Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe
Resource
win10v2004-20231215-en
General
-
Target
5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe
-
Size
450KB
-
MD5
fd7790c072676ac6a9414b3a7ebe6085
-
SHA1
0993b3e2e5d1cf8821d7b67794c84349ff0b9049
-
SHA256
5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf
-
SHA512
dfb1718b700e59e5f1b038329befb63f0a521da92a9e7bea45f4446b17813a12f57ebf41ac0379ce7e1d7a4b447fb031675ce5007ac5b80e84cf41ab7b0f22cd
-
SSDEEP
6144:qVfjmNgUTxxIXB0iS0GaYApLhTrKUfdOtvHtKrr4Kdyj7XKUTa8m23d7KJqKWMJN:k7+gUtNL8YcL5YHaI7XHgZQKhJgeCmdN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3060 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2012 Logo1_.exe 2620 5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe -
Loads dropped DLL 1 IoCs
pid Process 3060 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Lime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe File created C:\Windows\Logo1_.exe 5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2012 Logo1_.exe 2012 Logo1_.exe 2012 Logo1_.exe 2012 Logo1_.exe 2012 Logo1_.exe 2012 Logo1_.exe 2012 Logo1_.exe 2012 Logo1_.exe 2012 Logo1_.exe 2012 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 880 wrote to memory of 3060 880 5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe 28 PID 880 wrote to memory of 3060 880 5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe 28 PID 880 wrote to memory of 3060 880 5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe 28 PID 880 wrote to memory of 3060 880 5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe 28 PID 880 wrote to memory of 2012 880 5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe 29 PID 880 wrote to memory of 2012 880 5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe 29 PID 880 wrote to memory of 2012 880 5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe 29 PID 880 wrote to memory of 2012 880 5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe 29 PID 2012 wrote to memory of 2624 2012 Logo1_.exe 31 PID 2012 wrote to memory of 2624 2012 Logo1_.exe 31 PID 2012 wrote to memory of 2624 2012 Logo1_.exe 31 PID 2012 wrote to memory of 2624 2012 Logo1_.exe 31 PID 3060 wrote to memory of 2620 3060 cmd.exe 34 PID 3060 wrote to memory of 2620 3060 cmd.exe 34 PID 3060 wrote to memory of 2620 3060 cmd.exe 34 PID 3060 wrote to memory of 2620 3060 cmd.exe 34 PID 2624 wrote to memory of 2684 2624 net.exe 33 PID 2624 wrote to memory of 2684 2624 net.exe 33 PID 2624 wrote to memory of 2684 2624 net.exe 33 PID 2624 wrote to memory of 2684 2624 net.exe 33 PID 2012 wrote to memory of 1380 2012 Logo1_.exe 6 PID 2012 wrote to memory of 1380 2012 Logo1_.exe 6
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe"C:\Users\Admin\AppData\Local\Temp\5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a143C.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe"C:\Users\Admin\AppData\Local\Temp\5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe"4⤵
- Executes dropped EXE
PID:2620
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2684
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD50ada2e8f605902c0ff9141520bc6e269
SHA1e43e62623d7b78f61d0c342885a0902a4a593bb9
SHA2563d7375b548f489444052e6418e7b3fde324bab5dc79fd30d222e9a9f82b9494e
SHA512993ab2a9a97647af10fb18331ddb384bfad348529a64a158997f50615651503c0fedef1eda0d1391823cdc8298b59bc2315522b5b5a9585c13f7575faff1cbb4
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5de11c01a57c8cb79f145e90cd48e70c9
SHA1033b36673c50a75ef876de1f0e52e39ec74fdfa7
SHA2561359d2912ef3018c9fc4cc372c5d1ca464c9cc6aecbb1c60e5e9b9f8058f615c
SHA5123abc4a6e65e414925a4a3ca573cba13f08c623c41c81979ab13543498f8199020b86a7e0356e655859e790a1e936a0a7d7ab373fa021c3fc04d4c813f4381771
-
C:\Users\Admin\AppData\Local\Temp\5c6fd9f0bfa4de2253356369c5ef4a3a55f56bb3256e3b40601ecb6198de09bf.exe.exe
Filesize424KB
MD529e177c7bb7343f365f12ad9a8af4c48
SHA1116569c0e97853f01a2bd1c2c8b5a9c0c8e1c6b3
SHA256197fc8bbd50333cde901ca625937407b6c11a393d019dfe56fcee17719f1053c
SHA512635777358e113ca2abcd2a301d50cb8dacfd48d1055dee6060fe2b38b3106e172ce828169385762936a23782ee6d5e6b10b607183576de4dbea1e3c20ec802f3
-
Filesize
26KB
MD526e7aa29b754dcf032ac36b49861da15
SHA170212d4aff48f4ce1ef5bd3156d20833da0fdb56
SHA256c49ad2fee17a775033e64463983d8a43f8427a4cf84287d41977abbbe74cc6d1
SHA5128d0c10435edebb2255a4eae6274a2ba31dae8ad74259dcc14344191bc28fcb1e02b88e5a921134084dbe47524b23b483e178cd5fee1aedd1c98724922b4818c7
-
Filesize
9B
MD534e12dba53534facb8e8064d1af8f928
SHA1e293a1d8b60a1ffb79b860fd1f021c1bf2ce843e
SHA2567762ae19d24ac82e1f587069111f6ec91e9f42a3b748599e68d91efb0a1b3975
SHA5120828b8c16e680123cfc73ac0f1ea552bcc0cdc7ce14332e37345b29136ac12cd712e1c13295a5feaf0ebdd8f2461fe64db6f994c3cda82e40aa6ec3f4da41331