Analysis
-
max time kernel
100s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 23:36
Static task
static1
Behavioral task
behavioral1
Sample
a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe
Resource
win10v2004-20231215-en
General
-
Target
a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe
-
Size
91KB
-
MD5
e18931b191f6ac84eadcadc94c0a9a4d
-
SHA1
6cb83d903daa257d3f02a4acd63efeebd3efc34a
-
SHA256
a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08
-
SHA512
63faf99ecf092f3671d1013100f17a07f27842eadcacdacb08105d0c1026e013432d54bd4ea9055966ac3b1d1065e1aa41920117bca4fa1ea9a1b2cff9a7d83b
-
SSDEEP
1536:ifgLdQAQfcfymNtT23xP9e3VEs096VPOnQ61cmg6agxCxyk:iftffjmNoxP900sVOnQ61lgDgdk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1792 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2788 Logo1_.exe 2244 a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe -
Loads dropped DLL 1 IoCs
pid Process 1792 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe File created C:\Windows\Logo1_.exe a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe 2788 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2784 wrote to memory of 1792 2784 a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe 16 PID 2784 wrote to memory of 1792 2784 a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe 16 PID 2784 wrote to memory of 1792 2784 a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe 16 PID 2784 wrote to memory of 1792 2784 a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe 16 PID 2784 wrote to memory of 2788 2784 a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe 22 PID 2784 wrote to memory of 2788 2784 a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe 22 PID 2784 wrote to memory of 2788 2784 a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe 22 PID 2784 wrote to memory of 2788 2784 a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe 22 PID 2788 wrote to memory of 3032 2788 Logo1_.exe 20 PID 2788 wrote to memory of 3032 2788 Logo1_.exe 20 PID 2788 wrote to memory of 3032 2788 Logo1_.exe 20 PID 2788 wrote to memory of 3032 2788 Logo1_.exe 20 PID 3032 wrote to memory of 2736 3032 net.exe 18 PID 3032 wrote to memory of 2736 3032 net.exe 18 PID 3032 wrote to memory of 2736 3032 net.exe 18 PID 3032 wrote to memory of 2736 3032 net.exe 18 PID 2788 wrote to memory of 1368 2788 Logo1_.exe 7 PID 2788 wrote to memory of 1368 2788 Logo1_.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe"C:\Users\Admin\AppData\Local\Temp\a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a5BB.bat2⤵
- Deletes itself
- Loads dropped DLL
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe"C:\Users\Admin\AppData\Local\Temp\a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe"3⤵
- Executes dropped EXE
PID:2244
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"1⤵PID:2736
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"1⤵
- Suspicious use of WriteProcessMemory
PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5186d74cbe3a438aa44bf66682530f5b9
SHA1d365d9ba34182fffde7c4ed515d6f3320c07e4f7
SHA2566ba8f27bdda75879cb48ef2b23e7bc3786cab67163e5bcdbd03b5e61df5ffd26
SHA5122eecd88f16c79ecf00988579d05df382b78edf26ef46638cbba5bdab72ccc69aa65625d25076d20899a2c14c121e21c20629a970996690018872f0f502bb9769
-
Filesize
1KB
MD5241b98b460cc18098ddc046472c1a34f
SHA1f95cfc27e2fc8dedbd23692b6e7ff3e5c42a47e5
SHA25683269cb53554e1bfbed50ce1f108c3a0642ce9068b39183b92903b6f34a42816
SHA5127a7564a47938e73f11b7839c04c227e5a0219e40c77977def439b737e27346f129c24626e84fc6e42b0346805b8c6a2b86dbabba265fc42615882a04e4dfb48b
-
Filesize
721B
MD533560eb7dc6d83569c2eff125ea00d51
SHA19af6a0ba334759b951a5d51145c9830fe33eab99
SHA25659541c921bc1f4361a85811e7cb393ca5155bc1b3edf697bc10ff78201eebc21
SHA512f7f1c2adb00c2b80c9d0bf227955d5e2d4ddd791994080171776daa2cfc2b732cb645d679395351d6e9845a9defbb747b67bdb35df2af9a462573f4f1bc9c635
-
C:\Users\Admin\AppData\Local\Temp\a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe
Filesize23KB
MD51e7c7e0d5763e816da075ee80667839a
SHA1a67de3718adaa391e0a1ee0cf52e320445771341
SHA25659907af52bcd98eae86a30856e4676fb6f96ab8fba7bbdb052a56f336885471a
SHA5122b9f216b3eea03b7378dec0e55c39a9665a789a384c340844b010a2b144e11811a65953fe14c6a3f54446567a9b30aa1b35dfc54244d690ce2cdca2864ad3ae9
-
C:\Users\Admin\AppData\Local\Temp\a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe.exe
Filesize29KB
MD50e8b954985429208731d7839b36fe515
SHA181c7a75af5315b9f585810195bf5538acd4d1236
SHA256a420bd01b51b6e98351013cb1c85528992af1a0108eac8068988ce0e05cd47e3
SHA512c941c056053cc583ca7629b6c9287b2c704134b7d61c8f3b89809888c85bb2cd82dae81977c494a98d4f7f4babf2f5d011c7ba33d9adc6d174a54107936355ef
-
Filesize
7KB
MD58452508443334ab5c034b967fa0e887a
SHA1defc2af0659bb3be6b64d50558157440127e3d72
SHA256cf4af707c269b139bff704cec5cdaf16df3a7955d5a86a164b2bff17bacf0cf0
SHA512a4fb33f3a9362e98b5cb5b20265161feacdee4f4b266d55d94651ca0896bea39b39ff61791018faaf1cc471168ed1f12ed4975263355cba7d22702df07516a4a
-
Filesize
26KB
MD58f8f7d1283da7486a98b4753427866fc
SHA1721e29e2ac62c4a7a74d0efebab549d124763edb
SHA25645a7aa639e9b93c7f2facf50c3bb34eef44407120ad89b162e6b7a4ef1be6ea1
SHA5120ae3b0f32409018f2786d2e529ececffc78e39f964f5b52b6599492a94428737a76cbb1e1ef295e336cf111427b3c83041a39f82b964219e9560c3e0868d5076
-
Filesize
10B
MD53fb21251990dd269f80f958b0a71ed77
SHA15a505ccb9a59661e62ae104e2ff3ec8f2aa4cf5e
SHA256cb4d0049abaf6aa0990ec6488c023f61ef8f9bdcd7b82a814db7264271f060ec
SHA5123d401e86df952aa0bd86740f17df566b9800ce0aea48c9f61623d934436317038aebbcceaed0bc4cf38ce153b9ad8e853bb20aba42267563fc9ad96a99d0c637
-
\Users\Admin\AppData\Local\Temp\a6674e0d40fa7ddf465fc36f20c399ef09e73d3bf0d2a719db56646357b0cb08.exe
Filesize29KB
MD549c8fa1ba70d5f366a82e74db8eb6b13
SHA1693ec609d0675f8d30fa73555a77865e0c3ec663
SHA256452c532c62bff1068864941ec126a5453709c20df43c59d19439b1e5a222cb00
SHA512c3d286a6f07a29c1c9a62234678e49fe2c00d1b152a3275b6848907a33e0c32c5c903fb4e9a9916e2b3e96276d1f692d17e18c5ad9e5010dacdeeff068590db6