Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23-10-2023 07:47
Static task
static1
Behavioral task
behavioral1
Sample
201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe
Resource
win10v2004-20231020-en
General
-
Target
201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe
-
Size
116KB
-
MD5
a625bffbcc9f310a3998ca5ade8f14f4
-
SHA1
a76829a264359eccc14f4d30db97102234be49e8
-
SHA256
201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d
-
SHA512
1585c30d9b5ae16988c6b1c9ca924bf69b86b2b8b73bc6f235fd7c474db30c5f3628197bae95e22154c8ceaa2a615d950eddd0c580732a2dead218c4572811ec
-
SSDEEP
3072:BftffjmN3Jo/FQXy+uc//korlDFtNel3kaIFH/B0CyPvO3c0gCajNCg:JVfjmN3Jo/qi+k
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2056 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2716 Logo1_.exe 2760 201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe 2660 201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Uninstall Information\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMV12\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Oasis\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe File created C:\Windows\Logo1_.exe 201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2056 3060 201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe 28 PID 3060 wrote to memory of 2056 3060 201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe 28 PID 3060 wrote to memory of 2056 3060 201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe 28 PID 3060 wrote to memory of 2056 3060 201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe 28 PID 3060 wrote to memory of 2716 3060 201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe 30 PID 3060 wrote to memory of 2716 3060 201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe 30 PID 3060 wrote to memory of 2716 3060 201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe 30 PID 3060 wrote to memory of 2716 3060 201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe 30 PID 2716 wrote to memory of 2728 2716 Logo1_.exe 31 PID 2716 wrote to memory of 2728 2716 Logo1_.exe 31 PID 2716 wrote to memory of 2728 2716 Logo1_.exe 31 PID 2716 wrote to memory of 2728 2716 Logo1_.exe 31 PID 2728 wrote to memory of 2212 2728 net.exe 33 PID 2728 wrote to memory of 2212 2728 net.exe 33 PID 2728 wrote to memory of 2212 2728 net.exe 33 PID 2728 wrote to memory of 2212 2728 net.exe 33 PID 2716 wrote to memory of 1296 2716 Logo1_.exe 10 PID 2716 wrote to memory of 1296 2716 Logo1_.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe"C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a36C9.bat3⤵
- Deletes itself
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe"C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe"4⤵
- Executes dropped EXE
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe"C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe"4⤵
- Executes dropped EXE
PID:2660
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2212
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5bd68d43c687d28dd7a767928ee356a04
SHA1683eeecef7f75194de1fc21296a31742351ec07f
SHA256f50e651f61f0b43219f84425b96bb29d04067158c9a2090824501c128eb322f5
SHA512d5d8bbc180782a5c648a44003622105904ac4d39018083631d3f56eb9b3ccb2990f7b295670e2920d7420d8ca785311b245ae46cc15d93c18f91fd74d028ddd4
-
Filesize
471KB
MD531fc359d4ea62ce24909fc81dcc765b8
SHA118443edc555880d35e1ec8d067bfa3bf917388ad
SHA256898a77b72fb4c2668812447fa4177fb6d7bc3548b58e243f503b1feb8dd1568c
SHA5123709286616b02e3c4089922251fb2b71a64587bd247922b28abae9391970439a37ef32799e3d196b7a5ce5a9a818a930ce8404ed120a8fe5c2cd636d2d44caab
-
Filesize
722B
MD53bd60e0c7dead5cc0f76d85e95e9688e
SHA18d63c17ed79b1990c78d9b5fa98709b1003f7393
SHA2566c3facb2fc980c8a41c7d0e0e7b6c5a8e9c9cc94367b2313b5c7923b2d3f1d3e
SHA512b8c462ab7cc2c423a92199f0e7f22affeea024a6c40f6d0d152cd574c6792fe8df3870bc556dce9d12770b93aa3e1fdbde71b7c5e6a5d9b64aee3fc9c3bcf938
-
Filesize
722B
MD53bd60e0c7dead5cc0f76d85e95e9688e
SHA18d63c17ed79b1990c78d9b5fa98709b1003f7393
SHA2566c3facb2fc980c8a41c7d0e0e7b6c5a8e9c9cc94367b2313b5c7923b2d3f1d3e
SHA512b8c462ab7cc2c423a92199f0e7f22affeea024a6c40f6d0d152cd574c6792fe8df3870bc556dce9d12770b93aa3e1fdbde71b7c5e6a5d9b64aee3fc9c3bcf938
-
C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe
Filesize90KB
MD5c8c3b8fb878ce29b75a69219abff4ccf
SHA1e2e5d4feb0dff20ad1d83f72062f5816d365bc37
SHA2564656a73e3e8ae7ab4dc9bcdcda922f18787978c758871c9bd51e4340d46e5113
SHA51270c68e1c770cc806b2d2edf5d40cc86dd1781d8a01849cffc08a511133c1efcf892bd8a56dd4a7f8e307c46b038fff3a309ce9c1d78feb6190347ae6d77d6ad1
-
C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe
Filesize90KB
MD5c8c3b8fb878ce29b75a69219abff4ccf
SHA1e2e5d4feb0dff20ad1d83f72062f5816d365bc37
SHA2564656a73e3e8ae7ab4dc9bcdcda922f18787978c758871c9bd51e4340d46e5113
SHA51270c68e1c770cc806b2d2edf5d40cc86dd1781d8a01849cffc08a511133c1efcf892bd8a56dd4a7f8e307c46b038fff3a309ce9c1d78feb6190347ae6d77d6ad1
-
C:\Users\Admin\AppData\Local\Temp\201cff169b47cdb925ca24fe47584599281b6ecd0bb65e5960411e93dff7b59d.exe.exe
Filesize90KB
MD5c8c3b8fb878ce29b75a69219abff4ccf
SHA1e2e5d4feb0dff20ad1d83f72062f5816d365bc37
SHA2564656a73e3e8ae7ab4dc9bcdcda922f18787978c758871c9bd51e4340d46e5113
SHA51270c68e1c770cc806b2d2edf5d40cc86dd1781d8a01849cffc08a511133c1efcf892bd8a56dd4a7f8e307c46b038fff3a309ce9c1d78feb6190347ae6d77d6ad1
-
Filesize
26KB
MD52001b3d40d05330d0c289354fd39c442
SHA131c0c109110e336da3bdfee62d6986e50be0affd
SHA256ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815
SHA51292847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69
-
Filesize
26KB
MD52001b3d40d05330d0c289354fd39c442
SHA131c0c109110e336da3bdfee62d6986e50be0affd
SHA256ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815
SHA51292847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69
-
Filesize
26KB
MD52001b3d40d05330d0c289354fd39c442
SHA131c0c109110e336da3bdfee62d6986e50be0affd
SHA256ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815
SHA51292847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69
-
Filesize
26KB
MD52001b3d40d05330d0c289354fd39c442
SHA131c0c109110e336da3bdfee62d6986e50be0affd
SHA256ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815
SHA51292847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69
-
Filesize
10B
MD5e0b221b9338753deceb4d4e7a6bf13e8
SHA156521251ff5aab737b3617dd82eb07df74ad588f
SHA2563e46e7e2c6c9cf629a9230a5b1c5b196f727959b334cbb517641244ec5c4b065
SHA512391e4ed4ed44dc677fd663677cb7e69e4c23e4a3629940e46cf757d812395a7876a93c3568d12e5dd99e06b7068e22397694cf54723efa3f0f5789b9687b5810