Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/10/2023, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe
Resource
win10v2004-20230915-en
General
-
Target
5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe
-
Size
131KB
-
MD5
797a54b56d8d9259eb282b2447f6f9c5
-
SHA1
185f7f1cae1b12a106783b7755be3e26c8ed25ff
-
SHA256
5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3
-
SHA512
6d6a6a82a0791c4b1208f380f589de38983d8e7632ab761a44a6fdb9ef93287d0ea24abb95fc85d343a057d8271b22ac55d3c9ccd933fcb3ae0f357751052ac0
-
SSDEEP
1536:LfgLdQAQfwt7FZJ92Bs+GJUEA4aze/uYYdI4UkHiairSazBZDx5XBNEfvDHDtzLD:LftffepVPJUBzqubdIiqVB32THDtzL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2200 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3036 Logo1_.exe 2664 5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe -
Loads dropped DLL 1 IoCs
pid Process 2200 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Slate\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\QUAD\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Biscay\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe File created C:\Windows\Logo1_.exe 5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2200 2332 5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe 28 PID 2332 wrote to memory of 2200 2332 5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe 28 PID 2332 wrote to memory of 2200 2332 5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe 28 PID 2332 wrote to memory of 2200 2332 5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe 28 PID 2332 wrote to memory of 3036 2332 5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe 30 PID 2332 wrote to memory of 3036 2332 5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe 30 PID 2332 wrote to memory of 3036 2332 5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe 30 PID 2332 wrote to memory of 3036 2332 5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe 30 PID 3036 wrote to memory of 2748 3036 Logo1_.exe 31 PID 3036 wrote to memory of 2748 3036 Logo1_.exe 31 PID 3036 wrote to memory of 2748 3036 Logo1_.exe 31 PID 3036 wrote to memory of 2748 3036 Logo1_.exe 31 PID 2200 wrote to memory of 2664 2200 cmd.exe 33 PID 2200 wrote to memory of 2664 2200 cmd.exe 33 PID 2200 wrote to memory of 2664 2200 cmd.exe 33 PID 2200 wrote to memory of 2664 2200 cmd.exe 33 PID 2748 wrote to memory of 2768 2748 net.exe 34 PID 2748 wrote to memory of 2768 2748 net.exe 34 PID 2748 wrote to memory of 2768 2748 net.exe 34 PID 2748 wrote to memory of 2768 2748 net.exe 34 PID 3036 wrote to memory of 1192 3036 Logo1_.exe 15 PID 3036 wrote to memory of 1192 3036 Logo1_.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe"C:\Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a57D0.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe"C:\Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe"4⤵
- Executes dropped EXE
PID:2664
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2768
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD598b49ee17c42dcde2553273bf9f0a878
SHA1dca15a51e33f07f3f1e65bec5e5cd4f2da94f8f7
SHA25602593a0102581257e3cc8deaa3fc6ed89435708e272476aa59fd530ccf1634b9
SHA512cd890dd5440a79c56ef31acd9818e97f0e2423defd353b056eb57ae2c8efeb0a97aeb1ace053a980452af30d3df1c4cb9eae25022e8aeafff15a9df74bc02297
-
Filesize
471KB
MD51a0dbecba0dbb963c2f3b0448796d47a
SHA15c0b5d378d3614fe984ce2915b5720886992da0c
SHA2561ea2fb84177a921bc3df4763c3da53a970e192f93f6175d09696ded019e50cf8
SHA5128e25dc08fa6f280a6bc1ccacb1ce665ab055b5d539f8915915fc7536c90185a221cb0c50a02d34b521b871b8487a155b9c40a5f25df87306e1df24ca7e96da25
-
Filesize
722B
MD561228341de4a6029230fb258ab6658b6
SHA1931219e3c1f5045e320c04d0e41c9b4ea522eb3e
SHA25603192e9947de5e74a6b5d758840a2ab94f17194a63050e73a3d0400101777f84
SHA512e10e4b6607013fc62ef7d4b429f021133b1227af7eea7dc31a12117fac2610001eddcf8320480718bd884cf459a9b66b6ee6d60797e1c1732bf8c5c52cb776f9
-
Filesize
722B
MD561228341de4a6029230fb258ab6658b6
SHA1931219e3c1f5045e320c04d0e41c9b4ea522eb3e
SHA25603192e9947de5e74a6b5d758840a2ab94f17194a63050e73a3d0400101777f84
SHA512e10e4b6607013fc62ef7d4b429f021133b1227af7eea7dc31a12117fac2610001eddcf8320480718bd884cf459a9b66b6ee6d60797e1c1732bf8c5c52cb776f9
-
C:\Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe
Filesize105KB
MD544b5c4f2fe8096f7e765e4a01abaf0b6
SHA1b5a4be1a39fb907fa19721d941e1d282a3287455
SHA2565460e930ba771c605f4aab4a801877952039b3258ebdca8c0ae0a1a4e262c82b
SHA51239c58b5665158d42b91a6ea15e3939795cca0b415aff46e7db21ed5c98cb8025ba4835d59745d813e7fc63ae2658ab636960fb877eef233a688b14de89a6c1e2
-
C:\Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe.exe
Filesize105KB
MD544b5c4f2fe8096f7e765e4a01abaf0b6
SHA1b5a4be1a39fb907fa19721d941e1d282a3287455
SHA2565460e930ba771c605f4aab4a801877952039b3258ebdca8c0ae0a1a4e262c82b
SHA51239c58b5665158d42b91a6ea15e3939795cca0b415aff46e7db21ed5c98cb8025ba4835d59745d813e7fc63ae2658ab636960fb877eef233a688b14de89a6c1e2
-
Filesize
26KB
MD54f89b2193307d4542523bda8155e02f3
SHA145ca5157b6ca2b043d65e4d34754a9be7aa83ef5
SHA256fdd0a26d61eb13743d2f7bf5c8b16760ab3ceb9748bdaa57d33ce682961d1f8b
SHA5129110a3f2f29cd14872d0ee96a772fb48d4ca26e09298b5a5337dac163f472f3500c1c46936366a08225dc956209807823ecd0ecee041cc10ae135b3abac8586d
-
Filesize
26KB
MD54f89b2193307d4542523bda8155e02f3
SHA145ca5157b6ca2b043d65e4d34754a9be7aa83ef5
SHA256fdd0a26d61eb13743d2f7bf5c8b16760ab3ceb9748bdaa57d33ce682961d1f8b
SHA5129110a3f2f29cd14872d0ee96a772fb48d4ca26e09298b5a5337dac163f472f3500c1c46936366a08225dc956209807823ecd0ecee041cc10ae135b3abac8586d
-
Filesize
26KB
MD54f89b2193307d4542523bda8155e02f3
SHA145ca5157b6ca2b043d65e4d34754a9be7aa83ef5
SHA256fdd0a26d61eb13743d2f7bf5c8b16760ab3ceb9748bdaa57d33ce682961d1f8b
SHA5129110a3f2f29cd14872d0ee96a772fb48d4ca26e09298b5a5337dac163f472f3500c1c46936366a08225dc956209807823ecd0ecee041cc10ae135b3abac8586d
-
Filesize
26KB
MD54f89b2193307d4542523bda8155e02f3
SHA145ca5157b6ca2b043d65e4d34754a9be7aa83ef5
SHA256fdd0a26d61eb13743d2f7bf5c8b16760ab3ceb9748bdaa57d33ce682961d1f8b
SHA5129110a3f2f29cd14872d0ee96a772fb48d4ca26e09298b5a5337dac163f472f3500c1c46936366a08225dc956209807823ecd0ecee041cc10ae135b3abac8586d
-
Filesize
10B
MD53fa5f43b227b96d6334e4649982d21b7
SHA1aaca225fe44f532099d2d7d7b00d80ebc3dd003b
SHA256d8fdb800da5ad9cc8b64df32df8c6006127fb46c590ee39f84bfd8b4f8912358
SHA5122bf18238a4b94cb61fdd22c61007bc5cbb7fc712b69685cc03efc548622dc365f07159a6599192b1aed0c2ffa9911fbeb321323f7bf24c8706d52adff07e432e
-
\Users\Admin\AppData\Local\Temp\5663ea0a4b252daeb85506d1e43fa10a495ce05cc7861efb28402caa523cabb3.exe
Filesize105KB
MD544b5c4f2fe8096f7e765e4a01abaf0b6
SHA1b5a4be1a39fb907fa19721d941e1d282a3287455
SHA2565460e930ba771c605f4aab4a801877952039b3258ebdca8c0ae0a1a4e262c82b
SHA51239c58b5665158d42b91a6ea15e3939795cca0b415aff46e7db21ed5c98cb8025ba4835d59745d813e7fc63ae2658ab636960fb877eef233a688b14de89a6c1e2