Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21-10-2023 09:11
Static task
static1
Behavioral task
behavioral1
Sample
6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
Resource
win10v2004-20231020-en
General
-
Target
6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
-
Size
86KB
-
MD5
71d0fbddb88e9f834205a05bf4f70265
-
SHA1
8abd11cc2735a90c6c411d9b411cf6c9bb8c3b76
-
SHA256
6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026
-
SHA512
f76bd916734684c17461aa4bfb61d485e7002de0b210ad5663c1b6dbd2876ffaa2bbcec0ab543dd9e59716e5d15c61af60de9cca08705975bd7e14b939662081
-
SSDEEP
1536:DfgLdQAQfcfymNANrCllSKgUWbCD4psuLP8xTYjPkepWJZCm:DftffjmNJvgqUpsuLP8xTYjPkepWJMm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2304 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2720 Logo1_.exe 2852 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe -
Loads dropped DLL 2 IoCs
pid Process 2304 cmd.exe 2304 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jre7\lib\zi\SystemV\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Lime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Logo1_.exe File created C:\Program Files\Java\jre7\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Updater6\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe File created C:\Windows\Logo1_.exe 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2304 2056 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 30 PID 2056 wrote to memory of 2304 2056 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 30 PID 2056 wrote to memory of 2304 2056 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 30 PID 2056 wrote to memory of 2304 2056 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 30 PID 2056 wrote to memory of 2720 2056 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 29 PID 2056 wrote to memory of 2720 2056 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 29 PID 2056 wrote to memory of 2720 2056 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 29 PID 2056 wrote to memory of 2720 2056 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 29 PID 2720 wrote to memory of 2796 2720 Logo1_.exe 28 PID 2720 wrote to memory of 2796 2720 Logo1_.exe 28 PID 2720 wrote to memory of 2796 2720 Logo1_.exe 28 PID 2720 wrote to memory of 2796 2720 Logo1_.exe 28 PID 2796 wrote to memory of 2788 2796 net.exe 33 PID 2796 wrote to memory of 2788 2796 net.exe 33 PID 2796 wrote to memory of 2788 2796 net.exe 33 PID 2796 wrote to memory of 2788 2796 net.exe 33 PID 2304 wrote to memory of 2852 2304 cmd.exe 34 PID 2304 wrote to memory of 2852 2304 cmd.exe 34 PID 2304 wrote to memory of 2852 2304 cmd.exe 34 PID 2304 wrote to memory of 2852 2304 cmd.exe 34 PID 2720 wrote to memory of 1268 2720 Logo1_.exe 11 PID 2720 wrote to memory of 1268 2720 Logo1_.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe"C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a75AD.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe"C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe"4⤵
- Executes dropped EXE
PID:2852
-
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"1⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"2⤵PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5a03df97f734993bcc08b38862bf169f0
SHA1e945faf4bf80062bb45dabe17d07ffd20a750709
SHA2567943c4ce6eb9285b4f08653e63fe8302e39637ac7618ef5dd8ea61d95768c681
SHA51229666fe4ba713b83efe66ebc57bf95bf4af0e14ea50ad44cb35642fbb8b903ad7dca2f04c5c56accf278bb8b49bd743a6f31b1565a8e215c8b013ef0d3c20d42
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD512ae921ca128b17f73797aa958d59149
SHA10d265c8aeee325cc854dd65544ca36341df8dc5e
SHA256fb3f68e88c905b6698cdf76398c7d86164df8afd00c8e426cce93b5c6c769873
SHA512787adcccdbe6c79649a31fbf6d4cb1dec1376685a5d87e847d28bcc8d65e149596a0b297e851185a66b930c39def80362b1cf446696a10a99627647de5c23f51
-
Filesize
722B
MD512ae921ca128b17f73797aa958d59149
SHA10d265c8aeee325cc854dd65544ca36341df8dc5e
SHA256fb3f68e88c905b6698cdf76398c7d86164df8afd00c8e426cce93b5c6c769873
SHA512787adcccdbe6c79649a31fbf6d4cb1dec1376685a5d87e847d28bcc8d65e149596a0b297e851185a66b930c39def80362b1cf446696a10a99627647de5c23f51
-
C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
Filesize60KB
MD589f0b7aa76594a5d30d04c24af5c5968
SHA15848d196944085ee1a8f24e6e3c699b19c4de474
SHA25612c6fe8f5c28563f33485eaa750b27763ec2cfcc5ef55ddb56d755782fd676f4
SHA512e05fcad7a8f8c7740d30b41e075cefea9ceca5dd63127311b629636ae8505e680dbfd1a3e93d56d7526bbe73808b257c2522ea16c6111119fc59dc7523dd3a6e
-
C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe.exe
Filesize60KB
MD589f0b7aa76594a5d30d04c24af5c5968
SHA15848d196944085ee1a8f24e6e3c699b19c4de474
SHA25612c6fe8f5c28563f33485eaa750b27763ec2cfcc5ef55ddb56d755782fd676f4
SHA512e05fcad7a8f8c7740d30b41e075cefea9ceca5dd63127311b629636ae8505e680dbfd1a3e93d56d7526bbe73808b257c2522ea16c6111119fc59dc7523dd3a6e
-
Filesize
26KB
MD59f8d43de4a935d654d72d0fe7fb50aaa
SHA1e9ff31454ac3bfc9a310529f62aee1468d56bcc5
SHA256d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288
SHA5127506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f
-
Filesize
26KB
MD59f8d43de4a935d654d72d0fe7fb50aaa
SHA1e9ff31454ac3bfc9a310529f62aee1468d56bcc5
SHA256d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288
SHA5127506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f
-
Filesize
26KB
MD59f8d43de4a935d654d72d0fe7fb50aaa
SHA1e9ff31454ac3bfc9a310529f62aee1468d56bcc5
SHA256d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288
SHA5127506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f
-
Filesize
26KB
MD59f8d43de4a935d654d72d0fe7fb50aaa
SHA1e9ff31454ac3bfc9a310529f62aee1468d56bcc5
SHA256d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288
SHA5127506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f
-
Filesize
10B
MD5d3c36a72fc1c8bd61b57107d5d012a29
SHA12a13da90a3c63c88dd43ae9c670876f0dd0fc03e
SHA256a2f94b462f3497d26399b1f5eda449b87e3ded10e09de07369f6a984eff5383d
SHA5124c08a9bdba23ece3ba391c1cd3696b046892c028f94e04e955fbee3a13dc181f1073c8f6e686529dd613bd468297d6b21a7de318ae61b88a2d642f3215c20232
-
\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
Filesize60KB
MD589f0b7aa76594a5d30d04c24af5c5968
SHA15848d196944085ee1a8f24e6e3c699b19c4de474
SHA25612c6fe8f5c28563f33485eaa750b27763ec2cfcc5ef55ddb56d755782fd676f4
SHA512e05fcad7a8f8c7740d30b41e075cefea9ceca5dd63127311b629636ae8505e680dbfd1a3e93d56d7526bbe73808b257c2522ea16c6111119fc59dc7523dd3a6e
-
\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
Filesize60KB
MD589f0b7aa76594a5d30d04c24af5c5968
SHA15848d196944085ee1a8f24e6e3c699b19c4de474
SHA25612c6fe8f5c28563f33485eaa750b27763ec2cfcc5ef55ddb56d755782fd676f4
SHA512e05fcad7a8f8c7740d30b41e075cefea9ceca5dd63127311b629636ae8505e680dbfd1a3e93d56d7526bbe73808b257c2522ea16c6111119fc59dc7523dd3a6e