Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
19-11-2023 04:57
Static task
static1
Behavioral task
behavioral1
Sample
d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe
Resource
win10v2004-20231023-en
General
-
Target
d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe
-
Size
61KB
-
MD5
4a7cfec46488c4775792f654247cda5d
-
SHA1
cee11554f8303a8c45d5ec6db89950e23e679c4d
-
SHA256
d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4
-
SHA512
a79fb543787476817ad0374f6982d53bc13bffeff1332a9e2094b3d14acd8ff0c9e10114d41ae852b810de6353d42bec53a473e0a2c60883def02139632d242b
-
SSDEEP
1536:TW13SHuJV9QaxSzc1kVQctbHB1gTXL7heiEE:TAkuJVFSqctbHB1ufQJE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2672 Logo1_.exe 2828 d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe -
Loads dropped DLL 1 IoCs
pid Process 2764 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PrivateAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\3082\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe File created C:\Windows\Logo1_.exe d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2764 2180 d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe 28 PID 2180 wrote to memory of 2764 2180 d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe 28 PID 2180 wrote to memory of 2764 2180 d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe 28 PID 2180 wrote to memory of 2764 2180 d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe 28 PID 2180 wrote to memory of 2672 2180 d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe 30 PID 2180 wrote to memory of 2672 2180 d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe 30 PID 2180 wrote to memory of 2672 2180 d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe 30 PID 2180 wrote to memory of 2672 2180 d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe 30 PID 2672 wrote to memory of 2848 2672 Logo1_.exe 31 PID 2672 wrote to memory of 2848 2672 Logo1_.exe 31 PID 2672 wrote to memory of 2848 2672 Logo1_.exe 31 PID 2672 wrote to memory of 2848 2672 Logo1_.exe 31 PID 2848 wrote to memory of 2588 2848 net.exe 33 PID 2848 wrote to memory of 2588 2848 net.exe 33 PID 2848 wrote to memory of 2588 2848 net.exe 33 PID 2848 wrote to memory of 2588 2848 net.exe 33 PID 2764 wrote to memory of 2828 2764 cmd.exe 34 PID 2764 wrote to memory of 2828 2764 cmd.exe 34 PID 2764 wrote to memory of 2828 2764 cmd.exe 34 PID 2764 wrote to memory of 2828 2764 cmd.exe 34 PID 2672 wrote to memory of 1204 2672 Logo1_.exe 15 PID 2672 wrote to memory of 1204 2672 Logo1_.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe"C:\Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a312E.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe"C:\Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe"4⤵
- Executes dropped EXE
PID:2828
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2588
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5dfa205bb023b7bbe85172fbd45871dd8
SHA1f3b5412ec65c3e81116dcf016f8bc19c6b2e51a0
SHA256aec3d1874294016edf267e2e0207bedbe710396c9d29f2468c0f46d57ac00640
SHA512bdf76a8fe0d49120ddf99f377e17c0a7cfe61fdb9932d4a66acb90476fe11404297357c3bbdb7f96edd156ff0848c2388042c047ff743685f85175cbd4c024ac
-
Filesize
474KB
MD5a129ff6e8fb70f53efa3d7ffa661a6c7
SHA108cb3f944ac454c45fa7c5dc7b4f3baa676aa427
SHA256c807165aee414ab50b72e5497f2bfa612636dc7d2596c2e947c0a2985dadeab5
SHA51293c3a31b918d586c845dbadd7e40ffb991445ec21e9bfe57c375d772d41e35d090ffd6d96718e21f7bae4a760a3895c4584d21f0c71919a031d287ea5f407f73
-
Filesize
722B
MD54aa882005c2e47fde07813359fcb2cd7
SHA1d7fa1078661e4b92678b313089e3a90758968a35
SHA2560adcccfa8ecc3913f74626a174c1313024e7d67dd22ea6912682e30a23226c8f
SHA512b307b62df63e5fffb6f4af70e0cf162c4d534c148609229842a4ddcc2e191f72fa1f5e8848db7400c7f2baa910f5f6af67e901fb5e2d6ad98fdc4da19100a048
-
Filesize
722B
MD54aa882005c2e47fde07813359fcb2cd7
SHA1d7fa1078661e4b92678b313089e3a90758968a35
SHA2560adcccfa8ecc3913f74626a174c1313024e7d67dd22ea6912682e30a23226c8f
SHA512b307b62df63e5fffb6f4af70e0cf162c4d534c148609229842a4ddcc2e191f72fa1f5e8848db7400c7f2baa910f5f6af67e901fb5e2d6ad98fdc4da19100a048
-
C:\Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe
Filesize32KB
MD53de16cea01950aac6a7a5eeb8cb102b0
SHA1c89dd3ce02600d1ef68a83e85947d7e8c4e62cc8
SHA256cd60e89b2ff2743bad3c298ab6f44e005e4986413d1cf97bede0185ac3f12280
SHA5127120b8226aac32933bc1561b432093422a4d708b3c75bd4eea506f7f6586b0014ce2debf7da71874947274632db6f7ffd67b5ec0c88dd9d8f2ecff0b34e12df2
-
C:\Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe.exe
Filesize32KB
MD53de16cea01950aac6a7a5eeb8cb102b0
SHA1c89dd3ce02600d1ef68a83e85947d7e8c4e62cc8
SHA256cd60e89b2ff2743bad3c298ab6f44e005e4986413d1cf97bede0185ac3f12280
SHA5127120b8226aac32933bc1561b432093422a4d708b3c75bd4eea506f7f6586b0014ce2debf7da71874947274632db6f7ffd67b5ec0c88dd9d8f2ecff0b34e12df2
-
Filesize
29KB
MD582897f96ab4c9d6951949ed787ce5c87
SHA1324beecf3d6dc238b525a9268aad0ea7e7d7f0ab
SHA25686b5a14b0a24afb270907b76502e74d5fa0bb64417217d60c7ac7ddf11876830
SHA512fbb83f707e8c5a54d5aecee752ed49799cbcea66741f1d813e3aa0286fcdc2dc85967a9fb7a20590025e3710cf0100de143bdd5d8ecdada4a50c01bd86219cc6
-
Filesize
29KB
MD582897f96ab4c9d6951949ed787ce5c87
SHA1324beecf3d6dc238b525a9268aad0ea7e7d7f0ab
SHA25686b5a14b0a24afb270907b76502e74d5fa0bb64417217d60c7ac7ddf11876830
SHA512fbb83f707e8c5a54d5aecee752ed49799cbcea66741f1d813e3aa0286fcdc2dc85967a9fb7a20590025e3710cf0100de143bdd5d8ecdada4a50c01bd86219cc6
-
Filesize
29KB
MD582897f96ab4c9d6951949ed787ce5c87
SHA1324beecf3d6dc238b525a9268aad0ea7e7d7f0ab
SHA25686b5a14b0a24afb270907b76502e74d5fa0bb64417217d60c7ac7ddf11876830
SHA512fbb83f707e8c5a54d5aecee752ed49799cbcea66741f1d813e3aa0286fcdc2dc85967a9fb7a20590025e3710cf0100de143bdd5d8ecdada4a50c01bd86219cc6
-
Filesize
29KB
MD582897f96ab4c9d6951949ed787ce5c87
SHA1324beecf3d6dc238b525a9268aad0ea7e7d7f0ab
SHA25686b5a14b0a24afb270907b76502e74d5fa0bb64417217d60c7ac7ddf11876830
SHA512fbb83f707e8c5a54d5aecee752ed49799cbcea66741f1d813e3aa0286fcdc2dc85967a9fb7a20590025e3710cf0100de143bdd5d8ecdada4a50c01bd86219cc6
-
Filesize
10B
MD5b37b393b54a7359a4db72d7ede7217d8
SHA1f72b757d8b265002cdbb349b309817684b06c790
SHA256b2a681fd703549670a45f0f394a78843add6199a491ec7194d74454e7fa717a7
SHA5127da2eacf26b7627db3ae5f29780bb8750b618f4e56b5b6576cae090c49b417c74d0df7402c6d07d9356004a70f5e9b968c14847d652df627d6a00227966f1772
-
\Users\Admin\AppData\Local\Temp\d5df0d0eb5005424dfd584ec5ef355a7e0fe0ad4fee53a191b1b9bfb9d615eb4.exe
Filesize32KB
MD53de16cea01950aac6a7a5eeb8cb102b0
SHA1c89dd3ce02600d1ef68a83e85947d7e8c4e62cc8
SHA256cd60e89b2ff2743bad3c298ab6f44e005e4986413d1cf97bede0185ac3f12280
SHA5127120b8226aac32933bc1561b432093422a4d708b3c75bd4eea506f7f6586b0014ce2debf7da71874947274632db6f7ffd67b5ec0c88dd9d8f2ecff0b34e12df2