Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe
Resource
win10v2004-20231222-en
General
-
Target
f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe
-
Size
195KB
-
MD5
1214bd3267f9298cac712c0c646ed9bc
-
SHA1
41f0f2bd5126e8c3262853709e304a227941e46b
-
SHA256
f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3
-
SHA512
862960952f1a33e59f4de644a250ea76305ea8a29bcf5ac16527d72d495951bc37f525c350e7dfed35cb752a202c694841ca47cdc0e9e92e0df835edad6945c8
-
SSDEEP
3072:MftffjmNCsJ6EQJfF//tl6DZWTot/MRK5qoYD/Z1NTAAOeA2xNSzPNAOtJe:UVfjmNC4m/yDOSUg5qoMNTA/v2SzPOO0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1864 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 3068 Logo1_.exe 2388 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 2740 GLB19A8.tmp -
Loads dropped DLL 6 IoCs
pid Process 1864 cmd.exe 2388 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 2388 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 2388 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 2388 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 2740 GLB19A8.tmp -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\en-US\enu-dsk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\applet\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\XLSTART\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe Logo1_.exe File created C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe File created C:\Windows\Logo1_.exe f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3068 Logo1_.exe 3068 Logo1_.exe 3068 Logo1_.exe 3068 Logo1_.exe 3068 Logo1_.exe 3068 Logo1_.exe 3068 Logo1_.exe 3068 Logo1_.exe 3068 Logo1_.exe 3068 Logo1_.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1864 2192 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 28 PID 2192 wrote to memory of 1864 2192 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 28 PID 2192 wrote to memory of 1864 2192 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 28 PID 2192 wrote to memory of 1864 2192 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 28 PID 2192 wrote to memory of 3068 2192 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 29 PID 2192 wrote to memory of 3068 2192 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 29 PID 2192 wrote to memory of 3068 2192 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 29 PID 2192 wrote to memory of 3068 2192 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 29 PID 3068 wrote to memory of 2764 3068 Logo1_.exe 30 PID 3068 wrote to memory of 2764 3068 Logo1_.exe 30 PID 3068 wrote to memory of 2764 3068 Logo1_.exe 30 PID 3068 wrote to memory of 2764 3068 Logo1_.exe 30 PID 2764 wrote to memory of 2092 2764 net.exe 33 PID 2764 wrote to memory of 2092 2764 net.exe 33 PID 2764 wrote to memory of 2092 2764 net.exe 33 PID 2764 wrote to memory of 2092 2764 net.exe 33 PID 1864 wrote to memory of 2388 1864 cmd.exe 34 PID 1864 wrote to memory of 2388 1864 cmd.exe 34 PID 1864 wrote to memory of 2388 1864 cmd.exe 34 PID 1864 wrote to memory of 2388 1864 cmd.exe 34 PID 1864 wrote to memory of 2388 1864 cmd.exe 34 PID 1864 wrote to memory of 2388 1864 cmd.exe 34 PID 1864 wrote to memory of 2388 1864 cmd.exe 34 PID 2388 wrote to memory of 2740 2388 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 35 PID 2388 wrote to memory of 2740 2388 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 35 PID 2388 wrote to memory of 2740 2388 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 35 PID 2388 wrote to memory of 2740 2388 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 35 PID 2388 wrote to memory of 2740 2388 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 35 PID 2388 wrote to memory of 2740 2388 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 35 PID 2388 wrote to memory of 2740 2388 f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe 35 PID 3068 wrote to memory of 1188 3068 Logo1_.exe 7 PID 3068 wrote to memory of 1188 3068 Logo1_.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe"C:\Users\Admin\AppData\Local\Temp\f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a18DE.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe"C:\Users\Admin\AppData\Local\Temp\f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\GLB19A8.tmpC:\Users\Admin\AppData\Local\Temp\GLB19A8.tmp 4736 C:\Users\Admin\AppData\Local\Temp\F1BDD7~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2740
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2092
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5394daa43c3dfb483738964af17306134
SHA1b99dcd69f0a6e2ba33e23b347d359a351589e055
SHA256ffe70a0cdec40e7185a28d227932f211920e5d44dcbe0ec1d08ef37bd177739b
SHA5125eb5e817e1622fc37880dd01d17fbe8a365943cf29f355c9911595e9b2d80de7100557ed3be8d58e4d7aca51315536d0141bd266f54535d5564116eae7abf9f1
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD514b93d410780bf02eaaad6bba771e01f
SHA1fb730724bbb83e4d89816f1a0fac0b32f8b5bd70
SHA2568a67af27c7eea676677649cce110f277954a1369b9cfde1a00b8c709d6683e3b
SHA512461693da9f3f63cf07adf167d5c05f49a8586822e0674f6f247b1efa13778159b9b1d118d72661379f274dc164b084781f48771bd56c6e75dcf304df058a4100
-
Filesize
70KB
MD51c648329f53fe2ec218105168678ea04
SHA1869992c2b3672d935001493b058e1252bbe89b17
SHA2564b5dd4a189dd3528fe5b63c9543144854b314a18e35fb7294abc6ff7d74a195a
SHA5129bf119625a938549b8945c20571cfb6599f95c4a2cb00cbc893adbc760df86a85a8abea3c207dfa3c28e5c199469b65003b34b336a1e5c8ae21a9f05cf95e4a8
-
C:\Users\Admin\AppData\Local\Temp\f1bdd700d249f1192c2b71ce91d40ba51a1f0dc4a1ac49db653f03ccd3d0a8c3.exe.exe
Filesize169KB
MD599addfd3b91e5c2de78376dc5bbb73d1
SHA105bfadc5a8a1647f957ba5fcfdb2a061991c577a
SHA256b8087b70b6d17f521aaeb17f0e1beb2e8e14608b22b66a8bc7d5ff68b0a2b742
SHA512d530ae97f7bae612d60d31377a396c8a5e8bf78004e82f84b3a3d8274b1f32f435e7f1af7f5297cb1e90c406c08fe76ce8cdef042d11be659d10bfa827dc2ead
-
Filesize
26KB
MD502d060ef4b63918c07d3c0b03d43d04c
SHA179253fc4688248e3cb38bead9930911af880ec87
SHA256a707a0c51bf465916cd5ef711ddf0813f83c782a81e47f3ee2bc04539437a065
SHA5124e5a8f7d7992dfec0cf4866e5e5fae60301321ff27bdd651c8a7f07c8ae340ad278fe3c9d8bdc7478c150e4f61f2211e4adf72641caf677049439494c8a521b9
-
Filesize
9B
MD5593130a35dad97776f4a5d8af38d4ec6
SHA1d3673081d997fe2057dd0e2ce152af5369692767
SHA256479ae218866e5c40d1a0e41c1e380e6c9be107e86bc4e465be1d87f77e5741e5
SHA512083d63f2813ea37e914a8764a32fd2953ed74c25690696007a82f4e55ada3fcaca8c362762fb114b101840c801a522aaac2ba958a8a66e3fb86e08ccaf5e73c3
-
Filesize
161KB
MD509e59d00df5d2effd8dd9b30385cb9d2
SHA10fa0d3f6692f31fdabefb719b0f7a28cbf5d5415
SHA2561c574eab5e83ccfe5a0bb7b59e028cc5fa2f4e77868051e305d83c709711ff77
SHA512d73e3832777341a4176dbd9988002ec94a32f162492e869a8c03d9bb10f1833821f99e15710e9fc103a2820c862cf14a0b990d7c7c09150bb14618a7c93ca5fd