Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe
Resource
win10v2004-20230915-en
General
-
Target
6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe
-
Size
219KB
-
MD5
362bff72d4a1d8d1b52e6dec620272f2
-
SHA1
f41957154db4efc1949717b9d1a0d784df47b038
-
SHA256
6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f
-
SHA512
6a85807d8b772ce2f70813ebdb285976dec8a9be5684345db9b95b3b7a72184c920872c316a07ceedfa6c8ed0c6c97d4eaad1933acf671949a4acb00194bd87a
-
SSDEEP
3072:pykuJVLjZ5/v+1oOAFJ1LQjoT9T+WE+CHxTEnAdL/frrcJ+Q5S75nzU6DER:5uJN9OIJ1MoTpLCHxTEnAdrcJun/ER
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2708 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2996 Logo1_.exe 2576 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe -
Loads dropped DLL 1 IoCs
pid Process 2708 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe File created C:\Windows\Logo1_.exe 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2996 Logo1_.exe 2996 Logo1_.exe 2996 Logo1_.exe 2996 Logo1_.exe 2996 Logo1_.exe 2996 Logo1_.exe 2996 Logo1_.exe 2996 Logo1_.exe 2996 Logo1_.exe 2996 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2708 1888 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 28 PID 1888 wrote to memory of 2708 1888 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 28 PID 1888 wrote to memory of 2708 1888 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 28 PID 1888 wrote to memory of 2708 1888 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 28 PID 1888 wrote to memory of 2996 1888 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 29 PID 1888 wrote to memory of 2996 1888 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 29 PID 1888 wrote to memory of 2996 1888 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 29 PID 1888 wrote to memory of 2996 1888 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 29 PID 2996 wrote to memory of 2684 2996 Logo1_.exe 30 PID 2996 wrote to memory of 2684 2996 Logo1_.exe 30 PID 2996 wrote to memory of 2684 2996 Logo1_.exe 30 PID 2996 wrote to memory of 2684 2996 Logo1_.exe 30 PID 2684 wrote to memory of 2660 2684 net.exe 33 PID 2684 wrote to memory of 2660 2684 net.exe 33 PID 2684 wrote to memory of 2660 2684 net.exe 33 PID 2684 wrote to memory of 2660 2684 net.exe 33 PID 2708 wrote to memory of 2576 2708 cmd.exe 34 PID 2708 wrote to memory of 2576 2708 cmd.exe 34 PID 2708 wrote to memory of 2576 2708 cmd.exe 34 PID 2708 wrote to memory of 2576 2708 cmd.exe 34 PID 2996 wrote to memory of 1348 2996 Logo1_.exe 16 PID 2996 wrote to memory of 1348 2996 Logo1_.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe"C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a6BCD.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe"C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe"4⤵
- Executes dropped EXE
PID:2576
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2660
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5d3f033c2d6204b7a3003dca36688228d
SHA1c14a1585f4c982230458a7edf94d70ff79f0e53e
SHA2569519d629f5db5a1efa77ba49048aacd24040f4d3373af44975dd25e61ea57cdd
SHA512762cce8bb2dfd19851bb725dddf29ffbcaba6f309362f4366202efd69e397c727cb3e0f8895dce3f2dd3bf7546ba2b168ecce1b2fe11606d4d545586c1ed3b6a
-
Filesize
474KB
MD5b64f00ca47092ef22416f70d5aa78fa6
SHA1838f6038dabbb6936679e562133e96756c78bf2c
SHA256d5c7eca76122a2ac5c42cc8d48ff5644e8c2d72282c6dc3c30e33d69d4a788cf
SHA512b395f15a545d84a77f526f019dc69b03582f26fa6d2ff222b3cc0c5633f3e3aa722d477eefdb830a672650ebf628a0b897288793fc583cbb7f01485619a77c4e
-
Filesize
722B
MD55fe1be9cb57925ce0cacb3112693250f
SHA1e1b4cb69f47f21bdcea4acb23d95e6cdad46e997
SHA256c4d12407ad2981083c6d2a841338109d17492c5abf803792f26bf96eb53b0487
SHA512686a2e067544e280201ee23d1d11dc062544baa1206dced9c799851146ae07b6a89110d2772fb40e18d5a28e1e746696f0839dd63781a2643fd0b9e28f324a00
-
Filesize
722B
MD55fe1be9cb57925ce0cacb3112693250f
SHA1e1b4cb69f47f21bdcea4acb23d95e6cdad46e997
SHA256c4d12407ad2981083c6d2a841338109d17492c5abf803792f26bf96eb53b0487
SHA512686a2e067544e280201ee23d1d11dc062544baa1206dced9c799851146ae07b6a89110d2772fb40e18d5a28e1e746696f0839dd63781a2643fd0b9e28f324a00
-
C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe
Filesize190KB
MD522f7ac91c7ffe88a17eaf9224182ebe0
SHA1f459180230fe61638339876450328581c93f41f0
SHA2561c3ca06fa431bdf123f8bab5e71a691078fe694886002382e52ecf9da7165b7e
SHA51207d988d6df58fbf7a260a8a7c1155a999f50cf162950232b68e63fb38e28c25b35781f5a6f4ffbec9f3c60e266c41fb98bcb182ab7a6b71203f8476d94251d02
-
C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe.exe
Filesize190KB
MD522f7ac91c7ffe88a17eaf9224182ebe0
SHA1f459180230fe61638339876450328581c93f41f0
SHA2561c3ca06fa431bdf123f8bab5e71a691078fe694886002382e52ecf9da7165b7e
SHA51207d988d6df58fbf7a260a8a7c1155a999f50cf162950232b68e63fb38e28c25b35781f5a6f4ffbec9f3c60e266c41fb98bcb182ab7a6b71203f8476d94251d02
-
Filesize
29KB
MD5cf88808bf1a7bb211e559a06b88bcb9d
SHA1494e46d62930a122e416356c9d2cec58d7fd7e45
SHA2564bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4
SHA512e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65
-
Filesize
29KB
MD5cf88808bf1a7bb211e559a06b88bcb9d
SHA1494e46d62930a122e416356c9d2cec58d7fd7e45
SHA2564bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4
SHA512e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65
-
Filesize
29KB
MD5cf88808bf1a7bb211e559a06b88bcb9d
SHA1494e46d62930a122e416356c9d2cec58d7fd7e45
SHA2564bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4
SHA512e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65
-
Filesize
29KB
MD5cf88808bf1a7bb211e559a06b88bcb9d
SHA1494e46d62930a122e416356c9d2cec58d7fd7e45
SHA2564bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4
SHA512e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65
-
Filesize
10B
MD5a592e6708558f3dc0ad1608608da69c5
SHA169a1224ba3b2f2ab2f2ce8b8287809f3282d20d0
SHA25624c83924da516d8acac4cdc96680306f1e34a8a54696bf5bf24106eeb562195a
SHA51238724fff525de3d5b413bb962c2f81369068403f761f69d00f25cd03b5d8cb83603cd6d23c87faf458f157acf585ca4db031fe6640704a4158cb5ead56ce79f1
-
\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe
Filesize190KB
MD522f7ac91c7ffe88a17eaf9224182ebe0
SHA1f459180230fe61638339876450328581c93f41f0
SHA2561c3ca06fa431bdf123f8bab5e71a691078fe694886002382e52ecf9da7165b7e
SHA51207d988d6df58fbf7a260a8a7c1155a999f50cf162950232b68e63fb38e28c25b35781f5a6f4ffbec9f3c60e266c41fb98bcb182ab7a6b71203f8476d94251d02