Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
11/11/2023, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe
Resource
win10v2004-20231023-en
General
-
Target
e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe
-
Size
206KB
-
MD5
fafe7eaf6cbcc4a295b6c5507ef3dc83
-
SHA1
2449d9938d76267cff9042d550d37bb2e9ae2c2b
-
SHA256
e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585
-
SHA512
a34974753ca2b47391f40086e53b5b85a9d17e72d754f41ae496eb65672c77d2f97adae88be5cdb96093e36f7bccf5aca09c37a2ba317a72d00c82e5dbd13a73
-
SSDEEP
3072:1sftffjmNR8cz7qXKwpe1gjcxiN1ICOqnPgaH5KuBGvc/:iVfjmNX7CKwpe1Wcw8IitU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1708 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2260 Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.WW\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Sort\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Basic\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\InfoPath.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe File created C:\Windows\Logo1_.exe e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1708 2360 e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe 28 PID 2360 wrote to memory of 1708 2360 e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe 28 PID 2360 wrote to memory of 1708 2360 e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe 28 PID 2360 wrote to memory of 1708 2360 e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe 28 PID 2360 wrote to memory of 2260 2360 e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe 29 PID 2360 wrote to memory of 2260 2360 e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe 29 PID 2360 wrote to memory of 2260 2360 e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe 29 PID 2360 wrote to memory of 2260 2360 e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe 29 PID 2260 wrote to memory of 2340 2260 Logo1_.exe 30 PID 2260 wrote to memory of 2340 2260 Logo1_.exe 30 PID 2260 wrote to memory of 2340 2260 Logo1_.exe 30 PID 2260 wrote to memory of 2340 2260 Logo1_.exe 30 PID 2340 wrote to memory of 2700 2340 net.exe 33 PID 2340 wrote to memory of 2700 2340 net.exe 33 PID 2340 wrote to memory of 2700 2340 net.exe 33 PID 2340 wrote to memory of 2700 2340 net.exe 33 PID 2260 wrote to memory of 1292 2260 Logo1_.exe 8 PID 2260 wrote to memory of 1292 2260 Logo1_.exe 8
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe"C:\Users\Admin\AppData\Local\Temp\e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a9CAD.bat3⤵
- Deletes itself
PID:1708
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2700
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD53663c1381766ef643154f7248cee081a
SHA1d3391539358af56ef7ac65a5b87886e45e9bc42c
SHA2560471b2b82fb08307f138b69649e69dd51864d5650e13d0dafe67d37d91288c29
SHA512c3ed0a5d8b9eaa02efd030d4191849f5aa999e1585a47af66e8497ab494141488e97ca39289b412919f33faf78016c4e875522232c8f67bde995d968ecc7f6f7
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5842eb81079c880907834eb7021c427fd
SHA1c1426f2775b0b9054639e4c26892bef9755b985d
SHA2567951ae19e228cb45c76407a59cc8ee0c353df0d6200b10555e0eb17016e722ea
SHA512035664af2c3b2873136f8cc82e836ae356ca4e86486e16f1ccbde9f20662d58ae086fc1986d09878a60db9150672a74f13e9cd1c3e6b799d214d2ad64dfd8a9d
-
Filesize
722B
MD5842eb81079c880907834eb7021c427fd
SHA1c1426f2775b0b9054639e4c26892bef9755b985d
SHA2567951ae19e228cb45c76407a59cc8ee0c353df0d6200b10555e0eb17016e722ea
SHA512035664af2c3b2873136f8cc82e836ae356ca4e86486e16f1ccbde9f20662d58ae086fc1986d09878a60db9150672a74f13e9cd1c3e6b799d214d2ad64dfd8a9d
-
C:\Users\Admin\AppData\Local\Temp\e96d2460bb38e8a9971fac420d70b5abac23243d75b92711758ed43ab8f47585.exe.exe
Filesize179KB
MD59540ad83a08605ba1f52196424ce3067
SHA1a533eb61319bce1720b55d8921691323a4178c3d
SHA256b0b5d9eb6f4b176bdfbe4da0a060ad1b76c813186fae3d9a6e1b1dd9ee0d01d1
SHA512bb00ee12c353c9deeb8105399b2a956343e4a1c13dd1198d0f481c4f699099a34ede80f15bb4efa9a1f68c2c12ff75da163b48bfdf30353d5ef5d4bb7c174493
-
Filesize
26KB
MD5785fa6c3710afc18d7fdec70e3b9a469
SHA1d2903f4fa74689c6b8a7e5e7c8d9c1791a71523d
SHA256c0e031a2d0e39b141a0cf1c8384e190bc6fa0cc8f4e0f36cde97ac631f126c27
SHA51200b7c2d17161542744b54ef5a770363a1de0a21805da3d1b1b169de28c4939b2bc67d4eaa7cee9b2c0c46d853109b5943295f39051b5a7ae7e1924e002db606f
-
Filesize
26KB
MD5785fa6c3710afc18d7fdec70e3b9a469
SHA1d2903f4fa74689c6b8a7e5e7c8d9c1791a71523d
SHA256c0e031a2d0e39b141a0cf1c8384e190bc6fa0cc8f4e0f36cde97ac631f126c27
SHA51200b7c2d17161542744b54ef5a770363a1de0a21805da3d1b1b169de28c4939b2bc67d4eaa7cee9b2c0c46d853109b5943295f39051b5a7ae7e1924e002db606f
-
Filesize
26KB
MD5785fa6c3710afc18d7fdec70e3b9a469
SHA1d2903f4fa74689c6b8a7e5e7c8d9c1791a71523d
SHA256c0e031a2d0e39b141a0cf1c8384e190bc6fa0cc8f4e0f36cde97ac631f126c27
SHA51200b7c2d17161542744b54ef5a770363a1de0a21805da3d1b1b169de28c4939b2bc67d4eaa7cee9b2c0c46d853109b5943295f39051b5a7ae7e1924e002db606f
-
Filesize
26KB
MD5785fa6c3710afc18d7fdec70e3b9a469
SHA1d2903f4fa74689c6b8a7e5e7c8d9c1791a71523d
SHA256c0e031a2d0e39b141a0cf1c8384e190bc6fa0cc8f4e0f36cde97ac631f126c27
SHA51200b7c2d17161542744b54ef5a770363a1de0a21805da3d1b1b169de28c4939b2bc67d4eaa7cee9b2c0c46d853109b5943295f39051b5a7ae7e1924e002db606f
-
Filesize
10B
MD5f51c3552f0c301ae8d98c7fba5088597
SHA1b74920b9332b7ddc34e3d793215d6d402dfa265e
SHA256d9d5ad4ac9b545fe611f501ffb102acad318e4d1e5648061eda6ff03ffc3e3a1
SHA512281662d4c7abe512da2489431bb4ad36d979fd441654ec1212af9274dc7b0ea666111c52f1ee842adde37cbb51a8fe095091b52ad824cfdf4516f2f08232eb81