Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
29/10/2023, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe
Resource
win10v2004-20231020-en
General
-
Target
c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe
-
Size
73KB
-
MD5
28fe22c05ac070edae12a5e1ea96ed26
-
SHA1
2b752aa3964397ef2329a704bff80dc4c60bbf57
-
SHA256
c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec
-
SHA512
2a22b37eb1c2c4bcc0d9114174a7ba6d6e77a9ae1c69c8d6f940bca85a9125f287be791b4e9a174970f3ae0cb3f498f744f31904af605acf62c02640af024b91
-
SSDEEP
1536:PfgLdQAQfcfymNDwewCzebOInd4qfymD8xQUf:PftffjmNDwMeb4mD8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 480 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2800 Logo1_.exe 2748 c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe -
Loads dropped DLL 1 IoCs
pid Process 480 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\OneNote.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Groove.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\deploy\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2800 Logo1_.exe 2800 Logo1_.exe 2800 Logo1_.exe 2800 Logo1_.exe 2800 Logo1_.exe 2800 Logo1_.exe 2800 Logo1_.exe 2800 Logo1_.exe 2800 Logo1_.exe 2800 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1952 wrote to memory of 480 1952 c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe 28 PID 1952 wrote to memory of 480 1952 c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe 28 PID 1952 wrote to memory of 480 1952 c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe 28 PID 1952 wrote to memory of 480 1952 c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe 28 PID 1952 wrote to memory of 2800 1952 c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe 30 PID 1952 wrote to memory of 2800 1952 c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe 30 PID 1952 wrote to memory of 2800 1952 c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe 30 PID 1952 wrote to memory of 2800 1952 c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe 30 PID 2800 wrote to memory of 2628 2800 Logo1_.exe 31 PID 2800 wrote to memory of 2628 2800 Logo1_.exe 31 PID 2800 wrote to memory of 2628 2800 Logo1_.exe 31 PID 2800 wrote to memory of 2628 2800 Logo1_.exe 31 PID 480 wrote to memory of 2748 480 cmd.exe 33 PID 480 wrote to memory of 2748 480 cmd.exe 33 PID 480 wrote to memory of 2748 480 cmd.exe 33 PID 480 wrote to memory of 2748 480 cmd.exe 33 PID 2628 wrote to memory of 2644 2628 net.exe 34 PID 2628 wrote to memory of 2644 2628 net.exe 34 PID 2628 wrote to memory of 2644 2628 net.exe 34 PID 2628 wrote to memory of 2644 2628 net.exe 34 PID 2800 wrote to memory of 1264 2800 Logo1_.exe 11 PID 2800 wrote to memory of 1264 2800 Logo1_.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe"C:\Users\Admin\AppData\Local\Temp\c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a5522.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Users\Admin\AppData\Local\Temp\c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe"C:\Users\Admin\AppData\Local\Temp\c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe"4⤵
- Executes dropped EXE
PID:2748
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2644
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5832d0a50d0afc4d02e450a2864bc1292
SHA110777dda86a970c9aa39e95b7dd2b4cba48dc497
SHA2564fd045265396cfbf2c824fbddb4405ed35dc1b2f5d6fa6112498776900978513
SHA51283d1c2ba6199874ea9bb409a914bab0412a59ace2622014f6bf2c4767ba943a59e5cc09961ded8c4c8594062a1d85457649f33a7dd81d6c2b8674ecb1eeab0b7
-
Filesize
471KB
MD599ea9b604a7a734d3087fa6159684c42
SHA1709fa1068ad4d560fe03e05b68056f1b0bedbfc8
SHA2563f733f9e6fec7c4165ca8ba41eb23f604a248babe794c4ad2c6c3ce8032aab1c
SHA5127af8008c7e187f925c62efc97e1891a7a38d089302dba39fbde137fb895e0592847ed0982c824c2075be8e6b95b6ce165ecb848ab85adf53779ebef613410fbb
-
Filesize
722B
MD5fa20e29baf8982a4f0180dc53dc62f51
SHA1f82f3c317487d52d98e2cb1504cbb4d8c2ddcbec
SHA2562bb1ab72641b073158f9b50254e081fc6b07daa6facb74ef226af6eaa786a5bb
SHA51214debf45264657db3d25ac1c324c5cc8f3c3b7b8aef04b657f5f56ba2e931745791a8a7b1bd083ca86fc22a14d72aedf76d94b3e5e0cf464768ad5f7c722b214
-
Filesize
722B
MD5fa20e29baf8982a4f0180dc53dc62f51
SHA1f82f3c317487d52d98e2cb1504cbb4d8c2ddcbec
SHA2562bb1ab72641b073158f9b50254e081fc6b07daa6facb74ef226af6eaa786a5bb
SHA51214debf45264657db3d25ac1c324c5cc8f3c3b7b8aef04b657f5f56ba2e931745791a8a7b1bd083ca86fc22a14d72aedf76d94b3e5e0cf464768ad5f7c722b214
-
C:\Users\Admin\AppData\Local\Temp\c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe
Filesize46KB
MD54e72b2688d56dbb4f910bfcfab3f14b2
SHA1a5315cba1cfe117f078b3864ebea2a2c67d3d917
SHA2565056f7ab6992658ca02ab06314b6ed59dbb10d5c90b529e9a626d34d8bf34e0f
SHA512e4771f17ffda255a65381d96191077d4dcf13c17fc13e5eefc39ade8e0235e3956ce47c317354d0d56061119643a39425a942a19f6846d37b0525fddb1709d21
-
C:\Users\Admin\AppData\Local\Temp\c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe.exe
Filesize46KB
MD54e72b2688d56dbb4f910bfcfab3f14b2
SHA1a5315cba1cfe117f078b3864ebea2a2c67d3d917
SHA2565056f7ab6992658ca02ab06314b6ed59dbb10d5c90b529e9a626d34d8bf34e0f
SHA512e4771f17ffda255a65381d96191077d4dcf13c17fc13e5eefc39ade8e0235e3956ce47c317354d0d56061119643a39425a942a19f6846d37b0525fddb1709d21
-
Filesize
26KB
MD50a2b391f78c278a94a6e20b5af2ae73f
SHA1e76ac8e0b5dcc82718b198153003ed12797be1a5
SHA256d5b0a11f0bd5b4f95f56de54e4e783f0bffa5e42d5e3877d40fc448061d19390
SHA51221c16cdeb6d563a85ff28444d29b160b3ace46ad037e1a4311230b2433de4db3357760c889b93f11e5bd4307956e9c0fd3d47f83c7d2ba8f7df2ae7d932044be
-
Filesize
26KB
MD50a2b391f78c278a94a6e20b5af2ae73f
SHA1e76ac8e0b5dcc82718b198153003ed12797be1a5
SHA256d5b0a11f0bd5b4f95f56de54e4e783f0bffa5e42d5e3877d40fc448061d19390
SHA51221c16cdeb6d563a85ff28444d29b160b3ace46ad037e1a4311230b2433de4db3357760c889b93f11e5bd4307956e9c0fd3d47f83c7d2ba8f7df2ae7d932044be
-
Filesize
26KB
MD50a2b391f78c278a94a6e20b5af2ae73f
SHA1e76ac8e0b5dcc82718b198153003ed12797be1a5
SHA256d5b0a11f0bd5b4f95f56de54e4e783f0bffa5e42d5e3877d40fc448061d19390
SHA51221c16cdeb6d563a85ff28444d29b160b3ace46ad037e1a4311230b2433de4db3357760c889b93f11e5bd4307956e9c0fd3d47f83c7d2ba8f7df2ae7d932044be
-
Filesize
26KB
MD50a2b391f78c278a94a6e20b5af2ae73f
SHA1e76ac8e0b5dcc82718b198153003ed12797be1a5
SHA256d5b0a11f0bd5b4f95f56de54e4e783f0bffa5e42d5e3877d40fc448061d19390
SHA51221c16cdeb6d563a85ff28444d29b160b3ace46ad037e1a4311230b2433de4db3357760c889b93f11e5bd4307956e9c0fd3d47f83c7d2ba8f7df2ae7d932044be
-
Filesize
10B
MD517de2acd7b02442c9cb0e8c0fccf8e96
SHA1e062bd3af8ffe48988392987af8cbbddddffb804
SHA256af7f402fe1458d28f48714376dd0e26175e667690e61b41c8bd0e61d818822d3
SHA512e04d6d828edc3ef3443dfd40f72f76351bf981a16566cf0f31e60015f588440764461b52be088f549e8a2a6fa41370129e60d36b63b66f9a63c6df89f44fdbd8
-
\Users\Admin\AppData\Local\Temp\c824b9efae57fefb76dbc3fa2c5643670cc796f81ba72ba832485b2310f934ec.exe
Filesize46KB
MD54e72b2688d56dbb4f910bfcfab3f14b2
SHA1a5315cba1cfe117f078b3864ebea2a2c67d3d917
SHA2565056f7ab6992658ca02ab06314b6ed59dbb10d5c90b529e9a626d34d8bf34e0f
SHA512e4771f17ffda255a65381d96191077d4dcf13c17fc13e5eefc39ade8e0235e3956ce47c317354d0d56061119643a39425a942a19f6846d37b0525fddb1709d21