Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
15/11/2023, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe
Resource
win10v2004-20231020-en
General
-
Target
1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe
-
Size
1.4MB
-
MD5
ef6bd9be00ede657a759f8ec7296857e
-
SHA1
4355b6e8fa4f236f34cf2766225ee15b90d6ee29
-
SHA256
1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5
-
SHA512
17061c6d85573f1a5ea5154c6c739dbf5760b77324d2ef226556f5b77f08408c03ef5fafa02280e898e74da940776aa6861cdaa21817793c4f6a427087f5fc41
-
SSDEEP
24576:j7hpBrPMix7e6tP5mUVLpI+rqITbN2A0Ta3fbG/67fZQKP/19e4Mi11phQGAqdPc:j7bp06/rLjkEfc67hQKP/19e4rphQGAN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1720 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3008 Logo1_.exe 2724 1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe -
Loads dropped DLL 1 IoCs
pid Process 1720 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Publisher.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Filters\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe File created C:\Windows\Logo1_.exe 1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1720 2104 1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe 29 PID 2104 wrote to memory of 1720 2104 1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe 29 PID 2104 wrote to memory of 1720 2104 1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe 29 PID 2104 wrote to memory of 1720 2104 1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe 29 PID 2104 wrote to memory of 3008 2104 1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe 30 PID 2104 wrote to memory of 3008 2104 1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe 30 PID 2104 wrote to memory of 3008 2104 1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe 30 PID 2104 wrote to memory of 3008 2104 1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe 30 PID 3008 wrote to memory of 2744 3008 Logo1_.exe 31 PID 3008 wrote to memory of 2744 3008 Logo1_.exe 31 PID 3008 wrote to memory of 2744 3008 Logo1_.exe 31 PID 3008 wrote to memory of 2744 3008 Logo1_.exe 31 PID 1720 wrote to memory of 2724 1720 cmd.exe 34 PID 1720 wrote to memory of 2724 1720 cmd.exe 34 PID 1720 wrote to memory of 2724 1720 cmd.exe 34 PID 1720 wrote to memory of 2724 1720 cmd.exe 34 PID 2744 wrote to memory of 2756 2744 net.exe 33 PID 2744 wrote to memory of 2756 2744 net.exe 33 PID 2744 wrote to memory of 2756 2744 net.exe 33 PID 2744 wrote to memory of 2756 2744 net.exe 33 PID 3008 wrote to memory of 1328 3008 Logo1_.exe 17 PID 3008 wrote to memory of 1328 3008 Logo1_.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe"C:\Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4AF5.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe"C:\Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe"4⤵
- Executes dropped EXE
PID:2724
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2756
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD53254f74cb3b33bfc7be7ed5a00f441c8
SHA1e53c1efdc9ae60c559389f30dfd1b9d36c4f92b3
SHA2565aa37366c8c3de47ab77db554be0694bd31ba84799839adb30d5c8efe072a2d3
SHA5122d780e304b76d1041e2beeac628e2666a38f5435b2ab4bc6ad553cd2a5d40e864943f7a4b90e90277821e8376b6d135b14bfbbcbaadc61d0781af0c3aa9ad696
-
Filesize
722B
MD554796509de169f0ae854e94ff0d0703d
SHA1b522a734b0b2841309a66e343c60b1e72b79c06f
SHA2565f1c5a355d26572ad364438a87217cb51fa42b1f7a158d777966946d9a8d55f7
SHA51274e2517fdb348610ab115d6056d2a6062adda1a6fc3955ea45d5d6fa53c1f083ee88fbfc2abf9bf8332e6f41b890da52b66b8940df437683717c6bc29f2848f4
-
Filesize
722B
MD554796509de169f0ae854e94ff0d0703d
SHA1b522a734b0b2841309a66e343c60b1e72b79c06f
SHA2565f1c5a355d26572ad364438a87217cb51fa42b1f7a158d777966946d9a8d55f7
SHA51274e2517fdb348610ab115d6056d2a6062adda1a6fc3955ea45d5d6fa53c1f083ee88fbfc2abf9bf8332e6f41b890da52b66b8940df437683717c6bc29f2848f4
-
C:\Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe
Filesize1.4MB
MD5d881b29ba4f09811f8fddb2e4acc6387
SHA1cd08979aeabbb38d984a246b6aa7040bbe8722e4
SHA256c0ee98f32055756cb3416b2e3c0a790d2799d85ee848541f04d0d00635990466
SHA5122470f0ee118e1442023999522509b37159142162619b03549d74a889908dff8bcac256ddbf7413100c6d2c3e7e271309bbe17a13b1acc0b3a831b3caad991445
-
C:\Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe.exe
Filesize1.4MB
MD5d881b29ba4f09811f8fddb2e4acc6387
SHA1cd08979aeabbb38d984a246b6aa7040bbe8722e4
SHA256c0ee98f32055756cb3416b2e3c0a790d2799d85ee848541f04d0d00635990466
SHA5122470f0ee118e1442023999522509b37159142162619b03549d74a889908dff8bcac256ddbf7413100c6d2c3e7e271309bbe17a13b1acc0b3a831b3caad991445
-
Filesize
26KB
MD5cbca3e8196ed927725baddcf0c89fb33
SHA17f1e39c3fe75198170cfff1792968f6ff5f07046
SHA2561c029e9f721dcf0ab7ec76c4eafdf46343c1f59e1be982625315fe205a883d9e
SHA512bdd87c1d6d2682efc535cb7abc32cd571354bb81407983891b98c85f0bb0b385101871ce975d541d43855c1908b156b12bd2ef3b2bec068eafaa4f5e9e79926e
-
Filesize
26KB
MD5cbca3e8196ed927725baddcf0c89fb33
SHA17f1e39c3fe75198170cfff1792968f6ff5f07046
SHA2561c029e9f721dcf0ab7ec76c4eafdf46343c1f59e1be982625315fe205a883d9e
SHA512bdd87c1d6d2682efc535cb7abc32cd571354bb81407983891b98c85f0bb0b385101871ce975d541d43855c1908b156b12bd2ef3b2bec068eafaa4f5e9e79926e
-
Filesize
26KB
MD5cbca3e8196ed927725baddcf0c89fb33
SHA17f1e39c3fe75198170cfff1792968f6ff5f07046
SHA2561c029e9f721dcf0ab7ec76c4eafdf46343c1f59e1be982625315fe205a883d9e
SHA512bdd87c1d6d2682efc535cb7abc32cd571354bb81407983891b98c85f0bb0b385101871ce975d541d43855c1908b156b12bd2ef3b2bec068eafaa4f5e9e79926e
-
Filesize
26KB
MD5cbca3e8196ed927725baddcf0c89fb33
SHA17f1e39c3fe75198170cfff1792968f6ff5f07046
SHA2561c029e9f721dcf0ab7ec76c4eafdf46343c1f59e1be982625315fe205a883d9e
SHA512bdd87c1d6d2682efc535cb7abc32cd571354bb81407983891b98c85f0bb0b385101871ce975d541d43855c1908b156b12bd2ef3b2bec068eafaa4f5e9e79926e
-
Filesize
10B
MD565dbe3024623e6ca52f7ffc0aff48a7a
SHA1fa85f73c2d8c16dc761a92e86f3611f5845e8b3b
SHA256c148a5db22b58e10be752ed65b1ea427501f99f058de33ad0d659cb064eb1848
SHA512bce9e3f68a68eeec543e2c15d835fb7e869dde64353cb5e014fcd5643d710af895c8b55823c007eddafbfe3d28a5e510efcde12ad2e6932495ddfe1d0bf1c616
-
\Users\Admin\AppData\Local\Temp\1a55b5e7262cceb815327e9e7c5bb5e6ac846905772d9a879281ae93ad3e09d5.exe
Filesize1.4MB
MD5d881b29ba4f09811f8fddb2e4acc6387
SHA1cd08979aeabbb38d984a246b6aa7040bbe8722e4
SHA256c0ee98f32055756cb3416b2e3c0a790d2799d85ee848541f04d0d00635990466
SHA5122470f0ee118e1442023999522509b37159142162619b03549d74a889908dff8bcac256ddbf7413100c6d2c3e7e271309bbe17a13b1acc0b3a831b3caad991445