Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe
Resource
win10v2004-20231215-en
General
-
Target
074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe
-
Size
372KB
-
MD5
9dcbff8c3f9b51c9f3574155ac4a5c9f
-
SHA1
7ed7c34faef20b3fccd9eec7e8f7aaa80484cd95
-
SHA256
074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875
-
SHA512
87eefdf48b2fce37039b8f2c69749bf7178387423661b7a3ed996c877f5e44afb94b6e17f03c36def98acbb6415042451d3892427afaf39847b979daf6032fb3
-
SSDEEP
6144:qVfjmNd0RsrJ3n0dK2NP0RHx8D98WTBPW8fF8oABm1n4:k7+iqwKhHSDeWTRW8fdeN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2652 Logo1_.exe 2568 074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe -
Loads dropped DLL 1 IoCs
pid Process 2744 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\setup_wm.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.fr\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2744 2796 074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe 28 PID 2796 wrote to memory of 2744 2796 074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe 28 PID 2796 wrote to memory of 2744 2796 074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe 28 PID 2796 wrote to memory of 2744 2796 074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe 28 PID 2796 wrote to memory of 2652 2796 074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe 29 PID 2796 wrote to memory of 2652 2796 074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe 29 PID 2796 wrote to memory of 2652 2796 074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe 29 PID 2796 wrote to memory of 2652 2796 074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe 29 PID 2652 wrote to memory of 2748 2652 Logo1_.exe 30 PID 2652 wrote to memory of 2748 2652 Logo1_.exe 30 PID 2652 wrote to memory of 2748 2652 Logo1_.exe 30 PID 2652 wrote to memory of 2748 2652 Logo1_.exe 30 PID 2748 wrote to memory of 2824 2748 net.exe 33 PID 2748 wrote to memory of 2824 2748 net.exe 33 PID 2748 wrote to memory of 2824 2748 net.exe 33 PID 2748 wrote to memory of 2824 2748 net.exe 33 PID 2744 wrote to memory of 2568 2744 cmd.exe 34 PID 2744 wrote to memory of 2568 2744 cmd.exe 34 PID 2744 wrote to memory of 2568 2744 cmd.exe 34 PID 2744 wrote to memory of 2568 2744 cmd.exe 34 PID 2652 wrote to memory of 1208 2652 Logo1_.exe 18 PID 2652 wrote to memory of 1208 2652 Logo1_.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe"C:\Users\Admin\AppData\Local\Temp\074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a3C84.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe"C:\Users\Admin\AppData\Local\Temp\074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe"3⤵
- Executes dropped EXE
PID:2568
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2824
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD50ada2e8f605902c0ff9141520bc6e269
SHA1e43e62623d7b78f61d0c342885a0902a4a593bb9
SHA2563d7375b548f489444052e6418e7b3fde324bab5dc79fd30d222e9a9f82b9494e
SHA512993ab2a9a97647af10fb18331ddb384bfad348529a64a158997f50615651503c0fedef1eda0d1391823cdc8298b59bc2315522b5b5a9585c13f7575faff1cbb4
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD516b03f0d6c922e33d66c99d6e055ce72
SHA1ea144ccd95d77bbaecf5935b0eab5206f5c0642f
SHA25603d499768bba715f08a770755e1e43e224f1808131bd1d4663d40e5e3ae0b0e8
SHA512512c5366181819307b422aca04541fb3ff82e2c265a31b0605defa672a5966a8852cb0bef00bd1164cd7d6aafe69f03d66aafda32e40056e36bf2f2eaade8567
-
C:\Users\Admin\AppData\Local\Temp\074253c33e57cb3086983887bb54c2f4f5c4ebd309190bf79ad8d725c4e97875.exe.exe
Filesize346KB
MD5547a30a385d1290a5804692cb3921b59
SHA165028edd148b88e416f082a37af09667da5d35f9
SHA256e4b75d4425ec1daee0f66d7e00e5048711ae5822c9ddc79f010b1318d891f883
SHA5125ed7ef50124ed6f3d2f73558e63a67025a697a73205f7e2d47950fd50055b48303ee5c527b9757c3e94270235e6ad0e235897d5091c82a0d619e0dd4602e647e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
26KB
MD526e7aa29b754dcf032ac36b49861da15
SHA170212d4aff48f4ce1ef5bd3156d20833da0fdb56
SHA256c49ad2fee17a775033e64463983d8a43f8427a4cf84287d41977abbbe74cc6d1
SHA5128d0c10435edebb2255a4eae6274a2ba31dae8ad74259dcc14344191bc28fcb1e02b88e5a921134084dbe47524b23b483e178cd5fee1aedd1c98724922b4818c7
-
Filesize
9B
MD534e12dba53534facb8e8064d1af8f928
SHA1e293a1d8b60a1ffb79b860fd1f021c1bf2ce843e
SHA2567762ae19d24ac82e1f587069111f6ec91e9f42a3b748599e68d91efb0a1b3975
SHA5120828b8c16e680123cfc73ac0f1ea552bcc0cdc7ce14332e37345b29136ac12cd712e1c13295a5feaf0ebdd8f2461fe64db6f994c3cda82e40aa6ec3f4da41331