Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
20/11/2023, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe
Resource
win10v2004-20231025-en
General
-
Target
07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe
-
Size
56KB
-
MD5
dfd818b141baa165bf43194752aa6565
-
SHA1
dca2e96f7dbeb397401c99d3e1183be1cc17dfb4
-
SHA256
07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47
-
SHA512
89312c27b7d8a9b6e36ff8e443957500687ab23a0bdfee0467180eb1c04367c84ee11cf7f2f0213469f2efd63001e80c5443444674378359848b776ecd0ef369
-
SSDEEP
1536:XfgLdQAQfcfymNG+KxqYDK22zvgjgo5v1H:XftffjmNoxqYRVgoj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2188 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1084 Logo1_.exe 2824 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe -
Loads dropped DLL 1 IoCs
pid Process 2188 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\STS2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FRAR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe File created C:\Windows\Logo1_.exe 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2188 1532 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 28 PID 1532 wrote to memory of 2188 1532 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 28 PID 1532 wrote to memory of 2188 1532 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 28 PID 1532 wrote to memory of 2188 1532 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 28 PID 1532 wrote to memory of 1084 1532 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 30 PID 1532 wrote to memory of 1084 1532 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 30 PID 1532 wrote to memory of 1084 1532 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 30 PID 1532 wrote to memory of 1084 1532 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 30 PID 1084 wrote to memory of 2036 1084 Logo1_.exe 31 PID 1084 wrote to memory of 2036 1084 Logo1_.exe 31 PID 1084 wrote to memory of 2036 1084 Logo1_.exe 31 PID 1084 wrote to memory of 2036 1084 Logo1_.exe 31 PID 2188 wrote to memory of 2824 2188 cmd.exe 33 PID 2188 wrote to memory of 2824 2188 cmd.exe 33 PID 2188 wrote to memory of 2824 2188 cmd.exe 33 PID 2188 wrote to memory of 2824 2188 cmd.exe 33 PID 2036 wrote to memory of 2756 2036 net.exe 34 PID 2036 wrote to memory of 2756 2036 net.exe 34 PID 2036 wrote to memory of 2756 2036 net.exe 34 PID 2036 wrote to memory of 2756 2036 net.exe 34 PID 1084 wrote to memory of 1264 1084 Logo1_.exe 11 PID 1084 wrote to memory of 1264 1084 Logo1_.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe"C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a57F0.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe"C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe"4⤵
- Executes dropped EXE
PID:2824
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2756
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD58492f566225e557f3908460cb8d51626
SHA1f9712b88a4825f7869494e8d4c3a2ec560878b89
SHA2561cbcf9daf8569840caad44f23bf4b61296f4b908472e08a5d9e425018002ee81
SHA5126c6649c5464136e5929257abcc5c1fa61c0aae74d43d4332da19ff0aaa4cf683a5dc6d681d1806d8698a0bf7914200bfe14ed5009bc83c267ea2df06d6914874
-
Filesize
471KB
MD5c6c8fde27f649c91ddaab8cb9ca344a6
SHA15e4865aec432a18107182f47edda176e8c566152
SHA25632c3fed53bfc1d890e9bd1d771fdc7e2c81480e03f1425bce07b4045a192d100
SHA512a8df7d1e852d871d7f16bae10c4ff049359583da88cc85a039f0298525839040d5363ce5ef4cbdb92a12a25785f73df83cf0df07752b78e6e6444f32160a2155
-
Filesize
722B
MD58de34b8cbfe7b54b9426ead6d4d35f1d
SHA14ab8a30bb933bfb225991c195533de644c114d43
SHA256dcb9ded77ce887695a5e8ef831bf355a339e15ee32cbd8ff5dc63959a78b9cc1
SHA512015d60d3a7df54a50f5eacc481efd984a893baf09bab6e1477bd5260f204756f6bfa9316e43a14470686bd537d4fe87421d7205195663f06dd7095d8b8661cb7
-
Filesize
722B
MD58de34b8cbfe7b54b9426ead6d4d35f1d
SHA14ab8a30bb933bfb225991c195533de644c114d43
SHA256dcb9ded77ce887695a5e8ef831bf355a339e15ee32cbd8ff5dc63959a78b9cc1
SHA512015d60d3a7df54a50f5eacc481efd984a893baf09bab6e1477bd5260f204756f6bfa9316e43a14470686bd537d4fe87421d7205195663f06dd7095d8b8661cb7
-
C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe
Filesize30KB
MD5e5a07c7a8d47b4445318f0a34c5dcf61
SHA1e33cffbf4f0d122b51cae4cb63e410d5554bfd0b
SHA2568c40039fadb0a8a45d638160c8f6f5c7cc3a8b85afe2dabf494926c610348fc2
SHA512c8de6f9dad39711456e0291ba72699b3a186b6132887425b16b4c7bbf380c27a16de010a4efdaf29e6216404500a4541e436dd49ecf1a814a2fa514ddcb9c7a6
-
C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe.exe
Filesize30KB
MD5e5a07c7a8d47b4445318f0a34c5dcf61
SHA1e33cffbf4f0d122b51cae4cb63e410d5554bfd0b
SHA2568c40039fadb0a8a45d638160c8f6f5c7cc3a8b85afe2dabf494926c610348fc2
SHA512c8de6f9dad39711456e0291ba72699b3a186b6132887425b16b4c7bbf380c27a16de010a4efdaf29e6216404500a4541e436dd49ecf1a814a2fa514ddcb9c7a6
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
10B
MD55e76cfc33a5459a5b5394ebf5b4fb5d7
SHA12f26d96447cf7431ca7ff0757b3edbae97f3c14e
SHA256e4313276577226a8016efa4678d1d8357aae1ba682953d56f8b0b1d5976f5bab
SHA512dd064e348691ba39ad6890deb29b6906bbc9fe4a390ae6fb3091cca3988d1757056904d1744c664113712b652ad10eba21e31b0b2df8a9e976bcaaebaedd5f79
-
\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe
Filesize30KB
MD5e5a07c7a8d47b4445318f0a34c5dcf61
SHA1e33cffbf4f0d122b51cae4cb63e410d5554bfd0b
SHA2568c40039fadb0a8a45d638160c8f6f5c7cc3a8b85afe2dabf494926c610348fc2
SHA512c8de6f9dad39711456e0291ba72699b3a186b6132887425b16b4c7bbf380c27a16de010a4efdaf29e6216404500a4541e436dd49ecf1a814a2fa514ddcb9c7a6