Analysis
-
max time kernel
153s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe
Resource
win10v2004-20230915-en
General
-
Target
e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe
-
Size
1.2MB
-
MD5
cc65649a3b3f111c5cdc366def31bb7d
-
SHA1
767adfea06b0506d969741e5aeea5b94577bcd80
-
SHA256
e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f
-
SHA512
93448435482ce9110672c1af9dc2bedac8593a53c511317b34a04f18335fbff0f5818dc92860bf95e5ca064a20bd9a150dee03a75126c13dac757cb0860cd91c
-
SSDEEP
24576:L7jFDh3ih3XeodfDaJbTG6HAAr4EttjIenf+Yz+/:L7jFF3iBzdLOb5Hp48tgB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2996 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2640 Logo1_.exe 3024 e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe -
Loads dropped DLL 2 IoCs
pid Process 2996 cmd.exe 2996 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Desert\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7z.exe Logo1_.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe File created C:\Windows\Logo1_.exe e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2640 Logo1_.exe 2640 Logo1_.exe 2640 Logo1_.exe 2640 Logo1_.exe 2640 Logo1_.exe 2640 Logo1_.exe 2640 Logo1_.exe 2640 Logo1_.exe 2640 Logo1_.exe 2640 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2996 2576 e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe 28 PID 2576 wrote to memory of 2996 2576 e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe 28 PID 2576 wrote to memory of 2996 2576 e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe 28 PID 2576 wrote to memory of 2996 2576 e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe 28 PID 2576 wrote to memory of 2640 2576 e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe 30 PID 2576 wrote to memory of 2640 2576 e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe 30 PID 2576 wrote to memory of 2640 2576 e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe 30 PID 2576 wrote to memory of 2640 2576 e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe 30 PID 2640 wrote to memory of 2616 2640 Logo1_.exe 31 PID 2640 wrote to memory of 2616 2640 Logo1_.exe 31 PID 2640 wrote to memory of 2616 2640 Logo1_.exe 31 PID 2640 wrote to memory of 2616 2640 Logo1_.exe 31 PID 2616 wrote to memory of 2364 2616 net.exe 33 PID 2616 wrote to memory of 2364 2616 net.exe 33 PID 2616 wrote to memory of 2364 2616 net.exe 33 PID 2616 wrote to memory of 2364 2616 net.exe 33 PID 2996 wrote to memory of 3024 2996 cmd.exe 34 PID 2996 wrote to memory of 3024 2996 cmd.exe 34 PID 2996 wrote to memory of 3024 2996 cmd.exe 34 PID 2996 wrote to memory of 3024 2996 cmd.exe 34 PID 2640 wrote to memory of 1216 2640 Logo1_.exe 6 PID 2640 wrote to memory of 1216 2640 Logo1_.exe 6
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe"C:\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a93B7.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe"C:\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe"4⤵
- Executes dropped EXE
PID:3024
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2364
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD58ee4869d45087b8936368461175ec914
SHA151657e90d3c86ce5b770fa493e8bfb176bf60a5b
SHA25655811b05b7c8d3e815647b2576711768f69ee3ac73f7ba162b663b8512af9304
SHA512ad593034984ec8ab548f2c85d88568905ce15c2ac8335072e47d5cbe364199c3ce34dc98809db13ce835abf940ac86ffbe79f91f45566e1a843b6620c4c25783
-
Filesize
722B
MD54fed66ea8b6a7dc6960bd0f4147a54c1
SHA1ec868cdf9446a2ee8ae7aa613dc7cca2c601ad14
SHA256ac7d9d4372cb746bd1c8bb055a9d273cdae75d0a83d8167257c1579c98630436
SHA51220785e621981a453a1bfae192b0fe6373dbddd19dbd6d56b12367f37367ecbe7f7f933c6f4e152d28357d3a297a57feacaff3d041b2c4b7b59a685e7795647e0
-
Filesize
722B
MD54fed66ea8b6a7dc6960bd0f4147a54c1
SHA1ec868cdf9446a2ee8ae7aa613dc7cca2c601ad14
SHA256ac7d9d4372cb746bd1c8bb055a9d273cdae75d0a83d8167257c1579c98630436
SHA51220785e621981a453a1bfae192b0fe6373dbddd19dbd6d56b12367f37367ecbe7f7f933c6f4e152d28357d3a297a57feacaff3d041b2c4b7b59a685e7795647e0
-
C:\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe
Filesize1.2MB
MD5b1519cbcbf4f6be2304c0641c38204f3
SHA18d981b9c5eca16108ec5982c8733281f7e18d67c
SHA2568afbe1aa9a763d1826f44c2446454ffcffcd2fe9392fc4f527520e4acfdfffa2
SHA512b487747d0b357760e590c9c7f3711c0cbac734888f6b21cdcd7af83972d1281ad980c6ab2a113163ee318a096a95aa7ff7a1d9fdb916ad05cddd98a643187df9
-
C:\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe.exe
Filesize1.2MB
MD5b1519cbcbf4f6be2304c0641c38204f3
SHA18d981b9c5eca16108ec5982c8733281f7e18d67c
SHA2568afbe1aa9a763d1826f44c2446454ffcffcd2fe9392fc4f527520e4acfdfffa2
SHA512b487747d0b357760e590c9c7f3711c0cbac734888f6b21cdcd7af83972d1281ad980c6ab2a113163ee318a096a95aa7ff7a1d9fdb916ad05cddd98a643187df9
-
Filesize
26KB
MD5b3b06deb198b202a65ff721b4bfcf030
SHA157416046b156d2935cc2eab344d32365e530ca90
SHA256ee04bf7b1421c820f4cf2785d33d00a409caf24228470f5ad1df359f2997cd6a
SHA51276d7f398197ee7d9f6349505f849d8e04d8b66aa02ed1376d3caa598afdd181a8450d95fdac0ea51ec2de9a8b1faff85fd53ad54ec5777ac92c960a658349082
-
Filesize
26KB
MD5b3b06deb198b202a65ff721b4bfcf030
SHA157416046b156d2935cc2eab344d32365e530ca90
SHA256ee04bf7b1421c820f4cf2785d33d00a409caf24228470f5ad1df359f2997cd6a
SHA51276d7f398197ee7d9f6349505f849d8e04d8b66aa02ed1376d3caa598afdd181a8450d95fdac0ea51ec2de9a8b1faff85fd53ad54ec5777ac92c960a658349082
-
Filesize
26KB
MD5b3b06deb198b202a65ff721b4bfcf030
SHA157416046b156d2935cc2eab344d32365e530ca90
SHA256ee04bf7b1421c820f4cf2785d33d00a409caf24228470f5ad1df359f2997cd6a
SHA51276d7f398197ee7d9f6349505f849d8e04d8b66aa02ed1376d3caa598afdd181a8450d95fdac0ea51ec2de9a8b1faff85fd53ad54ec5777ac92c960a658349082
-
Filesize
26KB
MD5b3b06deb198b202a65ff721b4bfcf030
SHA157416046b156d2935cc2eab344d32365e530ca90
SHA256ee04bf7b1421c820f4cf2785d33d00a409caf24228470f5ad1df359f2997cd6a
SHA51276d7f398197ee7d9f6349505f849d8e04d8b66aa02ed1376d3caa598afdd181a8450d95fdac0ea51ec2de9a8b1faff85fd53ad54ec5777ac92c960a658349082
-
Filesize
10B
MD5dbf19ca54500e964528b156763234c1d
SHA105376f86423aec8badf0adbc47887234ac83ef5a
SHA256bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae
SHA512fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0
-
\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe
Filesize1.2MB
MD5b1519cbcbf4f6be2304c0641c38204f3
SHA18d981b9c5eca16108ec5982c8733281f7e18d67c
SHA2568afbe1aa9a763d1826f44c2446454ffcffcd2fe9392fc4f527520e4acfdfffa2
SHA512b487747d0b357760e590c9c7f3711c0cbac734888f6b21cdcd7af83972d1281ad980c6ab2a113163ee318a096a95aa7ff7a1d9fdb916ad05cddd98a643187df9
-
\Users\Admin\AppData\Local\Temp\e47a436f8a84d4dcc9613163ff68926c6823329be7402dd19cad3644341f3e0f.exe
Filesize1.2MB
MD5b1519cbcbf4f6be2304c0641c38204f3
SHA18d981b9c5eca16108ec5982c8733281f7e18d67c
SHA2568afbe1aa9a763d1826f44c2446454ffcffcd2fe9392fc4f527520e4acfdfffa2
SHA512b487747d0b357760e590c9c7f3711c0cbac734888f6b21cdcd7af83972d1281ad980c6ab2a113163ee318a096a95aa7ff7a1d9fdb916ad05cddd98a643187df9