Analysis
-
max time kernel
154s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-02-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe
Resource
win10v2004-20231215-en
General
-
Target
62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe
-
Size
1.7MB
-
MD5
331e5d0e12e687832fef76d1d527088c
-
SHA1
5eafdc333a6920df355e2efa7264aef1a1d9bee2
-
SHA256
62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6
-
SHA512
283f0a4c593a0dc08b596be1695291b409b76417709827e551e16d1f130cb2a8e4824a4548317d520c4fd35be1ba19048e0cafa062a61f3f99ff2de40ec17026
-
SSDEEP
24576:f2FdZ65lIgDvLYNvxnngx1oZagmIjXIU6qOOF4N2RGSvlbstHXKi:f2FdZ6npCxnngx1oZ7zIFqrFG2RF9bA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2600 Logo1_.exe 2516 62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe -
Loads dropped DLL 1 IoCs
pid Process 2692 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\3082\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENFR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe File created C:\Windows\Logo1_.exe 62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2692 1448 62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe 28 PID 1448 wrote to memory of 2692 1448 62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe 28 PID 1448 wrote to memory of 2692 1448 62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe 28 PID 1448 wrote to memory of 2692 1448 62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe 28 PID 1448 wrote to memory of 2600 1448 62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe 30 PID 1448 wrote to memory of 2600 1448 62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe 30 PID 1448 wrote to memory of 2600 1448 62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe 30 PID 1448 wrote to memory of 2600 1448 62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe 30 PID 2600 wrote to memory of 2720 2600 Logo1_.exe 31 PID 2600 wrote to memory of 2720 2600 Logo1_.exe 31 PID 2600 wrote to memory of 2720 2600 Logo1_.exe 31 PID 2600 wrote to memory of 2720 2600 Logo1_.exe 31 PID 2720 wrote to memory of 2896 2720 net.exe 34 PID 2720 wrote to memory of 2896 2720 net.exe 34 PID 2720 wrote to memory of 2896 2720 net.exe 34 PID 2720 wrote to memory of 2896 2720 net.exe 34 PID 2692 wrote to memory of 2516 2692 cmd.exe 33 PID 2692 wrote to memory of 2516 2692 cmd.exe 33 PID 2692 wrote to memory of 2516 2692 cmd.exe 33 PID 2692 wrote to memory of 2516 2692 cmd.exe 33 PID 2600 wrote to memory of 1244 2600 Logo1_.exe 5 PID 2600 wrote to memory of 1244 2600 Logo1_.exe 5
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe"C:\Users\Admin\AppData\Local\Temp\62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a5419.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe"C:\Users\Admin\AppData\Local\Temp\62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe"4⤵
- Executes dropped EXE
PID:2516
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2896
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5568f17750238ab463c745953a303648a
SHA125e9de37d6edb52c584c442e4f93a0448b4b37d4
SHA2565351b82387339c78b116a077f2ba633da2a6fef86a165d92bfe28c2c3770ac81
SHA5129034bc060e8155e07009d2142830f03b29c50525232fa1719038eae4fc742d460c5dad7b7fdd6957264c338072fbe71193a23d994510dc809ae240023b9f1ed3
-
Filesize
474KB
MD582d95ff3c368229d3ecd547bfc2e95e4
SHA105c2c8065f243260792924168f85c614057119e8
SHA2565fd8262ebaf159fa1ba5a2b80dad6f98477d1f549a651fc1a327f0dd207f2fdb
SHA51227815b93d6070f7026c23ceac6210a78e694616d6a6a2012369b271e2d2ec986438f80dd3a29db4c4419b08084cb5a5914af216177669b86d8e2ae7184691699
-
Filesize
722B
MD5f63249f6ad4355c2e23eb6348c5eaaa4
SHA1a5654bb42468f671d1ac796e716ab54910ce9608
SHA2564e011d3d32b8bd37e88e4194a9b49731b02bea72c8fd55325a4cec1487b042b6
SHA51292cf40b48660ca909a3db7c02b5918fa984acff770374a8c4c1183a409feb812901c961d5730e6a56cde4d51ea9739f1220a31c5c22cee673f8c8df7c8aea445
-
C:\Users\Admin\AppData\Local\Temp\62f59c169d8e36a708ec0210c743c01933d190394936511efbf5611de09e86f6.exe.exe
Filesize1.7MB
MD53bfea10ff3748a60378dab655d5276f6
SHA1e61867576c5a69baae14b8e4fbeaaf5db3d451b1
SHA256926c9cce80850e64a2efed8aed9406815c4a54d56a7f5d5125a426956496fc21
SHA51270b44bd2655489a4e13c0c196f8632ab85920268f5378ce03a6080321e0df86ba3383718645c91b544f05eeb2ecf662a14fdaf9ff7f4726c94eea3db608bebfe
-
Filesize
29KB
MD5886eb3bf6157b45d4a041e1e32608c70
SHA1f476a007366ac0349789b0e803ec46be523f457a
SHA256a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b
SHA5126e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca
-
Filesize
9B
MD5b347a774e254ac3f0d6aaea35544ac50
SHA17f332d15a7648f7a698b3068a428811361f4e9ab
SHA2561ebd1b85bb264260df3d9fb0a2062b29199c7b6137dcc98486874c1d257c73cd
SHA512ce8615c90c8794f0aefeb0c6ce5da126732695e6be36b5e625f3a073d55c6f8cd88ca465b07e2c0e87355b5baad887a3f0b26c4eb262484a83d35565e72ba138