Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe
Resource
win10v2004-20230915-en
General
-
Target
19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe
-
Size
51KB
-
MD5
e77b8b86174901216266223b515f1189
-
SHA1
fb3ca379e2bec24b4cd0286d7058776537b9e030
-
SHA256
19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8
-
SHA512
3d474788009edda095b4ad81e621172f3a772eb7ff54ba450c16b8128f8192c5493cbc612ab183c636fdab701e6a0f0c98baa10742e199b9c7c78b704060e0d2
-
SSDEEP
768:qS1ODKAaDMG8H92RwZNQSw+JnbmQj3FZJ9Vs9XnsD3Fqvota93nPYB1BW2qXMu:3fgLdQAQfwt7FZJ92BsDFqgtE3nioH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3040 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2180 Logo1_.exe 2776 19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 cmd.exe 3040 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\PROOF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Filters\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe File created C:\Windows\Logo1_.exe 19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2180 Logo1_.exe 2180 Logo1_.exe 2180 Logo1_.exe 2180 Logo1_.exe 2180 Logo1_.exe 2180 Logo1_.exe 2180 Logo1_.exe 2180 Logo1_.exe 2180 Logo1_.exe 2180 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3040 3020 19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe 34 PID 3020 wrote to memory of 3040 3020 19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe 34 PID 3020 wrote to memory of 3040 3020 19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe 34 PID 3020 wrote to memory of 3040 3020 19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe 34 PID 3020 wrote to memory of 2180 3020 19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe 32 PID 3020 wrote to memory of 2180 3020 19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe 32 PID 3020 wrote to memory of 2180 3020 19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe 32 PID 3020 wrote to memory of 2180 3020 19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe 32 PID 2180 wrote to memory of 2768 2180 Logo1_.exe 28 PID 2180 wrote to memory of 2768 2180 Logo1_.exe 28 PID 2180 wrote to memory of 2768 2180 Logo1_.exe 28 PID 2180 wrote to memory of 2768 2180 Logo1_.exe 28 PID 3040 wrote to memory of 2776 3040 cmd.exe 30 PID 3040 wrote to memory of 2776 3040 cmd.exe 30 PID 3040 wrote to memory of 2776 3040 cmd.exe 30 PID 3040 wrote to memory of 2776 3040 cmd.exe 30 PID 2768 wrote to memory of 2280 2768 net.exe 29 PID 2768 wrote to memory of 2280 2768 net.exe 29 PID 2768 wrote to memory of 2280 2768 net.exe 29 PID 2768 wrote to memory of 2280 2768 net.exe 29 PID 2180 wrote to memory of 1204 2180 Logo1_.exe 13 PID 2180 wrote to memory of 1204 2180 Logo1_.exe 13
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe"C:\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2180
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a75CC.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"1⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"2⤵PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe"C:\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe"1⤵
- Executes dropped EXE
PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5ac5f1057a35624d0bf3b989e038e314e
SHA1e5f90508df87123099bddfee06287a66d3ab35e1
SHA256f92c14b9ef9c0cdad7786d745a8b93eb2a484d049f07671b5051fa81f56499fd
SHA512b13a3cddc9c74a53a45d5ca1024811d0817f1ce181e2bf870a0be3d399130eded69b6110b86fcd91d8b11cd909fb89e0e9c57a61e05152711f12f52ae1abb5af
-
Filesize
471KB
MD51a0dbecba0dbb963c2f3b0448796d47a
SHA15c0b5d378d3614fe984ce2915b5720886992da0c
SHA2561ea2fb84177a921bc3df4763c3da53a970e192f93f6175d09696ded019e50cf8
SHA5128e25dc08fa6f280a6bc1ccacb1ce665ab055b5d539f8915915fc7536c90185a221cb0c50a02d34b521b871b8487a155b9c40a5f25df87306e1df24ca7e96da25
-
Filesize
722B
MD5a5ef25ca30f718726670797ec3ae7149
SHA10e8fb576ebd28b01fed7b22faca8a566aa2d3e55
SHA256c2f54503d58976ba7afef817b09d2234ce6c1f77526b8335209ac00c50ed2f5f
SHA5120296a52563f4df4c8458ace76ab8be2571a5a294a1ea4277d589d9a7aeeb1c3e288116dc373c15e081cc5bef651e89101474117d0be127e87a32732438860d5f
-
Filesize
722B
MD5a5ef25ca30f718726670797ec3ae7149
SHA10e8fb576ebd28b01fed7b22faca8a566aa2d3e55
SHA256c2f54503d58976ba7afef817b09d2234ce6c1f77526b8335209ac00c50ed2f5f
SHA5120296a52563f4df4c8458ace76ab8be2571a5a294a1ea4277d589d9a7aeeb1c3e288116dc373c15e081cc5bef651e89101474117d0be127e87a32732438860d5f
-
C:\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe
Filesize25KB
MD50c2963076517a9d8846455fcb0387dff
SHA18f003a0faec1747549a428dd0cb5d0448d07e0ce
SHA2569078d58d891638c3648b5a0f240a447b94e200c87be4795a4406552038659331
SHA512ca93928a27264a6b5556a89388820d1bc4da0615b79714c4ec06e8d90c8974debef3dc0ecd3cec092649686c1831f145bb357542034c8a1986f7e108faa85df8
-
C:\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe.exe
Filesize25KB
MD50c2963076517a9d8846455fcb0387dff
SHA18f003a0faec1747549a428dd0cb5d0448d07e0ce
SHA2569078d58d891638c3648b5a0f240a447b94e200c87be4795a4406552038659331
SHA512ca93928a27264a6b5556a89388820d1bc4da0615b79714c4ec06e8d90c8974debef3dc0ecd3cec092649686c1831f145bb357542034c8a1986f7e108faa85df8
-
Filesize
26KB
MD5f0299e92ce90cf3d86d8e1efb0096a22
SHA13c9547a206d732425f900eac3c75171defbbe45c
SHA25630e729cc3182e1812604c9aed941332efc4d720dba341a06e67fbdb387587b17
SHA512effd2663012174d5dfef919a6f808a281c08076479dce2ff6a2e5f52b6c387b2ec90e499cf341d1d664560b7c702ef25753fdff508e76b01ef96de1828d0ac39
-
Filesize
26KB
MD5f0299e92ce90cf3d86d8e1efb0096a22
SHA13c9547a206d732425f900eac3c75171defbbe45c
SHA25630e729cc3182e1812604c9aed941332efc4d720dba341a06e67fbdb387587b17
SHA512effd2663012174d5dfef919a6f808a281c08076479dce2ff6a2e5f52b6c387b2ec90e499cf341d1d664560b7c702ef25753fdff508e76b01ef96de1828d0ac39
-
Filesize
26KB
MD5f0299e92ce90cf3d86d8e1efb0096a22
SHA13c9547a206d732425f900eac3c75171defbbe45c
SHA25630e729cc3182e1812604c9aed941332efc4d720dba341a06e67fbdb387587b17
SHA512effd2663012174d5dfef919a6f808a281c08076479dce2ff6a2e5f52b6c387b2ec90e499cf341d1d664560b7c702ef25753fdff508e76b01ef96de1828d0ac39
-
Filesize
26KB
MD5f0299e92ce90cf3d86d8e1efb0096a22
SHA13c9547a206d732425f900eac3c75171defbbe45c
SHA25630e729cc3182e1812604c9aed941332efc4d720dba341a06e67fbdb387587b17
SHA512effd2663012174d5dfef919a6f808a281c08076479dce2ff6a2e5f52b6c387b2ec90e499cf341d1d664560b7c702ef25753fdff508e76b01ef96de1828d0ac39
-
Filesize
10B
MD5dbf19ca54500e964528b156763234c1d
SHA105376f86423aec8badf0adbc47887234ac83ef5a
SHA256bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae
SHA512fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0
-
\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe
Filesize25KB
MD50c2963076517a9d8846455fcb0387dff
SHA18f003a0faec1747549a428dd0cb5d0448d07e0ce
SHA2569078d58d891638c3648b5a0f240a447b94e200c87be4795a4406552038659331
SHA512ca93928a27264a6b5556a89388820d1bc4da0615b79714c4ec06e8d90c8974debef3dc0ecd3cec092649686c1831f145bb357542034c8a1986f7e108faa85df8
-
\Users\Admin\AppData\Local\Temp\19d2aab84ea0816322649ff25188c54d36b783882fa56a15a2ef14f66395d5e8.exe
Filesize25KB
MD50c2963076517a9d8846455fcb0387dff
SHA18f003a0faec1747549a428dd0cb5d0448d07e0ce
SHA2569078d58d891638c3648b5a0f240a447b94e200c87be4795a4406552038659331
SHA512ca93928a27264a6b5556a89388820d1bc4da0615b79714c4ec06e8d90c8974debef3dc0ecd3cec092649686c1831f145bb357542034c8a1986f7e108faa85df8