Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21-11-2023 20:03
Static task
static1
Behavioral task
behavioral1
Sample
5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe
Resource
win10v2004-20231020-en
General
-
Target
5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe
-
Size
189KB
-
MD5
db2d6311917f8ed73c52a9a877261d50
-
SHA1
d494e922ae64b83200cdd3459bb32666727a5ea3
-
SHA256
5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca
-
SHA512
c850d9b202a559b8fc78e44c6302992e302a7f8e8a8357f490fc5187e270a801f0fcba95d1c63a8074b8dcf0e1fb80cc513b849bb3e77eb0ee15d1b94f42560a
-
SSDEEP
3072:XftffjmNoxUJMcR/s6WeTdwzRTcP6+v8G/H4Z2GV9Zqob7ybmOHVb47DXfxcEfVF:PVfjmNDWTzRTcP6u/YZjFqhX27DZcET
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2232 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2244 Logo1_.exe 2732 5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Slate\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\en-US\enu-dsk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe File created C:\Windows\Logo1_.exe 5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2244 Logo1_.exe 2244 Logo1_.exe 2244 Logo1_.exe 2244 Logo1_.exe 2244 Logo1_.exe 2244 Logo1_.exe 2244 Logo1_.exe 2244 Logo1_.exe 2244 Logo1_.exe 2244 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2232 1456 5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe 29 PID 1456 wrote to memory of 2232 1456 5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe 29 PID 1456 wrote to memory of 2232 1456 5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe 29 PID 1456 wrote to memory of 2232 1456 5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe 29 PID 1456 wrote to memory of 2244 1456 5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe 30 PID 1456 wrote to memory of 2244 1456 5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe 30 PID 1456 wrote to memory of 2244 1456 5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe 30 PID 1456 wrote to memory of 2244 1456 5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe 30 PID 2244 wrote to memory of 2152 2244 Logo1_.exe 31 PID 2244 wrote to memory of 2152 2244 Logo1_.exe 31 PID 2244 wrote to memory of 2152 2244 Logo1_.exe 31 PID 2244 wrote to memory of 2152 2244 Logo1_.exe 31 PID 2232 wrote to memory of 2732 2232 cmd.exe 34 PID 2232 wrote to memory of 2732 2232 cmd.exe 34 PID 2232 wrote to memory of 2732 2232 cmd.exe 34 PID 2232 wrote to memory of 2732 2232 cmd.exe 34 PID 2152 wrote to memory of 2960 2152 net.exe 33 PID 2152 wrote to memory of 2960 2152 net.exe 33 PID 2152 wrote to memory of 2960 2152 net.exe 33 PID 2152 wrote to memory of 2960 2152 net.exe 33 PID 2244 wrote to memory of 1392 2244 Logo1_.exe 10 PID 2244 wrote to memory of 1392 2244 Logo1_.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe"C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a3FDE.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe"C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe"4⤵
- Executes dropped EXE
PID:2732
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2960
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD58492f566225e557f3908460cb8d51626
SHA1f9712b88a4825f7869494e8d4c3a2ec560878b89
SHA2561cbcf9daf8569840caad44f23bf4b61296f4b908472e08a5d9e425018002ee81
SHA5126c6649c5464136e5929257abcc5c1fa61c0aae74d43d4332da19ff0aaa4cf683a5dc6d681d1806d8698a0bf7914200bfe14ed5009bc83c267ea2df06d6914874
-
Filesize
471KB
MD5c6c8fde27f649c91ddaab8cb9ca344a6
SHA15e4865aec432a18107182f47edda176e8c566152
SHA25632c3fed53bfc1d890e9bd1d771fdc7e2c81480e03f1425bce07b4045a192d100
SHA512a8df7d1e852d871d7f16bae10c4ff049359583da88cc85a039f0298525839040d5363ce5ef4cbdb92a12a25785f73df83cf0df07752b78e6e6444f32160a2155
-
Filesize
722B
MD505ac16698aa9da38c4b5629b1aa5639a
SHA13e3588409983be2d1b6ee5b3a06680c3ad465bc9
SHA2567b0db41b7c6cca57560b1e935666307511c52a9305d9fb5b1e8e8bf0e750f51a
SHA512d12b461afdfdfb973e2ff2d20179ac41903b964e0f4027a468f6c2a9c9c0c01aba5c82764653e30ef8c5301373f938dd7ecbebf7ecf65c638f0d17b4f9969fc2
-
Filesize
722B
MD505ac16698aa9da38c4b5629b1aa5639a
SHA13e3588409983be2d1b6ee5b3a06680c3ad465bc9
SHA2567b0db41b7c6cca57560b1e935666307511c52a9305d9fb5b1e8e8bf0e750f51a
SHA512d12b461afdfdfb973e2ff2d20179ac41903b964e0f4027a468f6c2a9c9c0c01aba5c82764653e30ef8c5301373f938dd7ecbebf7ecf65c638f0d17b4f9969fc2
-
C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe
Filesize162KB
MD5c7575c57dd0b3e1d93b98f22281120ce
SHA16742c7a8f91bc1ad06908767b1bb01302f457bd3
SHA256456be13b7bfd64a3046e06e6732880d99214669bc2c0d648e4ecffd83f9f75a5
SHA5127186f700db928264bd98999732df0af1e14e4015c90658302612c166469e7a19432e3f23a2516c3be1449cf7b15cd6e957b187380598ce81bb29e719be58328b
-
C:\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe.exe
Filesize162KB
MD5c7575c57dd0b3e1d93b98f22281120ce
SHA16742c7a8f91bc1ad06908767b1bb01302f457bd3
SHA256456be13b7bfd64a3046e06e6732880d99214669bc2c0d648e4ecffd83f9f75a5
SHA5127186f700db928264bd98999732df0af1e14e4015c90658302612c166469e7a19432e3f23a2516c3be1449cf7b15cd6e957b187380598ce81bb29e719be58328b
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
10B
MD5964ac8d4b418c88016736343238e671b
SHA1bb68a3642be99aa9c113d48e397ad6578a3e9953
SHA256930485019ca5a8337ebfc670ff859a8a828e8d23578a93af9ef0ec302cc4bc2f
SHA5126e17b4086ac2efc6d57f97534b73f6a1465a75d213d0ddabf113c6b669b452ddac6ac43adeaabc3e67be53f1515fd9ff526f065d472d3f1f9a5fea16a6200846
-
\Users\Admin\AppData\Local\Temp\5a9633f2184ffef3f696d2e6569f3cf2495b901850854e238ed2cb9cad956eca.exe
Filesize162KB
MD5c7575c57dd0b3e1d93b98f22281120ce
SHA16742c7a8f91bc1ad06908767b1bb01302f457bd3
SHA256456be13b7bfd64a3046e06e6732880d99214669bc2c0d648e4ecffd83f9f75a5
SHA5127186f700db928264bd98999732df0af1e14e4015c90658302612c166469e7a19432e3f23a2516c3be1449cf7b15cd6e957b187380598ce81bb29e719be58328b