Analysis
-
max time kernel
152s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 22:48
Static task
static1
Behavioral task
behavioral1
Sample
8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe
Resource
win10v2004-20230915-en
General
-
Target
8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe
-
Size
59KB
-
MD5
70e60a07fc5ec3cfecad11f9d7e8b644
-
SHA1
f62e04a8b05c22c0bf7522359428f720714e9206
-
SHA256
8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7
-
SHA512
e2cdbf9d3218342fdd3f895b2d7e54f16e3c34f58fd3c2cd7fb42fbb034b208dfac43710fb8bb58f68c27855f7dbf53e3846bb4e1fa0a92f508d7ca4b2cc3605
-
SSDEEP
1536:dfgLdQAQfcfymNf+nHDUSLxXtDxZHMJhpuNUsRln:dftffjmNuUSLx9DeptQln
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1848 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2576 Logo1_.exe 2756 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe -
Loads dropped DLL 1 IoCs
pid Process 1848 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe File created C:\Windows\Logo1_.exe 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1848 2044 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 28 PID 2044 wrote to memory of 1848 2044 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 28 PID 2044 wrote to memory of 1848 2044 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 28 PID 2044 wrote to memory of 1848 2044 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 28 PID 2044 wrote to memory of 2576 2044 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 30 PID 2044 wrote to memory of 2576 2044 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 30 PID 2044 wrote to memory of 2576 2044 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 30 PID 2044 wrote to memory of 2576 2044 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 30 PID 2576 wrote to memory of 3060 2576 Logo1_.exe 31 PID 2576 wrote to memory of 3060 2576 Logo1_.exe 31 PID 2576 wrote to memory of 3060 2576 Logo1_.exe 31 PID 2576 wrote to memory of 3060 2576 Logo1_.exe 31 PID 1848 wrote to memory of 2756 1848 cmd.exe 33 PID 1848 wrote to memory of 2756 1848 cmd.exe 33 PID 1848 wrote to memory of 2756 1848 cmd.exe 33 PID 1848 wrote to memory of 2756 1848 cmd.exe 33 PID 3060 wrote to memory of 2604 3060 net.exe 34 PID 3060 wrote to memory of 2604 3060 net.exe 34 PID 3060 wrote to memory of 2604 3060 net.exe 34 PID 3060 wrote to memory of 2604 3060 net.exe 34 PID 2576 wrote to memory of 1252 2576 Logo1_.exe 10 PID 2576 wrote to memory of 1252 2576 Logo1_.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe"C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a96F2.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe"C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe"4⤵
- Executes dropped EXE
PID:2756
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2604
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5323fe521926560a69b8928ebeec26488
SHA1284b26eebb1924c8e03ee0af69b403ce3f25b6b5
SHA256a83e1f0840186b6b0adee23178ef96a8656a10a6d838c5e0c6f2ac068957c319
SHA5128f35766e5b9d5c33be15ef8666b4b721b72fbdd71f0344ec867ac55d247a2f11d633dfc541fc043efb765be01649c0befe8b3cb7293c4ef5343e5664fa309483
-
Filesize
722B
MD5323fe521926560a69b8928ebeec26488
SHA1284b26eebb1924c8e03ee0af69b403ce3f25b6b5
SHA256a83e1f0840186b6b0adee23178ef96a8656a10a6d838c5e0c6f2ac068957c319
SHA5128f35766e5b9d5c33be15ef8666b4b721b72fbdd71f0344ec867ac55d247a2f11d633dfc541fc043efb765be01649c0befe8b3cb7293c4ef5343e5664fa309483
-
C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe
Filesize33KB
MD58d05ecf2ab1c6977a588ea5d668050ab
SHA1ba402e1035ec8f5d1c686752584993395aa9e1b9
SHA256caa73b1e0d729f03de5e8deee8316dd0e1976f1ba3fedb0c6a85dd4096c109d3
SHA5124827c4aab9ffc7a9857e399b8b8480fe842a61e92193ab50ca6ed557884d64458c4bce9f4d2ca2105bcd2276098bc61e0c6968e9cf6b1d881ab6dea2c3945c88
-
C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe.exe
Filesize33KB
MD58d05ecf2ab1c6977a588ea5d668050ab
SHA1ba402e1035ec8f5d1c686752584993395aa9e1b9
SHA256caa73b1e0d729f03de5e8deee8316dd0e1976f1ba3fedb0c6a85dd4096c109d3
SHA5124827c4aab9ffc7a9857e399b8b8480fe842a61e92193ab50ca6ed557884d64458c4bce9f4d2ca2105bcd2276098bc61e0c6968e9cf6b1d881ab6dea2c3945c88
-
Filesize
26KB
MD53b3bb3d8ab4a2a4e6d740495a52d6e25
SHA1a97eacc11f455bcb7de6b924df8a64d99062ce34
SHA25612c99fb5c6b78e193dd16bc5eb659b4a7510e51fef318914ad76414bec69a4a2
SHA512d70b5417117116c85e790150f311f489e25104861ffb0888bcdf7b6ab8411e2777318801eb97552ae5e373aaf21c142e16f9871326d630c6335ad80031c738ee
-
Filesize
26KB
MD53b3bb3d8ab4a2a4e6d740495a52d6e25
SHA1a97eacc11f455bcb7de6b924df8a64d99062ce34
SHA25612c99fb5c6b78e193dd16bc5eb659b4a7510e51fef318914ad76414bec69a4a2
SHA512d70b5417117116c85e790150f311f489e25104861ffb0888bcdf7b6ab8411e2777318801eb97552ae5e373aaf21c142e16f9871326d630c6335ad80031c738ee
-
Filesize
26KB
MD53b3bb3d8ab4a2a4e6d740495a52d6e25
SHA1a97eacc11f455bcb7de6b924df8a64d99062ce34
SHA25612c99fb5c6b78e193dd16bc5eb659b4a7510e51fef318914ad76414bec69a4a2
SHA512d70b5417117116c85e790150f311f489e25104861ffb0888bcdf7b6ab8411e2777318801eb97552ae5e373aaf21c142e16f9871326d630c6335ad80031c738ee
-
Filesize
26KB
MD53b3bb3d8ab4a2a4e6d740495a52d6e25
SHA1a97eacc11f455bcb7de6b924df8a64d99062ce34
SHA25612c99fb5c6b78e193dd16bc5eb659b4a7510e51fef318914ad76414bec69a4a2
SHA512d70b5417117116c85e790150f311f489e25104861ffb0888bcdf7b6ab8411e2777318801eb97552ae5e373aaf21c142e16f9871326d630c6335ad80031c738ee
-
Filesize
10B
MD581570c50286369016cef7a9f904c4b04
SHA1b5758b23667cb35cad0adb23371b830fcee4f4e5
SHA256b882f41a5c84d248a75714eaf215a9e363a49361b6a14beedb921ee3dfdb46a1
SHA5120e6c479b0252e24635810b7d030cc9b5b17603ee20ccf62812446b8d15884521c6c7be65dfc0090bb1502e859fae27c2a63b3e58be714021f473a88407982162
-
\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe
Filesize33KB
MD58d05ecf2ab1c6977a588ea5d668050ab
SHA1ba402e1035ec8f5d1c686752584993395aa9e1b9
SHA256caa73b1e0d729f03de5e8deee8316dd0e1976f1ba3fedb0c6a85dd4096c109d3
SHA5124827c4aab9ffc7a9857e399b8b8480fe842a61e92193ab50ca6ed557884d64458c4bce9f4d2ca2105bcd2276098bc61e0c6968e9cf6b1d881ab6dea2c3945c88