Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:38
Static task
static1
Behavioral task
behavioral1
Sample
cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe
Resource
win10v2004-20231215-en
General
-
Target
cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe
-
Size
209KB
-
MD5
405a0661788e1d5758d5deee5630f5e9
-
SHA1
11a340ad45508afd012a5de55db66fa64c1f4346
-
SHA256
cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6
-
SHA512
804811a083df44e33c67a461d4232b524460ad4a512b3f08f0665fa93c3b0d830bd5770e661120a87639ed9b7e9b293457894bd78c93b575197ddc97547e7993
-
SSDEEP
3072:RftffjmNXb2SNKt/CQywzDL8M5JJDhfRtHRl74DF4ODoMWpTav7Fi:ZVfjmNKAKt/CBwzDHO7cpTavR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1048 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3008 Logo1_.exe 2684 cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe -
Loads dropped DLL 1 IoCs
pid Process 1048 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7z.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{1187FFC4-7B4C-4060-83CA-88C53EC9AD16}\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe File created C:\Windows\Logo1_.exe cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2916 wrote to memory of 1048 2916 cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe 14 PID 2916 wrote to memory of 1048 2916 cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe 14 PID 2916 wrote to memory of 1048 2916 cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe 14 PID 2916 wrote to memory of 1048 2916 cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe 14 PID 2916 wrote to memory of 3008 2916 cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe 20 PID 2916 wrote to memory of 3008 2916 cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe 20 PID 2916 wrote to memory of 3008 2916 cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe 20 PID 2916 wrote to memory of 3008 2916 cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe 20 PID 3008 wrote to memory of 948 3008 Logo1_.exe 19 PID 3008 wrote to memory of 948 3008 Logo1_.exe 19 PID 3008 wrote to memory of 948 3008 Logo1_.exe 19 PID 3008 wrote to memory of 948 3008 Logo1_.exe 19 PID 948 wrote to memory of 2664 948 net.exe 16 PID 948 wrote to memory of 2664 948 net.exe 16 PID 948 wrote to memory of 2664 948 net.exe 16 PID 948 wrote to memory of 2664 948 net.exe 16 PID 1048 wrote to memory of 2684 1048 cmd.exe 15 PID 1048 wrote to memory of 2684 1048 cmd.exe 15 PID 1048 wrote to memory of 2684 1048 cmd.exe 15 PID 1048 wrote to memory of 2684 1048 cmd.exe 15 PID 3008 wrote to memory of 1344 3008 Logo1_.exe 26 PID 3008 wrote to memory of 1344 3008 Logo1_.exe 26
Processes
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a780.bat1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe"C:\Users\Admin\AppData\Local\Temp\cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe"2⤵
- Executes dropped EXE
PID:2684
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"1⤵PID:2664
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"1⤵
- Suspicious use of WriteProcessMemory
PID:948
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3008
-
C:\Users\Admin\AppData\Local\Temp\cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe"C:\Users\Admin\AppData\Local\Temp\cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2916
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD522243913f6f3f43a9783d9507502feef
SHA170646c3cabc5de5ff0c1c899530bb28e3bdb0e32
SHA2568ee32093f71f58d09dd5fca9d1163b5e3137e7e236e136bf966855af742c70a8
SHA512bd38965591aaedd8486fe9a74ba7c945a35990de0c201f398c6a0c97da3c44e9f803498448f98848104a6c4b806cf232c9184257c95bf49e1f709638a6eab43b
-
Filesize
721B
MD5c86dfc7371e5b046b7828e41f8c83958
SHA1c2e5a00dd6a82b4d35a978e8409090d3d9416afd
SHA25613e8d1afa7b0cdb994f1224e8a0a918cb594f8b307cdf527274ff8b564735664
SHA5126ed40748cacddd8aa9ac5033a1017541fc5234988b6b99be157c7fbd389326eeb862e033cae3686dfa24d8c59913db567abc9e6412e5c8fa66a467c87b8bfb6d
-
C:\Users\Admin\AppData\Local\Temp\cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe
Filesize93KB
MD566eb67102ea7f080c49ceb03f20553e7
SHA1042ba17ff656e925630ac98ae3d32c08be670ab2
SHA256705799c07f6a47b975cb754fd74564968197c0484c9843c244907f016d35b540
SHA512d91bed58e0983278962f000f46362a47e3ab9cbe20abadaae619f30d99f1c66cebb137f0e2c5bcf1af5d74579740aaa1d2481953bd9105df01f8e693253c189c
-
Filesize
26KB
MD5f9e6e2b10236731c92beb834f2015421
SHA12ae694b9bf662a8eada79a37898a8f974f2adfb6
SHA2564fd7b2f72cd533415bd61a541bf40384f22bd3aeaae8666131eb7b6509f7efd0
SHA5129d0d2570445fc48b2bbb926aed818ea71e186935c2480014ae32de7fd38a4b02ddf33869affecb2588be07b447e13362df6858b55acc63659a6de9ad3b70099a
-
\Users\Admin\AppData\Local\Temp\cd73d31ee068c816c07974ea31e685501d0d7dc464d9f8e2ccd347f38f14b0a6.exe
Filesize183KB
MD54d0ffdf38e0fed9b7ab5005adae722a4
SHA19770186a8195de2a3f63363308f35209f8a359b2
SHA25621f10a13497344b35022afc7adc00329ce64ae031989ae182dc7ce20ede4c4e5
SHA512029b725ac2a949fe50403c9362c308cb549644bc517083267f0d1dbbe1ae7f4d4d3e66d59289a99123fcc5b5db2854b47656f67482304acf6be15a64c37641d8