Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
13-11-2023 16:44
Static task
static1
Behavioral task
behavioral1
Sample
54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe
Resource
win10v2004-20231023-en
General
-
Target
54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe
-
Size
292KB
-
MD5
7aac4fbe5c22841c84e8690a836e46af
-
SHA1
27e470e94a988e4a6d6bccf8b862d59e66c409d0
-
SHA256
54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4
-
SHA512
25b6ac5bc1ee8132443c88e0c65069e8eff1314152b4688dfc00ddb75723c16025fb5b9f1af6b29eed78ca9d152912ed57c7b3100bad1f6357a18808738f0d41
-
SSDEEP
3072:UftffjmNSGNWHDzttk5pLzSMEjF47yctMYTWfYj9DfWxRmY7jyP0ejUl:sVfjmNfNmZtb4wNQBDfWxRvs0ewl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2608 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2948 Logo1_.exe 2704 54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe -
Loads dropped DLL 2 IoCs
pid Process 2608 cmd.exe 2608 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\en-US\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe File created C:\Windows\Logo1_.exe 54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2948 Logo1_.exe 2948 Logo1_.exe 2948 Logo1_.exe 2948 Logo1_.exe 2948 Logo1_.exe 2948 Logo1_.exe 2948 Logo1_.exe 2948 Logo1_.exe 2948 Logo1_.exe 2948 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2608 2372 54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe 28 PID 2372 wrote to memory of 2608 2372 54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe 28 PID 2372 wrote to memory of 2608 2372 54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe 28 PID 2372 wrote to memory of 2608 2372 54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe 28 PID 2372 wrote to memory of 2948 2372 54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe 29 PID 2372 wrote to memory of 2948 2372 54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe 29 PID 2372 wrote to memory of 2948 2372 54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe 29 PID 2372 wrote to memory of 2948 2372 54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe 29 PID 2948 wrote to memory of 2636 2948 Logo1_.exe 31 PID 2948 wrote to memory of 2636 2948 Logo1_.exe 31 PID 2948 wrote to memory of 2636 2948 Logo1_.exe 31 PID 2948 wrote to memory of 2636 2948 Logo1_.exe 31 PID 2608 wrote to memory of 2704 2608 cmd.exe 34 PID 2608 wrote to memory of 2704 2608 cmd.exe 34 PID 2608 wrote to memory of 2704 2608 cmd.exe 34 PID 2608 wrote to memory of 2704 2608 cmd.exe 34 PID 2636 wrote to memory of 2964 2636 net.exe 33 PID 2636 wrote to memory of 2964 2636 net.exe 33 PID 2636 wrote to memory of 2964 2636 net.exe 33 PID 2636 wrote to memory of 2964 2636 net.exe 33 PID 2948 wrote to memory of 1380 2948 Logo1_.exe 13 PID 2948 wrote to memory of 1380 2948 Logo1_.exe 13
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe"C:\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a819E.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe"C:\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe"4⤵
- Executes dropped EXE
PID:2704
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2964
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5533ce215a7c274602dc456ca375cef93
SHA176c502d7c45eca3fd96f6b04eb850e751bc785dd
SHA256d70c9f73bbeed5cbc0df4a4d14bae68789f84d8092281337d2919322b288ce9c
SHA51209d9dee36c48567921de4b7c31c4a822d5f9ed5e0b1cb0330031b320f40b5ba9b15e89dc37d52561094642c0ff16c14d32e81ed5b1dac06150fefbbd6f3365bf
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD579b5fca384051ca44d6ee8a066213f59
SHA1df25803f5f444ba333deeee97442c3fa29e8a559
SHA256d1d7558dc1146ad5d6b62d6e2eeed2024713187973e445a8d776224e37997b09
SHA5127fd5ef692ad44fa4617ed87631dd564d1a005002d4f40ebd79c2b60233f24e07a1bf6fdc57cbaffc7fd522d51f6d31602d237b9c98eb9aba9eb93e69aedbb3ae
-
Filesize
722B
MD579b5fca384051ca44d6ee8a066213f59
SHA1df25803f5f444ba333deeee97442c3fa29e8a559
SHA256d1d7558dc1146ad5d6b62d6e2eeed2024713187973e445a8d776224e37997b09
SHA5127fd5ef692ad44fa4617ed87631dd564d1a005002d4f40ebd79c2b60233f24e07a1bf6fdc57cbaffc7fd522d51f6d31602d237b9c98eb9aba9eb93e69aedbb3ae
-
C:\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe
Filesize266KB
MD5b0dcc380e6b5d51460eafeba2a4c0d3b
SHA11fedbf0b02f7a7ce4149b96ff6b296f81574a7e1
SHA256ebffb0122f9787bf691068614d576a634fdc0c6bb28ba565ecc3d7d49b41001c
SHA5126d098af85eb8e12da482ec6347f4c19a8f75c72cdcfa0885a7a0f5a6b3718417bfdce1009648b9a29e64b61d1b1c5bd76744596f4182816171863fa8b72245d2
-
C:\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe.exe
Filesize266KB
MD5b0dcc380e6b5d51460eafeba2a4c0d3b
SHA11fedbf0b02f7a7ce4149b96ff6b296f81574a7e1
SHA256ebffb0122f9787bf691068614d576a634fdc0c6bb28ba565ecc3d7d49b41001c
SHA5126d098af85eb8e12da482ec6347f4c19a8f75c72cdcfa0885a7a0f5a6b3718417bfdce1009648b9a29e64b61d1b1c5bd76744596f4182816171863fa8b72245d2
-
Filesize
26KB
MD5ed9c69fcace8a0c07f7596f17c76cd92
SHA131fe334a5cd033d7688ae7cbf49b78db9f888cec
SHA2560cff4e74e436b6c06ff1c99d2e9a605d6ecc4fcfb6fc20fd3942c19cee76e073
SHA51280a86988ca56652428132faf8169a156d4ce88c7cc7a6c1cc825f120ec8e813d261fcaccdb462969346d690b6c14b60e40bbe421933fc68627fc975b9036ffdf
-
Filesize
26KB
MD5ed9c69fcace8a0c07f7596f17c76cd92
SHA131fe334a5cd033d7688ae7cbf49b78db9f888cec
SHA2560cff4e74e436b6c06ff1c99d2e9a605d6ecc4fcfb6fc20fd3942c19cee76e073
SHA51280a86988ca56652428132faf8169a156d4ce88c7cc7a6c1cc825f120ec8e813d261fcaccdb462969346d690b6c14b60e40bbe421933fc68627fc975b9036ffdf
-
Filesize
26KB
MD5ed9c69fcace8a0c07f7596f17c76cd92
SHA131fe334a5cd033d7688ae7cbf49b78db9f888cec
SHA2560cff4e74e436b6c06ff1c99d2e9a605d6ecc4fcfb6fc20fd3942c19cee76e073
SHA51280a86988ca56652428132faf8169a156d4ce88c7cc7a6c1cc825f120ec8e813d261fcaccdb462969346d690b6c14b60e40bbe421933fc68627fc975b9036ffdf
-
Filesize
26KB
MD5ed9c69fcace8a0c07f7596f17c76cd92
SHA131fe334a5cd033d7688ae7cbf49b78db9f888cec
SHA2560cff4e74e436b6c06ff1c99d2e9a605d6ecc4fcfb6fc20fd3942c19cee76e073
SHA51280a86988ca56652428132faf8169a156d4ce88c7cc7a6c1cc825f120ec8e813d261fcaccdb462969346d690b6c14b60e40bbe421933fc68627fc975b9036ffdf
-
Filesize
10B
MD57af371ae7aad351d505f1b26382de243
SHA10a19bf0a1ccfb902a03b3da68bdd289190e62f5f
SHA2564fcc643d52dbc25dd57a011e27cbb0503711cf1a2ad1610a4f9e7b9f17c5bc1b
SHA5121127b9c88de9e2d58f7a512dd52c31bb9d96b0543f13e4cfff59ca2b73e60307538dd9bcd1c480e6d260fe45b44208a5554a5a60e8c2e3da8385b2cdd0e77d3e
-
\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe
Filesize266KB
MD5b0dcc380e6b5d51460eafeba2a4c0d3b
SHA11fedbf0b02f7a7ce4149b96ff6b296f81574a7e1
SHA256ebffb0122f9787bf691068614d576a634fdc0c6bb28ba565ecc3d7d49b41001c
SHA5126d098af85eb8e12da482ec6347f4c19a8f75c72cdcfa0885a7a0f5a6b3718417bfdce1009648b9a29e64b61d1b1c5bd76744596f4182816171863fa8b72245d2
-
\Users\Admin\AppData\Local\Temp\54bad935a11a0d5e7a8d12a023c486ca87e310bd1168ecd7bb7f0203218f20a4.exe
Filesize266KB
MD5b0dcc380e6b5d51460eafeba2a4c0d3b
SHA11fedbf0b02f7a7ce4149b96ff6b296f81574a7e1
SHA256ebffb0122f9787bf691068614d576a634fdc0c6bb28ba565ecc3d7d49b41001c
SHA5126d098af85eb8e12da482ec6347f4c19a8f75c72cdcfa0885a7a0f5a6b3718417bfdce1009648b9a29e64b61d1b1c5bd76744596f4182816171863fa8b72245d2