Analysis
-
max time kernel
151s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
28-10-2023 19:49
Static task
static1
Behavioral task
behavioral1
Sample
b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe
Resource
win10v2004-20231020-en
General
-
Target
b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe
-
Size
114KB
-
MD5
604a150cbd370b5e0522cd7cc663199b
-
SHA1
f0ee36c1d02ac37283f4b931ac6aae219fe25a79
-
SHA256
b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4
-
SHA512
dd8a8795c7d359d381b499c295ce525d8bf84d95e1f14629fe4678209d6bbeff55ac4ac669b8acd018fd8f489ac014f69c13a5de138754fbfd654ab3515bb361
-
SSDEEP
1536:4PrPr+fgLdQAQfcfymNUssn3wuZEJOkn+h/wo6t7qXof1F4O7Wv:bftffjmNUsNOjwXeXofXRWv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2680 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2720 Logo1_.exe 2804 b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe -
Loads dropped DLL 2 IoCs
pid Process 2680 cmd.exe 2680 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2680 2172 b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe 28 PID 2172 wrote to memory of 2680 2172 b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe 28 PID 2172 wrote to memory of 2680 2172 b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe 28 PID 2172 wrote to memory of 2680 2172 b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe 28 PID 2172 wrote to memory of 2720 2172 b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe 30 PID 2172 wrote to memory of 2720 2172 b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe 30 PID 2172 wrote to memory of 2720 2172 b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe 30 PID 2172 wrote to memory of 2720 2172 b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe 30 PID 2680 wrote to memory of 2804 2680 cmd.exe 32 PID 2680 wrote to memory of 2804 2680 cmd.exe 32 PID 2680 wrote to memory of 2804 2680 cmd.exe 32 PID 2680 wrote to memory of 2804 2680 cmd.exe 32 PID 2720 wrote to memory of 2696 2720 Logo1_.exe 31 PID 2720 wrote to memory of 2696 2720 Logo1_.exe 31 PID 2720 wrote to memory of 2696 2720 Logo1_.exe 31 PID 2720 wrote to memory of 2696 2720 Logo1_.exe 31 PID 2696 wrote to memory of 2860 2696 net.exe 34 PID 2696 wrote to memory of 2860 2696 net.exe 34 PID 2696 wrote to memory of 2860 2696 net.exe 34 PID 2696 wrote to memory of 2860 2696 net.exe 34 PID 2720 wrote to memory of 1372 2720 Logo1_.exe 21 PID 2720 wrote to memory of 1372 2720 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe"C:\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a7DA8.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe"C:\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe"4⤵
- Executes dropped EXE
PID:2804
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2860
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5864ec8c320de03d8fef6eab23a465698
SHA1f7eb396aed78d62fc24e58d0e76e9a62182b1ef9
SHA25671fe5b51182a2b16db5daa98017f6d2b5de1d13de8c89f3dd9f611079029f7ee
SHA51287bdf9b5d196d3d615804ac8b170cde0e60c48917fe2a458145ad805ea72656c7b25e889870274a1676b1a5c8cc3edc6689b8abc216b5057b84d7937aaef941b
-
Filesize
722B
MD5864ec8c320de03d8fef6eab23a465698
SHA1f7eb396aed78d62fc24e58d0e76e9a62182b1ef9
SHA25671fe5b51182a2b16db5daa98017f6d2b5de1d13de8c89f3dd9f611079029f7ee
SHA51287bdf9b5d196d3d615804ac8b170cde0e60c48917fe2a458145ad805ea72656c7b25e889870274a1676b1a5c8cc3edc6689b8abc216b5057b84d7937aaef941b
-
C:\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe
Filesize88KB
MD555f91028015f6b1a9d7b78ae35b002c2
SHA1972a97c29122c230d8b1d9edca39048ce486dca4
SHA2569eb065c70ced8980c33e06cf64ba6f78e5cacea1263f97eefaf6d323d7964f41
SHA512ae7eb11d9e0fc8249fd2973d203f5ce7c6da30e1ddd82d279648b6db192c53bed1b412ad151be6401b30f10b34801e47e1168b93c362d116766d71da804a8155
-
C:\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe.exe
Filesize88KB
MD555f91028015f6b1a9d7b78ae35b002c2
SHA1972a97c29122c230d8b1d9edca39048ce486dca4
SHA2569eb065c70ced8980c33e06cf64ba6f78e5cacea1263f97eefaf6d323d7964f41
SHA512ae7eb11d9e0fc8249fd2973d203f5ce7c6da30e1ddd82d279648b6db192c53bed1b412ad151be6401b30f10b34801e47e1168b93c362d116766d71da804a8155
-
Filesize
26KB
MD589a826a222d8a17bbfce712fc174a3d5
SHA143b9d54880723fd3881969a392314fa4518132e7
SHA256593e047cef4bfc3e6b21ac31921a4d59d190ed4e6e1538c0a2f4240764c47e3b
SHA512dcda5b853a2988e4823cc48a29ee3ed370f25dd2715adb5c9541aba74814063b043326a009956f299b7fabeb9d7d5d2a103130da7a7566167c516255cf6e15ab
-
Filesize
26KB
MD589a826a222d8a17bbfce712fc174a3d5
SHA143b9d54880723fd3881969a392314fa4518132e7
SHA256593e047cef4bfc3e6b21ac31921a4d59d190ed4e6e1538c0a2f4240764c47e3b
SHA512dcda5b853a2988e4823cc48a29ee3ed370f25dd2715adb5c9541aba74814063b043326a009956f299b7fabeb9d7d5d2a103130da7a7566167c516255cf6e15ab
-
Filesize
26KB
MD589a826a222d8a17bbfce712fc174a3d5
SHA143b9d54880723fd3881969a392314fa4518132e7
SHA256593e047cef4bfc3e6b21ac31921a4d59d190ed4e6e1538c0a2f4240764c47e3b
SHA512dcda5b853a2988e4823cc48a29ee3ed370f25dd2715adb5c9541aba74814063b043326a009956f299b7fabeb9d7d5d2a103130da7a7566167c516255cf6e15ab
-
Filesize
26KB
MD589a826a222d8a17bbfce712fc174a3d5
SHA143b9d54880723fd3881969a392314fa4518132e7
SHA256593e047cef4bfc3e6b21ac31921a4d59d190ed4e6e1538c0a2f4240764c47e3b
SHA512dcda5b853a2988e4823cc48a29ee3ed370f25dd2715adb5c9541aba74814063b043326a009956f299b7fabeb9d7d5d2a103130da7a7566167c516255cf6e15ab
-
Filesize
10B
MD503d3ebeca3d19630e02fda3c0e9d35b3
SHA156283b1f54235b653d0224cca2e3bbf10a0f7ae1
SHA256865a0d9b66a168264e3a3b734eb9b719a4e207988cb0880ed54c5d69e9af8163
SHA512e6c9eb80b92a7840e6f2cb04e34403ac8abd3a3439f4998d9e11b26c2989b0dda11131a772fa7c54d9882f95d167d4b33e5e87035e9654033b75fff13efd7f3b
-
\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe
Filesize88KB
MD555f91028015f6b1a9d7b78ae35b002c2
SHA1972a97c29122c230d8b1d9edca39048ce486dca4
SHA2569eb065c70ced8980c33e06cf64ba6f78e5cacea1263f97eefaf6d323d7964f41
SHA512ae7eb11d9e0fc8249fd2973d203f5ce7c6da30e1ddd82d279648b6db192c53bed1b412ad151be6401b30f10b34801e47e1168b93c362d116766d71da804a8155
-
\Users\Admin\AppData\Local\Temp\b4d462454e595a40b54ed415de9c47bc20861178195eb1377ea1945b5d7488f4.exe
Filesize88KB
MD555f91028015f6b1a9d7b78ae35b002c2
SHA1972a97c29122c230d8b1d9edca39048ce486dca4
SHA2569eb065c70ced8980c33e06cf64ba6f78e5cacea1263f97eefaf6d323d7964f41
SHA512ae7eb11d9e0fc8249fd2973d203f5ce7c6da30e1ddd82d279648b6db192c53bed1b412ad151be6401b30f10b34801e47e1168b93c362d116766d71da804a8155