Analysis
-
max time kernel
0s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 18:49
Static task
static1
Behavioral task
behavioral1
Sample
3ac86c4ec5a90ec6e42323a1140f97fb.exe
Resource
win7-20231129-en
General
-
Target
3ac86c4ec5a90ec6e42323a1140f97fb.exe
-
Size
70KB
-
MD5
3ac86c4ec5a90ec6e42323a1140f97fb
-
SHA1
9424f200f0a76409d2b1567762c449ea2023f90d
-
SHA256
facadd5fbff3d577a0b0f107ac32ee67dbf06d2fe15f11b1ddfb3ddd1bec580e
-
SHA512
a3c97aedc1e5cac62ece5730b5803c93f33b78af56076da77f8033db89f5abc233ef9bd8899684e2b0977fb801268a782024256fd4ba5121eb6992284dde3b27
-
SSDEEP
1536:p4q8Q1xZtffrb8sjPFNhTYsFFrzckH2fmitF07Q:qKtfDwsjPThTYszDH2fD07Q
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2252 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1856 Logo1_.exe 2756 3ac86c4ec5a90ec6e42323a1140f97fb.exe -
Loads dropped DLL 2 IoCs
pid Process 2252 cmd.exe 2252 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe Logo1_.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe Logo1_.exe File opened for modification C:\Program Files\7-Zip\7z.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe Logo1_.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 3ac86c4ec5a90ec6e42323a1140f97fb.exe File created C:\Windows\virDll.dll Logo1_.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1856 Logo1_.exe 1856 Logo1_.exe 1856 Logo1_.exe 1856 Logo1_.exe 1856 Logo1_.exe 1856 Logo1_.exe 1856 Logo1_.exe 1856 Logo1_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 780 wrote to memory of 2252 780 3ac86c4ec5a90ec6e42323a1140f97fb.exe 19 PID 780 wrote to memory of 2252 780 3ac86c4ec5a90ec6e42323a1140f97fb.exe 19 PID 780 wrote to memory of 2252 780 3ac86c4ec5a90ec6e42323a1140f97fb.exe 19 PID 780 wrote to memory of 2252 780 3ac86c4ec5a90ec6e42323a1140f97fb.exe 19 PID 780 wrote to memory of 1856 780 3ac86c4ec5a90ec6e42323a1140f97fb.exe 18 PID 780 wrote to memory of 1856 780 3ac86c4ec5a90ec6e42323a1140f97fb.exe 18 PID 780 wrote to memory of 1856 780 3ac86c4ec5a90ec6e42323a1140f97fb.exe 18 PID 780 wrote to memory of 1856 780 3ac86c4ec5a90ec6e42323a1140f97fb.exe 18 PID 1856 wrote to memory of 1380 1856 Logo1_.exe 7 PID 1856 wrote to memory of 1380 1856 Logo1_.exe 7 PID 2252 wrote to memory of 2756 2252 cmd.exe 16 PID 2252 wrote to memory of 2756 2252 cmd.exe 16 PID 2252 wrote to memory of 2756 2252 cmd.exe 16 PID 2252 wrote to memory of 2756 2252 cmd.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ac86c4ec5a90ec6e42323a1140f97fb.exe"C:\Users\Admin\AppData\Local\Temp\3ac86c4ec5a90ec6e42323a1140f97fb.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1856
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a8F6.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2252
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\3ac86c4ec5a90ec6e42323a1140f97fb.exe"C:\Users\Admin\AppData\Local\Temp\3ac86c4ec5a90ec6e42323a1140f97fb.exe"1⤵
- Executes dropped EXE
PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
529B
MD51e7e364ed84e753b7771011ddd0451b7
SHA183750a1b684a148b6974f6eca5e78cc9c07df83f
SHA256f280aaebc2a0de6b77c51e62b8986a02ccafd8aee45079368c62bbf7ed410160
SHA512c47e79c0cec6cd4ec4f3236fe99e8b650cf2b4af56b4ba1760be90980b57e1f9689b884f70a1bba4ba66576c1c6f32f546715f7c0626ab2414db88c9c4b9e3fc
-
Filesize
12KB
MD5897cc6ed17649490dec8e20e9dd7ffd6
SHA1cb3a77d8dd7edf46de54545ca7b0c5b201f85917
SHA256cfb6b16c6c7ee64111fe96a82c4619db26ea4bac0e39c5cb29d1181b8c065f34
SHA512b719f7b95f723d0563b270f1260d086168b118189ca74f2aef37e90ad55d66f5c261ecfb15f77e80af6a551587b966bf48818a6421350f8e86b8a5f59acbc2ca
-
Filesize
35KB
MD5b91239a391813bbe7187ccdbf8e397ad
SHA19601dde2ab67de4f18c122cd28a694ef5861f30c
SHA25656b2a7c1f32c1f653e598a09bcb96b5ffba7627ffb418638d15f1a30722c4545
SHA512cb83cd0ae020fd574bb0d7d4cad404bdc6a7bdc78710382a58c497f67e7ee0e55e404db7cafddc36f722da5abc32cb7c696aa03001bf6c9ec0fb661b2f7c85b2
-
Filesize
11KB
MD537f8bf8f661fe6b33b5e78586908587f
SHA1111d892c0c0752946b5a5a2038706adab32db02e
SHA256362438f732e66a7f08c61f1965bb0892adfa328e0ea6c35fcabe46f5a255c86d
SHA51277af9e293f3f646ec8a08bfcdaf9b113c16fbb61e8e738dd3ba7bad34496f9062ca6126b46620119ade88490f7a8a14dd543934a233f303cdb8b78fe0183b320
-
Filesize
50KB
MD5e1afa3ce65837f5e9c002e409a85ac0d
SHA1b50f2348d8425e0a7d13fe29a82cab18cb510285
SHA256f13e6cd953c042dbadc3087b81de39c9a3506a50382e414002d651e1afa16cbd
SHA5122a0fd9706728326502e336e34226d0516ac8109281c5f459097ee46fc41824065a9bb24348ec61b99985a3e0a604a146625e964988a57515d3bf2c9543f01bcc
-
Filesize
8KB
MD5a85ca7546e6cb608756261e6a24ed404
SHA1f9fa5b3a066d2f2dda96fdd8f61b7e93fc7e2394
SHA2563a642eb811c9b62c711ecbfe427ba4cf1dc41563bf0f2ed5686768d438f1f80e
SHA5126f7e8bd606c0d021d92da634a33af6e36ac9e62ba4975d3f9f24a7ee9745c0931dc9fdd5a1cec844d9341c02a7bd3f6ff4914f2195261f839eda2f51573d1683