Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-01-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe
Resource
win10v2004-20231222-en
General
-
Target
fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe
-
Size
2.6MB
-
MD5
8b37dc8f3721f16ea530ebc711de945a
-
SHA1
3d47c97027014f7977d0839f448ba9d4bc2a1e24
-
SHA256
fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c
-
SHA512
a4ec5dcad0cbb7aa0883ee864b5dcf5472eba47208a551775db4a3d4e270d6b8afd0de3c44590c260b2b52ef667e5515eb737c1b9dac9c93bfd8c864f74eea3b
-
SSDEEP
49152:P/UmZmV7AEf88T1mn3b5GkxS9IaZ83TqUzbvgLow/KwyzGW4FIwxAvf/x/aPDTDH:0mYvf14/xQ83TiLQ5S09kh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2988 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2840 Logo1_.exe 2932 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe -
Loads dropped DLL 1 IoCs
pid Process 2988 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\3082\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File created C:\Program Files\DVD Maker\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe File created C:\Windows\Logo1_.exe fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe 2840 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2988 1700 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 29 PID 1700 wrote to memory of 2988 1700 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 29 PID 1700 wrote to memory of 2988 1700 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 29 PID 1700 wrote to memory of 2988 1700 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 29 PID 1700 wrote to memory of 2840 1700 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 28 PID 1700 wrote to memory of 2840 1700 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 28 PID 1700 wrote to memory of 2840 1700 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 28 PID 1700 wrote to memory of 2840 1700 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 28 PID 2840 wrote to memory of 2172 2840 Logo1_.exe 30 PID 2840 wrote to memory of 2172 2840 Logo1_.exe 30 PID 2840 wrote to memory of 2172 2840 Logo1_.exe 30 PID 2840 wrote to memory of 2172 2840 Logo1_.exe 30 PID 2172 wrote to memory of 2716 2172 net.exe 34 PID 2172 wrote to memory of 2716 2172 net.exe 34 PID 2172 wrote to memory of 2716 2172 net.exe 34 PID 2172 wrote to memory of 2716 2172 net.exe 34 PID 2988 wrote to memory of 2932 2988 cmd.exe 33 PID 2988 wrote to memory of 2932 2988 cmd.exe 33 PID 2988 wrote to memory of 2932 2988 cmd.exe 33 PID 2988 wrote to memory of 2932 2988 cmd.exe 33 PID 2988 wrote to memory of 2932 2988 cmd.exe 33 PID 2988 wrote to memory of 2932 2988 cmd.exe 33 PID 2988 wrote to memory of 2932 2988 cmd.exe 33 PID 2840 wrote to memory of 1348 2840 Logo1_.exe 6 PID 2840 wrote to memory of 1348 2840 Logo1_.exe 6
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe"C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2716
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a8353.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe"C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe"4⤵
- Executes dropped EXE
PID:2932
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5770e80db366145f997b81f8040496869
SHA14d924c50b0c714b97047df34a0bd4adaf2de6a83
SHA256dccf1246394aab3657a9ebd19ebd4150b9420f438bd50e40aafbc8ac8d51ebdb
SHA512754b5ee9fdcc4614ad626ece4d684fdc2f4b20d5c20042dba268f4c7b1c913b2b707ac1903bfb85a79598975e4b6ab4eb508660a242cb9feb2196d6368a6ff8d
-
Filesize
471KB
MD51a0dbecba0dbb963c2f3b0448796d47a
SHA15c0b5d378d3614fe984ce2915b5720886992da0c
SHA2561ea2fb84177a921bc3df4763c3da53a970e192f93f6175d09696ded019e50cf8
SHA5128e25dc08fa6f280a6bc1ccacb1ce665ab055b5d539f8915915fc7536c90185a221cb0c50a02d34b521b871b8487a155b9c40a5f25df87306e1df24ca7e96da25
-
Filesize
722B
MD50fa3b797134a9ea7aed086b91be80e60
SHA19a6b3ecf72255fcd80c1ceba50bc739098ddd0d2
SHA25637d41faf1235a50ad188c5f16b1b83ee5f518358efb8db379a7cc1a861a04d22
SHA512c58db3840dcecee1a5182436023b669cf9b2d38425df6bcfe34b888aee6ce147b64829c2f361dc48920e786bbd03d1710172f31e4d3f9f6a9c8f0b673c094219
-
C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe.exe
Filesize2.6MB
MD54a358dcc5f694c5b6ef1c864340e2b36
SHA1a3953dbb397a1f8f6eabc74d6bc7e3c02b05c2ba
SHA256856c881883dce3d2bb16eb63d29c5d73a648d9bc7981b4224d550d50bc2526a9
SHA512947c1b9570a8d3ff846a275226b883ad3766b25cc11afbe7d338e5c04089c814d2711f292ab8d1e373e50e2b583489695c9b89479fb5379220438d9efcc92620
-
Filesize
26KB
MD58758044db9fce67ea2ad542f86e69e57
SHA160cc4d25ea4e17f676e8ac8be10b9dfe2f7ed67d
SHA2560c91b552dc6db19b6711e32cb8c9c604b60dc9d674be06cccb6adf08b4dbd82d
SHA512411737be53feaef0829190b6610c729b925949bcc0b4a65063ab393acb1a92c577093e6377a373704ce54d27a593f2faddc23c80c660638f7c304a93f1972c93
-
Filesize
9B
MD5593130a35dad97776f4a5d8af38d4ec6
SHA1d3673081d997fe2057dd0e2ce152af5369692767
SHA256479ae218866e5c40d1a0e41c1e380e6c9be107e86bc4e465be1d87f77e5741e5
SHA512083d63f2813ea37e914a8764a32fd2953ed74c25690696007a82f4e55ada3fcaca8c362762fb114b101840c801a522aaac2ba958a8a66e3fb86e08ccaf5e73c3