Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-01-2024 22:33
Static task
static1
Behavioral task
behavioral1
Sample
bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe
Resource
win10v2004-20231215-en
General
-
Target
bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe
-
Size
88KB
-
MD5
0f9a03adad8502ac57209b486eaf746f
-
SHA1
59793e041534b72744869dff56d4523e01ec6412
-
SHA256
bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1
-
SHA512
6cf1e41934bd51e266e80c0c84d6bc7dc3f20741122fc7d9137fadcac337d5cccc142b69517b4b731e3a187c31ca0d35306fd4ddc29b88540d135454d6b46ba1
-
SSDEEP
1536:pKck3SHuJV9NralnvtMgFPpIjjvUG+PdUFuAoUOshm/qoK:pKckkuJVLsv3SHv1ydAOss/U
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2956 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2408 Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpconfig.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1031\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2956 2216 bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe 28 PID 2216 wrote to memory of 2956 2216 bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe 28 PID 2216 wrote to memory of 2956 2216 bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe 28 PID 2216 wrote to memory of 2956 2216 bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe 28 PID 2216 wrote to memory of 2408 2216 bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe 30 PID 2216 wrote to memory of 2408 2216 bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe 30 PID 2216 wrote to memory of 2408 2216 bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe 30 PID 2216 wrote to memory of 2408 2216 bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe 30 PID 2408 wrote to memory of 2764 2408 Logo1_.exe 31 PID 2408 wrote to memory of 2764 2408 Logo1_.exe 31 PID 2408 wrote to memory of 2764 2408 Logo1_.exe 31 PID 2408 wrote to memory of 2764 2408 Logo1_.exe 31 PID 2764 wrote to memory of 2688 2764 net.exe 34 PID 2764 wrote to memory of 2688 2764 net.exe 34 PID 2764 wrote to memory of 2688 2764 net.exe 34 PID 2764 wrote to memory of 2688 2764 net.exe 34 PID 2956 wrote to memory of 2972 2956 cmd.exe 33 PID 2956 wrote to memory of 2972 2956 cmd.exe 33 PID 2956 wrote to memory of 2972 2956 cmd.exe 33 PID 2956 wrote to memory of 2972 2956 cmd.exe 33 PID 2956 wrote to memory of 2972 2956 cmd.exe 33 PID 2956 wrote to memory of 2972 2956 cmd.exe 33 PID 2956 wrote to memory of 2972 2956 cmd.exe 33 PID 2408 wrote to memory of 1196 2408 Logo1_.exe 16 PID 2408 wrote to memory of 1196 2408 Logo1_.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe"C:\Users\Admin\AppData\Local\Temp\bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a46E0.bat3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\InstallShield\setup.exe"C:\Users\Admin\AppData\Local\Temp\bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe" -isw64"C:\Users\Admin\AppData\Local\Temp\bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe"4⤵PID:2972
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2688
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD522d003d3f5edc56ca7ec1e07f50145db
SHA10a831d187f1e656e29900a871039f9682f1e3f10
SHA256db47539501bb96d6ee9207e3021c989985864c5426b907cf330de7aca5058c70
SHA512d0919f9a98731cc619ac07836f5e4dd6d8793665909fdb1d9de526be6ed7bd787bbfb52034a8596304cee07ced99635e7e966a88b79b3244c0fc169025558367
-
Filesize
474KB
MD525408b7ff8c885c99c0429788fcc1320
SHA1e5a91f3984dd3569a32a8b82c95a5430e828eb75
SHA256ce5b5c337e6b25e7ea60ab1a528dcf8c70e952761b99c47a5051a17aabd9462c
SHA512680cfc4bbcf7859075dd43a4a4e3a41084cd3e4783ad3fb35f1d9ee1971a3324ef132f65bd8afd9e245eb2ffcd27e02b035f1f96a0a97a06c37b620849d68c15
-
Filesize
722B
MD56b80a64878a4dd78218a75609838111f
SHA1df5f4fa5cd3bb7cda6bcafbf04065e0e1cedaae3
SHA256ba7afda29efc6c29396fe2e36d02e8fc2b8d4de727aef9d0d53ce4e95c2b6ece
SHA5124bd942dc7b57508381d8c37dfd0993d2b5cfca7107bf935d3191792b93aa09c0e116391b93b9fe3f05a3ffccb445297b1cd22e07b0c41fae428c37eafb447bfe
-
C:\Users\Admin\AppData\Local\Temp\bcaa52cac703a42fe13fb1a8e8640a5f9a1fd397fe1febb4413a832bc90f47c1.exe.exe
Filesize59KB
MD53e6786059721b2cd79665d5fbbed6a7c
SHA12260b5b2c565f5a8c03d5d418384538a315200ca
SHA256dab500bb3283cecf0079891fe5082c9e4442e19b88e7cbec95f4d873a6bef968
SHA512cd5e1bf4b51443df34e2e43b7e650ab42b852ea551fa6e3738efa7fe7a947610ef12ac729d60ab4b3bc38f13c82d5340513ef9cdd326d7eb57d0a2224cc2927a
-
Filesize
29KB
MD5d8bdfe1646d2659fdb23730409bf38ae
SHA1887fb9da472efab54f9af265cd7da777b3430db6
SHA2569e4d074cb14179eecfb995d1fb507779698cc72ed445596ee23b9daf6966512a
SHA512feb8ed7223513c3c0ae9593a6d396944f69d51ede7f7dcef7eb8e401a1a5cdd5fe5f3dd54716c6810e5458f737ecb90ad9a4493add1bd196354e1bb284b12939
-
Filesize
9B
MD50b7b9562015af2b7e19efc062b59ee14
SHA1bca831ddb43ecb24747e57434d4b443497801c21
SHA2567ef40a98b77a81085c0a426908276cbaead1573daf25f79344d7b4502d953774
SHA512bd3c5f0408ac0ad1b82734cc0c4aca5fa6c96c901307f2e85dc4ce6d1db5a91ac6f7e4794e84286813fd94c648665a94f3496e5d22f6b0f624af4b795871f5a3