea1798b2879eb6426d3634f38b7ea296627c516ff022d3cfe34df3aac4fa6fb6e2ad8eb21d2c9c040c83c53ea79487b1d13ab
-
\Users\Admin\AppData\Local\Temp\eaeaeff938db37a63fc6b582da5302c4ceccf12f5a92cc16e55243a917617ad8.exe
Filesize141KB
MD55a432a042dae460abe7199b758e8606c
SHA1821b965267ee15c6c59178777ae7a8dcfc80f4ba
SHA2566e5d1f477d290905be27cebf9572bac6b05ffef2fad901d3c8e11f665f8b9a71
SHA51272823cc212c585a8080122c416e66fe28cb5a1787ae384d52b2068aec4a16944ed10731c622c1db0d8035aee7b5706bc7d2a4e6295a6ce3e50eb4895cc968c75