Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03-11-2023 15:52
Static task
static1
Behavioral task
behavioral1
Sample
3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe
Resource
win10v2004-20231023-en
General
-
Target
3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe
-
Size
203KB
-
MD5
bd301c11fa85dca192e868fcc640351b
-
SHA1
29bbb52634027378cc92382508c7bcb07f17fb03
-
SHA256
3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888
-
SHA512
f691ee9a80495cb1739a77b0b47d8d6a63068b15d7e93a8c073076f62056f1f2ecc451c849e1b10708f7d39fcf9ea765c0e6f7ea5ed4af53bc9839ff265c3362
-
SSDEEP
3072:wsftffjmNrZgxhlhGeJJrJsQ+qHcNL6LyZI6nQpL4jRXFiOkg3kLcm5LUlJ9t:3VfjmNefnCM9yZVnQpLuNEbLc0UL9t
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1688 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2064 Logo1_.exe 2572 3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe -
Loads dropped DLL 1 IoCs
pid Process 1688 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SubsetList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\DESIGNER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Portal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe File created C:\Windows\Logo1_.exe 3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2064 Logo1_.exe 2064 Logo1_.exe 2064 Logo1_.exe 2064 Logo1_.exe 2064 Logo1_.exe 2064 Logo1_.exe 2064 Logo1_.exe 2064 Logo1_.exe 2064 Logo1_.exe 2064 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1688 2116 3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe 28 PID 2116 wrote to memory of 1688 2116 3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe 28 PID 2116 wrote to memory of 1688 2116 3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe 28 PID 2116 wrote to memory of 1688 2116 3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe 28 PID 2116 wrote to memory of 2064 2116 3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe 29 PID 2116 wrote to memory of 2064 2116 3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe 29 PID 2116 wrote to memory of 2064 2116 3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe 29 PID 2116 wrote to memory of 2064 2116 3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe 29 PID 2064 wrote to memory of 1992 2064 Logo1_.exe 31 PID 2064 wrote to memory of 1992 2064 Logo1_.exe 31 PID 2064 wrote to memory of 1992 2064 Logo1_.exe 31 PID 2064 wrote to memory of 1992 2064 Logo1_.exe 31 PID 1992 wrote to memory of 2068 1992 net.exe 33 PID 1992 wrote to memory of 2068 1992 net.exe 33 PID 1992 wrote to memory of 2068 1992 net.exe 33 PID 1992 wrote to memory of 2068 1992 net.exe 33 PID 1688 wrote to memory of 2572 1688 cmd.exe 34 PID 1688 wrote to memory of 2572 1688 cmd.exe 34 PID 1688 wrote to memory of 2572 1688 cmd.exe 34 PID 1688 wrote to memory of 2572 1688 cmd.exe 34 PID 2064 wrote to memory of 1328 2064 Logo1_.exe 12 PID 2064 wrote to memory of 1328 2064 Logo1_.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe"C:\Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aA998.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe"C:\Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe"4⤵
- Executes dropped EXE
PID:2572
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2068
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD53663c1381766ef643154f7248cee081a
SHA1d3391539358af56ef7ac65a5b87886e45e9bc42c
SHA2560471b2b82fb08307f138b69649e69dd51864d5650e13d0dafe67d37d91288c29
SHA512c3ed0a5d8b9eaa02efd030d4191849f5aa999e1585a47af66e8497ab494141488e97ca39289b412919f33faf78016c4e875522232c8f67bde995d968ecc7f6f7
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD53bb53b8f057008ca3b4cd93febb21de4
SHA16ce5410c60b7dfdba3e9966b84e1250410a83330
SHA256d3abb5a9ff11d9d82e5a4a5752b3a479663dca10b8cef1e321abd41d766e0166
SHA512d44a69b2cd53a65a2142b4d74c0420e7fa3a3abf2e6d5598e0ce41a7faa2d421320ad772a1c5a9bf23296bf7eb82ee9e719def750e333a2da49cb9209d7566de
-
Filesize
722B
MD53bb53b8f057008ca3b4cd93febb21de4
SHA16ce5410c60b7dfdba3e9966b84e1250410a83330
SHA256d3abb5a9ff11d9d82e5a4a5752b3a479663dca10b8cef1e321abd41d766e0166
SHA512d44a69b2cd53a65a2142b4d74c0420e7fa3a3abf2e6d5598e0ce41a7faa2d421320ad772a1c5a9bf23296bf7eb82ee9e719def750e333a2da49cb9209d7566de
-
C:\Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe
Filesize177KB
MD538ced7c7dca88182d3d8e02aaa889338
SHA1c702b28c7b267d6034cd06ebfc2e7b10b6700aa9
SHA2568b8bfe9d542b109edd6418d5679187abc1074e0c0f090c7ada0c608ce868d353
SHA512473ccf1f9b3265c192384140a48bef06a65105ab1f7d63a274a0e06487aea477206514bce1258a3bd0b74329dd2b678c71028d6eee166a1a497dd42deaabf70d
-
C:\Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe.exe
Filesize177KB
MD538ced7c7dca88182d3d8e02aaa889338
SHA1c702b28c7b267d6034cd06ebfc2e7b10b6700aa9
SHA2568b8bfe9d542b109edd6418d5679187abc1074e0c0f090c7ada0c608ce868d353
SHA512473ccf1f9b3265c192384140a48bef06a65105ab1f7d63a274a0e06487aea477206514bce1258a3bd0b74329dd2b678c71028d6eee166a1a497dd42deaabf70d
-
Filesize
26KB
MD54f6b7b7dd1e90f9968e5197d34085d7c
SHA1e49e73e61aede77f897b3be38716b22a9ed86e37
SHA256c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf
SHA5124225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2
-
Filesize
26KB
MD54f6b7b7dd1e90f9968e5197d34085d7c
SHA1e49e73e61aede77f897b3be38716b22a9ed86e37
SHA256c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf
SHA5124225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2
-
Filesize
26KB
MD54f6b7b7dd1e90f9968e5197d34085d7c
SHA1e49e73e61aede77f897b3be38716b22a9ed86e37
SHA256c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf
SHA5124225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2
-
Filesize
26KB
MD54f6b7b7dd1e90f9968e5197d34085d7c
SHA1e49e73e61aede77f897b3be38716b22a9ed86e37
SHA256c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf
SHA5124225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2
-
Filesize
9B
MD5a496dc6e67a7c97fe6b5f93f052c5de1
SHA191d1cbd786e4ca543f5d364b42273efd1be384c5
SHA256f656a696c47b2c37afecab6674210ad082849577f4763b778f81ca947bef3e63
SHA512850c4fe29e0fa3388cb06d91a85330c1ac5eed337d23d2b6ee3d74142941dba27a49485ecf4a8cc73800c8c22d207b6586447ee3b20443f9a0e355614a6a1cb2
-
\Users\Admin\AppData\Local\Temp\3a9e8369a177a1ed90e1f50bea862286666d00a5b2fe2f01f4c0b53c66d9a888.exe
Filesize177KB
MD538ced7c7dca88182d3d8e02aaa889338
SHA1c702b28c7b267d6034cd06ebfc2e7b10b6700aa9
SHA2568b8bfe9d542b109edd6418d5679187abc1074e0c0f090c7ada0c608ce868d353
SHA512473ccf1f9b3265c192384140a48bef06a65105ab1f7d63a274a0e06487aea477206514bce1258a3bd0b74329dd2b678c71028d6eee166a1a497dd42deaabf70d