Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
18-11-2023 06:08
Static task
static1
Behavioral task
behavioral1
Sample
b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe
Resource
win10v2004-20231023-en
General
-
Target
b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe
-
Size
184KB
-
MD5
242b3f0ab91d79dd962387373da59207
-
SHA1
2783cbc9761b2af1fe745e1526d2f226925649f0
-
SHA256
b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28
-
SHA512
cb72baa44817a034ad470100f6820892b1eb8a3794e44bd2b17546159ed46988de7481acf740bb2b5b70375e31510eee044885b0d9e8782d46a407d33df526a1
-
SSDEEP
3072:OftffjmNzwzvOYRt5YP/aKavT/DvbEvK9aobNI2B+Tls7LOjkWxmfd36Z9YJh0GY:2VfjmNEtiP/aK2h9H/B+3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2728 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2336 Logo1_.exe 2808 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe -
Loads dropped DLL 1 IoCs
pid Process 2728 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Bibliography\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\SAMPLES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe File created C:\Windows\Logo1_.exe b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2728 2488 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 28 PID 2488 wrote to memory of 2728 2488 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 28 PID 2488 wrote to memory of 2728 2488 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 28 PID 2488 wrote to memory of 2728 2488 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 28 PID 2488 wrote to memory of 2336 2488 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 30 PID 2488 wrote to memory of 2336 2488 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 30 PID 2488 wrote to memory of 2336 2488 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 30 PID 2488 wrote to memory of 2336 2488 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 30 PID 2336 wrote to memory of 2780 2336 Logo1_.exe 31 PID 2336 wrote to memory of 2780 2336 Logo1_.exe 31 PID 2336 wrote to memory of 2780 2336 Logo1_.exe 31 PID 2336 wrote to memory of 2780 2336 Logo1_.exe 31 PID 2728 wrote to memory of 2808 2728 cmd.exe 32 PID 2728 wrote to memory of 2808 2728 cmd.exe 32 PID 2728 wrote to memory of 2808 2728 cmd.exe 32 PID 2728 wrote to memory of 2808 2728 cmd.exe 32 PID 2728 wrote to memory of 2808 2728 cmd.exe 32 PID 2728 wrote to memory of 2808 2728 cmd.exe 32 PID 2728 wrote to memory of 2808 2728 cmd.exe 32 PID 2780 wrote to memory of 2312 2780 net.exe 34 PID 2780 wrote to memory of 2312 2780 net.exe 34 PID 2780 wrote to memory of 2312 2780 net.exe 34 PID 2780 wrote to memory of 2312 2780 net.exe 34 PID 2336 wrote to memory of 1276 2336 Logo1_.exe 18 PID 2336 wrote to memory of 1276 2336 Logo1_.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe"C:\Users\Admin\AppData\Local\Temp\b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a47BA.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe"C:\Users\Admin\AppData\Local\Temp\b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe"4⤵
- Executes dropped EXE
PID:2808
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2312
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5ed9c9f1ff86ef33bfbf54851646f1bbc
SHA1909ddc639d2c1bc6d588546222e45e5c459d1070
SHA25639cc62bc8c6323b358e476ae439b7b38d87072fdae9dd09a8d2e0deac013651a
SHA512482c2bd81be9f9b5af05677bbcd5a3540e76a2f05e9fbd989604e44a2f159461ce505929d0000f55e85ce5263b7f7f9e64dc13dbf47fb5550c6b36b2d6ca2a5f
-
Filesize
722B
MD5ed9c9f1ff86ef33bfbf54851646f1bbc
SHA1909ddc639d2c1bc6d588546222e45e5c459d1070
SHA25639cc62bc8c6323b358e476ae439b7b38d87072fdae9dd09a8d2e0deac013651a
SHA512482c2bd81be9f9b5af05677bbcd5a3540e76a2f05e9fbd989604e44a2f159461ce505929d0000f55e85ce5263b7f7f9e64dc13dbf47fb5550c6b36b2d6ca2a5f
-
C:\Users\Admin\AppData\Local\Temp\b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe
Filesize158KB
MD5b07f2b96517cf26510f56b0f51e576be
SHA1872cb09ef723042057f2af82a6a38421b9588f27
SHA25683f0585a53cb0c83e4ff4e9a405bfe65aa538e3dabe384896007d823e7244e4b
SHA5125b9ec4cbf149e62fd5a1f4948d7832e7e84b80be10ed8d08aa37f10c2ccd9210963fac916b336dd3657c25c772ad448753fc627484e87ba8f9ba55f882518ef3
-
C:\Users\Admin\AppData\Local\Temp\b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe.exe
Filesize158KB
MD5b07f2b96517cf26510f56b0f51e576be
SHA1872cb09ef723042057f2af82a6a38421b9588f27
SHA25683f0585a53cb0c83e4ff4e9a405bfe65aa538e3dabe384896007d823e7244e4b
SHA5125b9ec4cbf149e62fd5a1f4948d7832e7e84b80be10ed8d08aa37f10c2ccd9210963fac916b336dd3657c25c772ad448753fc627484e87ba8f9ba55f882518ef3
-
Filesize
26KB
MD5b4d5e3bb5ec37189c3d1642c6c70d24f
SHA1d3814805abcfc193dceff88708c5e027ba1b7b73
SHA256d5adf7b3d9a2eab15f28362d2d2a31492b7bdb7ee7bb3db94ed1b3147f537085
SHA512f25faa0df1abc892e7f644c75190023f1669fcd8670280f19a41ddfc07838c3f95b690e299ba797d697f8ca8cb72808aabd2d523c88325547acd80919445d12f
-
Filesize
26KB
MD5b4d5e3bb5ec37189c3d1642c6c70d24f
SHA1d3814805abcfc193dceff88708c5e027ba1b7b73
SHA256d5adf7b3d9a2eab15f28362d2d2a31492b7bdb7ee7bb3db94ed1b3147f537085
SHA512f25faa0df1abc892e7f644c75190023f1669fcd8670280f19a41ddfc07838c3f95b690e299ba797d697f8ca8cb72808aabd2d523c88325547acd80919445d12f
-
Filesize
26KB
MD5b4d5e3bb5ec37189c3d1642c6c70d24f
SHA1d3814805abcfc193dceff88708c5e027ba1b7b73
SHA256d5adf7b3d9a2eab15f28362d2d2a31492b7bdb7ee7bb3db94ed1b3147f537085
SHA512f25faa0df1abc892e7f644c75190023f1669fcd8670280f19a41ddfc07838c3f95b690e299ba797d697f8ca8cb72808aabd2d523c88325547acd80919445d12f
-
Filesize
26KB
MD5b4d5e3bb5ec37189c3d1642c6c70d24f
SHA1d3814805abcfc193dceff88708c5e027ba1b7b73
SHA256d5adf7b3d9a2eab15f28362d2d2a31492b7bdb7ee7bb3db94ed1b3147f537085
SHA512f25faa0df1abc892e7f644c75190023f1669fcd8670280f19a41ddfc07838c3f95b690e299ba797d697f8ca8cb72808aabd2d523c88325547acd80919445d12f
-
Filesize
10B
MD5efd2ef11e05f1e4e71c36b61f42f4b74
SHA166f050470e42f08b4f86a669c0c3e7739d334585
SHA256c4d0fb64b84374af29c373ad1807dd661605dc6714e45c6617f7f5c537b9c5f4
SHA51230402f761b30147ad56861e2c5da6b70c5a9056cf6b582a5c333b9f867259fd42bb2e18c8d8a43762a9365e7147d624e13f0356d307535863ba0b2c9567e486b
-
\Users\Admin\AppData\Local\Temp\b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe
Filesize158KB
MD5b07f2b96517cf26510f56b0f51e576be
SHA1872cb09ef723042057f2af82a6a38421b9588f27
SHA25683f0585a53cb0c83e4ff4e9a405bfe65aa538e3dabe384896007d823e7244e4b
SHA5125b9ec4cbf149e62fd5a1f4948d7832e7e84b80be10ed8d08aa37f10c2ccd9210963fac916b336dd3657c25c772ad448753fc627484e87ba8f9ba55f882518ef3