Analysis
-
max time kernel
154s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe
Resource
win10v2004-20230915-en
General
-
Target
2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe
-
Size
99KB
-
MD5
ceea6638b83ca939a0df100d39de574b
-
SHA1
0c2d176a1b2b8e051d9998173835c523a7a2efa0
-
SHA256
2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524
-
SHA512
b3c8e659ed51a04d8035ee38e548faea672db93d2e8ec8bf3206610783e2389a7680408d3a30bfe0b16bc8cc89776e3792956992691bc8531038938ec01647d5
-
SSDEEP
1536:xfgLdQAQfwt7FZJ92BsQCKBAR2pmU/BGhkp3szGPpbTDblnYVJV1PBs:xftffepVPn4ARXU/HZ9/D8Ds
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3012 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2632 Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe File created C:\Windows\Logo1_.exe 2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe 2632 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2036 wrote to memory of 3012 2036 2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe 28 PID 2036 wrote to memory of 3012 2036 2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe 28 PID 2036 wrote to memory of 3012 2036 2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe 28 PID 2036 wrote to memory of 3012 2036 2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe 28 PID 2036 wrote to memory of 2632 2036 2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe 30 PID 2036 wrote to memory of 2632 2036 2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe 30 PID 2036 wrote to memory of 2632 2036 2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe 30 PID 2036 wrote to memory of 2632 2036 2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe 30 PID 2632 wrote to memory of 2824 2632 Logo1_.exe 31 PID 2632 wrote to memory of 2824 2632 Logo1_.exe 31 PID 2632 wrote to memory of 2824 2632 Logo1_.exe 31 PID 2632 wrote to memory of 2824 2632 Logo1_.exe 31 PID 2824 wrote to memory of 2556 2824 net.exe 33 PID 2824 wrote to memory of 2556 2824 net.exe 33 PID 2824 wrote to memory of 2556 2824 net.exe 33 PID 2824 wrote to memory of 2556 2824 net.exe 33 PID 2632 wrote to memory of 1196 2632 Logo1_.exe 9 PID 2632 wrote to memory of 1196 2632 Logo1_.exe 9
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe"C:\Users\Admin\AppData\Local\Temp\2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aB970.bat3⤵
- Deletes itself
PID:3012
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2556
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD51b0dbbcd259a81e268fbd4472f439d81
SHA1a17c0d024704171837eca4f86149684ee4e0dde2
SHA25639125e2afa4c0045c95f4a38683ce694928b45b6720e94fba30adae9e8054a55
SHA51257252a5a84ffaac6efef84d65e01186479ed98f7a5953ee4ba467f848efc4f3f3dda7dc472818f3c74272b6c57b05bdcf80f5251f9be40f3038f20bccfa816b7
-
Filesize
722B
MD51b0dbbcd259a81e268fbd4472f439d81
SHA1a17c0d024704171837eca4f86149684ee4e0dde2
SHA25639125e2afa4c0045c95f4a38683ce694928b45b6720e94fba30adae9e8054a55
SHA51257252a5a84ffaac6efef84d65e01186479ed98f7a5953ee4ba467f848efc4f3f3dda7dc472818f3c74272b6c57b05bdcf80f5251f9be40f3038f20bccfa816b7
-
C:\Users\Admin\AppData\Local\Temp\2dbb8d0990103bf4776bc627e8b41de2630053cc67533ed38d5d05b3da195524.exe.exe
Filesize73KB
MD5a2f63aa3630f40b95ea45dca951a6785
SHA180f8cf7e7134682e661b1bbc08979d14bce13793
SHA256ecb8c2817df29a2c6d5057dae4a4ffb4a7bf4ae3e33aeca4be9f635c06f0380f
SHA5125e35ad38e9852b489a77a6d5ad028c5645b6c6987a6fee2a660186c34afa6ffd6db1dd255fec3ea5a92dc462c02832c9ed10bfa1772f9fed9aa774774c6662d8
-
Filesize
26KB
MD58758044db9fce67ea2ad542f86e69e57
SHA160cc4d25ea4e17f676e8ac8be10b9dfe2f7ed67d
SHA2560c91b552dc6db19b6711e32cb8c9c604b60dc9d674be06cccb6adf08b4dbd82d
SHA512411737be53feaef0829190b6610c729b925949bcc0b4a65063ab393acb1a92c577093e6377a373704ce54d27a593f2faddc23c80c660638f7c304a93f1972c93
-
Filesize
26KB
MD58758044db9fce67ea2ad542f86e69e57
SHA160cc4d25ea4e17f676e8ac8be10b9dfe2f7ed67d
SHA2560c91b552dc6db19b6711e32cb8c9c604b60dc9d674be06cccb6adf08b4dbd82d
SHA512411737be53feaef0829190b6610c729b925949bcc0b4a65063ab393acb1a92c577093e6377a373704ce54d27a593f2faddc23c80c660638f7c304a93f1972c93
-
Filesize
26KB
MD58758044db9fce67ea2ad542f86e69e57
SHA160cc4d25ea4e17f676e8ac8be10b9dfe2f7ed67d
SHA2560c91b552dc6db19b6711e32cb8c9c604b60dc9d674be06cccb6adf08b4dbd82d
SHA512411737be53feaef0829190b6610c729b925949bcc0b4a65063ab393acb1a92c577093e6377a373704ce54d27a593f2faddc23c80c660638f7c304a93f1972c93
-
Filesize
26KB
MD58758044db9fce67ea2ad542f86e69e57
SHA160cc4d25ea4e17f676e8ac8be10b9dfe2f7ed67d
SHA2560c91b552dc6db19b6711e32cb8c9c604b60dc9d674be06cccb6adf08b4dbd82d
SHA512411737be53feaef0829190b6610c729b925949bcc0b4a65063ab393acb1a92c577093e6377a373704ce54d27a593f2faddc23c80c660638f7c304a93f1972c93
-
Filesize
10B
MD5b00c1a89b15effd3d1fb2de4fdc7bee5
SHA10c3a4f06bcd397d1d3a63ab2ca05e64cc7ae554d
SHA2560767fccea7e57d6427b0a9b440f28687f4b835409c5dcdeb337a479009222cd9
SHA512b50a3c1df331ecd7dbbd88c202c7b7b8fe6ece8df96249d88f40138952fb3c523f6f133a2d12daa2fd892643b53e4c19b39bcb16ef810f789c996e00bad03bc0