Analysis
-
max time kernel
163s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15-10-2023 11:05
Static task
static1
Behavioral task
behavioral1
Sample
f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe
Resource
win10v2004-20230915-en
General
-
Target
f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe
-
Size
281KB
-
MD5
ba6ebbc5806c4d9a37e37a58f73bca71
-
SHA1
b9d0a987f5590dde50fa701f08f5eeddd3c140ea
-
SHA256
f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595
-
SHA512
8418b73aba15a5cefe1b4ca21ab46cf3c7205c5918454847e1ab9bee1b37b5ce8ad71c6b6f073f27c940f0dc77d665bab3c27742ea83c4c528c7111fdba3ff1c
-
SSDEEP
6144:hVfjmNZ4R9FEh4bBza+C+dDa62TdIGI1:X7+Z4RnbBzap+dDRwdg1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2052 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2560 Logo1_.exe 2732 f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe -
Loads dropped DLL 1 IoCs
pid Process 2052 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Games\SpiderSolitaire\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe File created C:\Windows\Logo1_.exe f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2052 2392 f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe 27 PID 2392 wrote to memory of 2052 2392 f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe 27 PID 2392 wrote to memory of 2052 2392 f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe 27 PID 2392 wrote to memory of 2052 2392 f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe 27 PID 2392 wrote to memory of 2560 2392 f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe 29 PID 2392 wrote to memory of 2560 2392 f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe 29 PID 2392 wrote to memory of 2560 2392 f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe 29 PID 2392 wrote to memory of 2560 2392 f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe 29 PID 2052 wrote to memory of 2732 2052 cmd.exe 31 PID 2052 wrote to memory of 2732 2052 cmd.exe 31 PID 2052 wrote to memory of 2732 2052 cmd.exe 31 PID 2052 wrote to memory of 2732 2052 cmd.exe 31 PID 2560 wrote to memory of 2700 2560 Logo1_.exe 30 PID 2560 wrote to memory of 2700 2560 Logo1_.exe 30 PID 2560 wrote to memory of 2700 2560 Logo1_.exe 30 PID 2560 wrote to memory of 2700 2560 Logo1_.exe 30 PID 2700 wrote to memory of 2724 2700 net.exe 33 PID 2700 wrote to memory of 2724 2700 net.exe 33 PID 2700 wrote to memory of 2724 2700 net.exe 33 PID 2700 wrote to memory of 2724 2700 net.exe 33 PID 2560 wrote to memory of 1216 2560 Logo1_.exe 8 PID 2560 wrote to memory of 1216 2560 Logo1_.exe 8
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe"C:\Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aAD5F.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe"C:\Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe"4⤵
- Executes dropped EXE
PID:2732
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2724
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5a5f841108cb82612ac7a5201c62b4a45
SHA12ae3a4fdd575978234f7b8f61b7fae72a4dd47ce
SHA256664355bb29bebcba02552eafee35fb26f9c8cadb6f71c42b8e16ed719b8e7ea8
SHA512dbe142d37e109eb972d6f59647a877760b29b2b26d5f992525a9617ef51d0010ec97ca508db7a306b604919211320922c317a3cd52faeacbc3e1a61269af251f
-
Filesize
722B
MD5a4d7da6c9c6da99a3c3c0657455d602f
SHA1b34e387da3a999122362bc5141d21cad715e402d
SHA25603c5c364452b3eb44d643a1df1541478fd981521fa93b08df3e7aee71419382d
SHA512ac55ecb47581581d28958df43a92a95583861ecb8ebd73069611142747eef0a0bec0b0e6a86e087722861d094c90ac55bd5ba9960fb5ea1284b5936cb352742f
-
Filesize
722B
MD5a4d7da6c9c6da99a3c3c0657455d602f
SHA1b34e387da3a999122362bc5141d21cad715e402d
SHA25603c5c364452b3eb44d643a1df1541478fd981521fa93b08df3e7aee71419382d
SHA512ac55ecb47581581d28958df43a92a95583861ecb8ebd73069611142747eef0a0bec0b0e6a86e087722861d094c90ac55bd5ba9960fb5ea1284b5936cb352742f
-
C:\Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe
Filesize255KB
MD5f5f28237064364217dce18618786f0b5
SHA11862cb54429347651cd52d555a56e240d11ab14c
SHA256ff01a872a745adb9228d93cc32f54680b9bf3fe9f4382edf1d5ccbfe3d75390d
SHA512d7e17bf52441a0e65461c35d06a84d3fd1f4c80a9a21164529e5742df4f7a1e02e086b3e4c0e3467c15bddb2385c609f70f39d67296f9848b401bcf6f50f742f
-
C:\Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe.exe
Filesize255KB
MD5f5f28237064364217dce18618786f0b5
SHA11862cb54429347651cd52d555a56e240d11ab14c
SHA256ff01a872a745adb9228d93cc32f54680b9bf3fe9f4382edf1d5ccbfe3d75390d
SHA512d7e17bf52441a0e65461c35d06a84d3fd1f4c80a9a21164529e5742df4f7a1e02e086b3e4c0e3467c15bddb2385c609f70f39d67296f9848b401bcf6f50f742f
-
Filesize
26KB
MD5b029778f3ac823d7c0b7150399fb9da1
SHA1f3f4b3615f75b7ff4992e41e62f7ceac37d06e11
SHA25634ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29
SHA512af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0
-
Filesize
26KB
MD5b029778f3ac823d7c0b7150399fb9da1
SHA1f3f4b3615f75b7ff4992e41e62f7ceac37d06e11
SHA25634ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29
SHA512af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0
-
Filesize
26KB
MD5b029778f3ac823d7c0b7150399fb9da1
SHA1f3f4b3615f75b7ff4992e41e62f7ceac37d06e11
SHA25634ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29
SHA512af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0
-
Filesize
26KB
MD5b029778f3ac823d7c0b7150399fb9da1
SHA1f3f4b3615f75b7ff4992e41e62f7ceac37d06e11
SHA25634ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29
SHA512af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0
-
Filesize
10B
MD53fa5f43b227b96d6334e4649982d21b7
SHA1aaca225fe44f532099d2d7d7b00d80ebc3dd003b
SHA256d8fdb800da5ad9cc8b64df32df8c6006127fb46c590ee39f84bfd8b4f8912358
SHA5122bf18238a4b94cb61fdd22c61007bc5cbb7fc712b69685cc03efc548622dc365f07159a6599192b1aed0c2ffa9911fbeb321323f7bf24c8706d52adff07e432e
-
\Users\Admin\AppData\Local\Temp\f26239ee0e3263e862d5df8aa89cea133837d2e474371ce7fa38c18a30676595.exe
Filesize255KB
MD5f5f28237064364217dce18618786f0b5
SHA11862cb54429347651cd52d555a56e240d11ab14c
SHA256ff01a872a745adb9228d93cc32f54680b9bf3fe9f4382edf1d5ccbfe3d75390d
SHA512d7e17bf52441a0e65461c35d06a84d3fd1f4c80a9a21164529e5742df4f7a1e02e086b3e4c0e3467c15bddb2385c609f70f39d67296f9848b401bcf6f50f742f