Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
04-11-2023 11:44
Static task
static1
Behavioral task
behavioral1
Sample
d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe
Resource
win10v2004-20231023-en
General
-
Target
d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe
-
Size
79KB
-
MD5
31e4e02d3c2f02437a484adef87423eb
-
SHA1
75142bce6720b83c075c3b6998d1b25843424023
-
SHA256
d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac
-
SHA512
6b80852107f85b2c9ad9a8abc78f24d260cc2c9edcec8b2015b97a05b40d3efd1112ed5fb3668c0ab6d673867bec07ace130943966037c8a7ff940974eb04841
-
SSDEEP
768:21ODKAaDMG8H92RwZNQSwcfymNBg+g61GoZwcmYDVZjMJwXl0gF1ytpnLMd:wfgLdQAQfcfymNVDXMJM0I6pnLMd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1488 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1716 Logo1_.exe 2716 d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe -
Loads dropped DLL 2 IoCs
pid Process 1488 cmd.exe 1488 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Lime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\PROOF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe File created C:\Windows\Logo1_.exe d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1488 2016 d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe 28 PID 2016 wrote to memory of 1488 2016 d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe 28 PID 2016 wrote to memory of 1488 2016 d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe 28 PID 2016 wrote to memory of 1488 2016 d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe 28 PID 2016 wrote to memory of 1716 2016 d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe 29 PID 2016 wrote to memory of 1716 2016 d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe 29 PID 2016 wrote to memory of 1716 2016 d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe 29 PID 2016 wrote to memory of 1716 2016 d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe 29 PID 1716 wrote to memory of 2116 1716 Logo1_.exe 31 PID 1716 wrote to memory of 2116 1716 Logo1_.exe 31 PID 1716 wrote to memory of 2116 1716 Logo1_.exe 31 PID 1716 wrote to memory of 2116 1716 Logo1_.exe 31 PID 1488 wrote to memory of 2716 1488 cmd.exe 33 PID 1488 wrote to memory of 2716 1488 cmd.exe 33 PID 1488 wrote to memory of 2716 1488 cmd.exe 33 PID 1488 wrote to memory of 2716 1488 cmd.exe 33 PID 2116 wrote to memory of 2860 2116 net.exe 34 PID 2116 wrote to memory of 2860 2116 net.exe 34 PID 2116 wrote to memory of 2860 2116 net.exe 34 PID 2116 wrote to memory of 2860 2116 net.exe 34 PID 1716 wrote to memory of 1372 1716 Logo1_.exe 5 PID 1716 wrote to memory of 1372 1716 Logo1_.exe 5
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe"C:\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4B24.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe"C:\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe"4⤵
- Executes dropped EXE
PID:2716
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2860
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5548ddcade423bdb543717d8073ac88d5
SHA10210f769b1b16ae5e569e65e20fafbd12f2d0e04
SHA256052524488f71bf143183bbf817657f609e226b2830071e8dea7fcede4c0ec052
SHA5128576336e7eb0b1132dc5c4eef772ba5f9b57844173f17d9c5cf1fbb09afa443313a1675fcd03e028c592ecc59d0f52ea44529c58f721ccfc2bc958ae292bb0b0
-
Filesize
471KB
MD599ea9b604a7a734d3087fa6159684c42
SHA1709fa1068ad4d560fe03e05b68056f1b0bedbfc8
SHA2563f733f9e6fec7c4165ca8ba41eb23f604a248babe794c4ad2c6c3ce8032aab1c
SHA5127af8008c7e187f925c62efc97e1891a7a38d089302dba39fbde137fb895e0592847ed0982c824c2075be8e6b95b6ce165ecb848ab85adf53779ebef613410fbb
-
Filesize
722B
MD52efee963ce4726016b8b7fbf6ec19ea7
SHA1ee07039b9eec895b19a44aee4a53eb4f28ec9e9c
SHA2560bbc692e953af494da511a06270b08379807054db45e8e55111fa6937b07d827
SHA51289dac58ec3075a5b45d53429b04a483676d63360e39d92356e7284a9aa7d2053de2ab4f97c5ac8d969f9beb1a03308b03da59c15f8f715e7f01d91cdf4d7ecc2
-
Filesize
722B
MD52efee963ce4726016b8b7fbf6ec19ea7
SHA1ee07039b9eec895b19a44aee4a53eb4f28ec9e9c
SHA2560bbc692e953af494da511a06270b08379807054db45e8e55111fa6937b07d827
SHA51289dac58ec3075a5b45d53429b04a483676d63360e39d92356e7284a9aa7d2053de2ab4f97c5ac8d969f9beb1a03308b03da59c15f8f715e7f01d91cdf4d7ecc2
-
C:\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe
Filesize53KB
MD5fa4ccade686d9a4a3620ec3333e5fa1f
SHA186e7398ebd92c145772e0812a451fc169e7fb79a
SHA25686d41b076ce41684d141c16d617015dc099c20a9c774c340def1ecfaa46a1bef
SHA512c4ea61e6cc98d2e95fdb0c38a47c324e693f54b0856460e8f1194c340677d291bd7765baab3759c928ec6e34d6809a546d619fad08edd8bf2dac8d88c2d3ea92
-
C:\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe.exe
Filesize53KB
MD5fa4ccade686d9a4a3620ec3333e5fa1f
SHA186e7398ebd92c145772e0812a451fc169e7fb79a
SHA25686d41b076ce41684d141c16d617015dc099c20a9c774c340def1ecfaa46a1bef
SHA512c4ea61e6cc98d2e95fdb0c38a47c324e693f54b0856460e8f1194c340677d291bd7765baab3759c928ec6e34d6809a546d619fad08edd8bf2dac8d88c2d3ea92
-
Filesize
26KB
MD5bf432bacde0b936f7fd20c466ec0bfc9
SHA1aff70b2cb9c409e3b63e7fc33f132441edad86db
SHA2565d2e80c8e42ad3cf43ca754fb4597753ec8d80fc7d027e11f43536dd2f88d39e
SHA512c134428f8da55038acf63eaae12357060574e2f062befc57c6a69c6833ab10a4eb08c6f36cd6433de1538f2b5b09ef8bb74acb8235856a5aac024914165c1a1a
-
Filesize
26KB
MD5bf432bacde0b936f7fd20c466ec0bfc9
SHA1aff70b2cb9c409e3b63e7fc33f132441edad86db
SHA2565d2e80c8e42ad3cf43ca754fb4597753ec8d80fc7d027e11f43536dd2f88d39e
SHA512c134428f8da55038acf63eaae12357060574e2f062befc57c6a69c6833ab10a4eb08c6f36cd6433de1538f2b5b09ef8bb74acb8235856a5aac024914165c1a1a
-
Filesize
26KB
MD5bf432bacde0b936f7fd20c466ec0bfc9
SHA1aff70b2cb9c409e3b63e7fc33f132441edad86db
SHA2565d2e80c8e42ad3cf43ca754fb4597753ec8d80fc7d027e11f43536dd2f88d39e
SHA512c134428f8da55038acf63eaae12357060574e2f062befc57c6a69c6833ab10a4eb08c6f36cd6433de1538f2b5b09ef8bb74acb8235856a5aac024914165c1a1a
-
Filesize
26KB
MD5bf432bacde0b936f7fd20c466ec0bfc9
SHA1aff70b2cb9c409e3b63e7fc33f132441edad86db
SHA2565d2e80c8e42ad3cf43ca754fb4597753ec8d80fc7d027e11f43536dd2f88d39e
SHA512c134428f8da55038acf63eaae12357060574e2f062befc57c6a69c6833ab10a4eb08c6f36cd6433de1538f2b5b09ef8bb74acb8235856a5aac024914165c1a1a
-
Filesize
9B
MD56029ce528adbc1284163cdd2b27a082e
SHA1a2f23e1d5101c3b6929686a2d5711c2af2dec1b7
SHA2565036deecfbb090aa7f7c21c159b1921df0cf23eedafb7e0c208668ad82872dae
SHA512a661e939e69a59f88fd86fa654371ba4b3e3e8faf5c1b39bdaa0def8b277b26b63e96d4f5eb047ca3d8888597165dc709f395eeaf333c25c9cf56441c31dd676
-
\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe
Filesize53KB
MD5fa4ccade686d9a4a3620ec3333e5fa1f
SHA186e7398ebd92c145772e0812a451fc169e7fb79a
SHA25686d41b076ce41684d141c16d617015dc099c20a9c774c340def1ecfaa46a1bef
SHA512c4ea61e6cc98d2e95fdb0c38a47c324e693f54b0856460e8f1194c340677d291bd7765baab3759c928ec6e34d6809a546d619fad08edd8bf2dac8d88c2d3ea92
-
\Users\Admin\AppData\Local\Temp\d9e39ae160b091d90068dcca6fd239129bd4bca28165b373a9e99dc75c4005ac.exe
Filesize53KB
MD5fa4ccade686d9a4a3620ec3333e5fa1f
SHA186e7398ebd92c145772e0812a451fc169e7fb79a
SHA25686d41b076ce41684d141c16d617015dc099c20a9c774c340def1ecfaa46a1bef
SHA512c4ea61e6cc98d2e95fdb0c38a47c324e693f54b0856460e8f1194c340677d291bd7765baab3759c928ec6e34d6809a546d619fad08edd8bf2dac8d88c2d3ea92