Analysis
-
max time kernel
151s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
28/10/2023, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
Resource
win10v2004-20231020-en
General
-
Target
f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
-
Size
207KB
-
MD5
0816c5fcff41e9523e003e400ad116f8
-
SHA1
d8f38f6d6e1ed8ac2838a59d4367605154033ee1
-
SHA256
f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75
-
SHA512
7f093e9a7e850861320e28d8b7a906e14cec80175eda567fc066129f6e10d960980693011bb4e8b68e0285c661be4b6689317633b88fe1b88784fc59163bdd9c
-
SSDEEP
6144:8VfjmNAni3F8QrBAmWt9h8QlLISZWVRohcq7d:+7+Gi35rBRy9hdFIdRoGU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 752 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2412 Logo1_.exe 2700 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe -
Loads dropped DLL 2 IoCs
pid Process 752 cmd.exe 752 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Uninstall Information\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe File created C:\Windows\Logo1_.exe f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2880 wrote to memory of 752 2880 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 28 PID 2880 wrote to memory of 752 2880 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 28 PID 2880 wrote to memory of 752 2880 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 28 PID 2880 wrote to memory of 752 2880 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 28 PID 2880 wrote to memory of 2412 2880 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 30 PID 2880 wrote to memory of 2412 2880 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 30 PID 2880 wrote to memory of 2412 2880 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 30 PID 2880 wrote to memory of 2412 2880 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 30 PID 2412 wrote to memory of 2376 2412 Logo1_.exe 31 PID 2412 wrote to memory of 2376 2412 Logo1_.exe 31 PID 2412 wrote to memory of 2376 2412 Logo1_.exe 31 PID 2412 wrote to memory of 2376 2412 Logo1_.exe 31 PID 752 wrote to memory of 2700 752 cmd.exe 34 PID 752 wrote to memory of 2700 752 cmd.exe 34 PID 752 wrote to memory of 2700 752 cmd.exe 34 PID 752 wrote to memory of 2700 752 cmd.exe 34 PID 2376 wrote to memory of 2668 2376 net.exe 33 PID 2376 wrote to memory of 2668 2376 net.exe 33 PID 2376 wrote to memory of 2668 2376 net.exe 33 PID 2376 wrote to memory of 2668 2376 net.exe 33 PID 2412 wrote to memory of 1240 2412 Logo1_.exe 7 PID 2412 wrote to memory of 1240 2412 Logo1_.exe 7
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe"C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a7484.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe"C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe"4⤵
- Executes dropped EXE
PID:2700
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2668
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5ba1ae91f649513f63c700a79403d82fb
SHA18f0e5ea9268ec7c8ac573b5260ef849e87576a13
SHA256310dbdd8343d5110a05dc247ec7ef6568f388eb0fba7269516c408d36326681c
SHA5128fbbe569de9256e50289ae5fa1b7ba94a34f528494d81dc900e96fc9546907d6fae7cd32b72d4d6fdc9b364aa63924d18b23dbd11106043d6e7f0c75d7b99c72
-
Filesize
722B
MD5ba1ae91f649513f63c700a79403d82fb
SHA18f0e5ea9268ec7c8ac573b5260ef849e87576a13
SHA256310dbdd8343d5110a05dc247ec7ef6568f388eb0fba7269516c408d36326681c
SHA5128fbbe569de9256e50289ae5fa1b7ba94a34f528494d81dc900e96fc9546907d6fae7cd32b72d4d6fdc9b364aa63924d18b23dbd11106043d6e7f0c75d7b99c72
-
C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
Filesize181KB
MD5be535d8b68dd064442f73211466e5987
SHA1aa49313d9513fd9c2d2b25da09ea24d09cc03435
SHA256c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59
SHA512eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638
-
C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe.exe
Filesize181KB
MD5be535d8b68dd064442f73211466e5987
SHA1aa49313d9513fd9c2d2b25da09ea24d09cc03435
SHA256c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59
SHA512eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638
-
Filesize
26KB
MD5d375bd04f866e1b3276ba3b9779966ad
SHA11da9855e29a5384522563e0c4bdac786712d8b12
SHA256a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be
SHA51278aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10
-
Filesize
26KB
MD5d375bd04f866e1b3276ba3b9779966ad
SHA11da9855e29a5384522563e0c4bdac786712d8b12
SHA256a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be
SHA51278aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10
-
Filesize
26KB
MD5d375bd04f866e1b3276ba3b9779966ad
SHA11da9855e29a5384522563e0c4bdac786712d8b12
SHA256a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be
SHA51278aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10
-
Filesize
26KB
MD5d375bd04f866e1b3276ba3b9779966ad
SHA11da9855e29a5384522563e0c4bdac786712d8b12
SHA256a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be
SHA51278aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10
-
Filesize
10B
MD503d3ebeca3d19630e02fda3c0e9d35b3
SHA156283b1f54235b653d0224cca2e3bbf10a0f7ae1
SHA256865a0d9b66a168264e3a3b734eb9b719a4e207988cb0880ed54c5d69e9af8163
SHA512e6c9eb80b92a7840e6f2cb04e34403ac8abd3a3439f4998d9e11b26c2989b0dda11131a772fa7c54d9882f95d167d4b33e5e87035e9654033b75fff13efd7f3b
-
\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
Filesize181KB
MD5be535d8b68dd064442f73211466e5987
SHA1aa49313d9513fd9c2d2b25da09ea24d09cc03435
SHA256c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59
SHA512eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638
-
\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
Filesize181KB
MD5be535d8b68dd064442f73211466e5987
SHA1aa49313d9513fd9c2d2b25da09ea24d09cc03435
SHA256c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59
SHA512eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638