Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-01-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe
Resource
win10v2004-20231215-en
General
-
Target
27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe
-
Size
66KB
-
MD5
c4b10b13cf79189a22d7ba650292c425
-
SHA1
0c6002e4965cd4512671dea684c8ac5860170e87
-
SHA256
27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca
-
SHA512
2d52fddca0e1d911189586eebbe22fc728b195a237c34e629264b4a4353831a799d270ed32e9f6cf813c0baa1effeb6a94b3360d44ac66a906b625db99eb4510
-
SSDEEP
1536:6fgLdQAQfcfymNoaZ6KfkuMOLCurXxuguUp:6ftffjmNoa1fkREBuguUp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2116 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Games\Hearts\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File created C:\Program Files (x86)\Windows Mail\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe File created C:\Windows\Logo1_.exe 27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2712 Logo1_.exe 2712 Logo1_.exe 2712 Logo1_.exe 2712 Logo1_.exe 2712 Logo1_.exe 2712 Logo1_.exe 2712 Logo1_.exe 2712 Logo1_.exe 2712 Logo1_.exe 2712 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2116 2184 27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe 28 PID 2184 wrote to memory of 2116 2184 27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe 28 PID 2184 wrote to memory of 2116 2184 27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe 28 PID 2184 wrote to memory of 2116 2184 27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe 28 PID 2184 wrote to memory of 2712 2184 27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe 30 PID 2184 wrote to memory of 2712 2184 27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe 30 PID 2184 wrote to memory of 2712 2184 27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe 30 PID 2184 wrote to memory of 2712 2184 27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe 30 PID 2712 wrote to memory of 2760 2712 Logo1_.exe 32 PID 2712 wrote to memory of 2760 2712 Logo1_.exe 32 PID 2712 wrote to memory of 2760 2712 Logo1_.exe 32 PID 2712 wrote to memory of 2760 2712 Logo1_.exe 32 PID 2760 wrote to memory of 2780 2760 net.exe 33 PID 2760 wrote to memory of 2780 2760 net.exe 33 PID 2760 wrote to memory of 2780 2760 net.exe 33 PID 2760 wrote to memory of 2780 2760 net.exe 33 PID 2712 wrote to memory of 1240 2712 Logo1_.exe 15 PID 2712 wrote to memory of 1240 2712 Logo1_.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe"C:\Users\Admin\AppData\Local\Temp\27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a7761.bat3⤵
- Deletes itself
PID:2116
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2780
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5396ff509e7e58678c6c9ec7b585dd294
SHA165ad8a38c1a63706bec886875eff250417e5cd8d
SHA25699fc771a474e3932c53721ca97f00d8f3b7ecbee9c0b0adde12d778420f1df6b
SHA51214de2875362e561c380b9da83aa709fd91075288b5b5d7679e437cc0810650af068a1de28fbab00a21c8663c76c7122eff002bee447c5c3d501a16a7b0ab281a
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5c12fa8deed8248019721e34e312ce286
SHA122201279b19184637e30e645c4062fe401aef3af
SHA256a76cab52f612ec681488754153d87f1df0ce6f007637335b09fe04b574085d0f
SHA512dfbfe33bb67e1246d9019410ea9bd282c0370c5e00d8293bf3c79751b1d4167e9647c48a5b248357990f99ea82861d5f680b80488fd2993a5fbeccdb6d089746
-
C:\Users\Admin\AppData\Local\Temp\27e264f36b576ca915513be5d2f1d76683e54458860f2ac29d62cc12fd3fafca.exe.exe
Filesize39KB
MD59f9e551e4e8dc497e80bd8cddc7d7e1e
SHA1fa0bf13043339272afb8aafb4521e768a00c6559
SHA2565539cf9226b50d68f34db8e56c7283c7e1c741de8cfd45234f269c3fd18ba6fa
SHA512809c471227fc7e5d7654305b15c357a188c08a3523874112b13ed8fee88f860369807698f0c3f0dce0bef985aecc4d3fa086bbcbee441bfca8fa4d787420342f
-
Filesize
26KB
MD588e8479bf968a88e0cfa32d86901e399
SHA101e2521dc3b54a4f6a7dbf239a0491295a87dff4
SHA25632ff6464973c3bae1019308b7bfe8ba0d2af7254fb4fb52a8f0ebc005a56e1b3
SHA51280119fdf7bb44e2339ec76950d581ab729876aad25e775a6881cd11efec608d187cebd87f8729d59a81f4430bc03b47cd289c5d4d90ec94af0dda66e1d732c4a
-
Filesize
9B
MD57f808734d303ae0442efdfce3344deee
SHA1c814ffceeaadd0b7d41254ebf9698895924d5d42
SHA2565b9baea2f17425d3edf9e446b467d55f39d41faaa8dbb351fea88b88bd20e79c
SHA512b0278d3f79e4d8101351196b056c29a03102cac7fce93ba755156b1706ae505eeac237f0febff2718603707499b9ace1dc9dde225230e11c875ab55471ef4e9c