Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-02-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe
Resource
win10v2004-20240221-en
General
-
Target
a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe
-
Size
2.2MB
-
MD5
e7f27916866dc3c5c20b9d6b017b5eaa
-
SHA1
7fd790606ae7f519f45022e63ec647784f052c15
-
SHA256
a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4
-
SHA512
dbbbe3731e93bd86881fa11aff6e6daf8a85a9f308b7ac26ed40ce6a22fe7ac0dfce2d898d55639f9a291913cf65f2d832115ce1c27adfe450124bc7da8e7983
-
SSDEEP
49152:ODOh6fnFr1YGJ6HD/6RYfCzKzi1bgeCiD13EtMJNXV:yOfjSRYf1iB3P/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2940 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2080 Logo1_.exe 2748 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe -
Loads dropped DLL 1 IoCs
pid Process 2940 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FRAR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe File created C:\Windows\Logo1_.exe a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2940 2868 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 28 PID 2868 wrote to memory of 2940 2868 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 28 PID 2868 wrote to memory of 2940 2868 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 28 PID 2868 wrote to memory of 2940 2868 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 28 PID 2868 wrote to memory of 2080 2868 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 29 PID 2868 wrote to memory of 2080 2868 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 29 PID 2868 wrote to memory of 2080 2868 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 29 PID 2868 wrote to memory of 2080 2868 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 29 PID 2080 wrote to memory of 2584 2080 Logo1_.exe 32 PID 2080 wrote to memory of 2584 2080 Logo1_.exe 32 PID 2080 wrote to memory of 2584 2080 Logo1_.exe 32 PID 2080 wrote to memory of 2584 2080 Logo1_.exe 32 PID 2584 wrote to memory of 2820 2584 net.exe 33 PID 2584 wrote to memory of 2820 2584 net.exe 33 PID 2584 wrote to memory of 2820 2584 net.exe 33 PID 2584 wrote to memory of 2820 2584 net.exe 33 PID 2940 wrote to memory of 2748 2940 cmd.exe 34 PID 2940 wrote to memory of 2748 2940 cmd.exe 34 PID 2940 wrote to memory of 2748 2940 cmd.exe 34 PID 2940 wrote to memory of 2748 2940 cmd.exe 34 PID 2080 wrote to memory of 1204 2080 Logo1_.exe 12 PID 2080 wrote to memory of 1204 2080 Logo1_.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe"C:\Users\Admin\AppData\Local\Temp\a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1813.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe"C:\Users\Admin\AppData\Local\Temp\a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe"4⤵
- Executes dropped EXE
PID:2748
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2820
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5cdae1f54012ef122e2fa90c68b018ad7
SHA1b3c20e121d5e6edb3e2aecc47d09d6c31a23c011
SHA25615de13a231ffb9945fa3e860a3112923dffdef0b224de9f54bd18d272a0a71a5
SHA5120d48e83cb31c9bc299ee0e8338aefe1aa4a040dc431136b74cd3608ff5aca1b2f58b83e50c6f8c6a5684e9da5e31a4e846854aa3a4c95446f46bd349a67a9192
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD579f16615d755cfd8ec943adfa4964724
SHA1c53d0a61c7435018d35fc2a7f1bf50a4ffcff802
SHA2568a827ef8f5aa2ada4ad3fb1a5592744378ef8ac8b5253b46acd3ae7734a5247e
SHA512b0a6f36cea633b06fedc212e63c85f2f1380af536cdf0fa39a63cdb04c461b859239d1b9f046635896b174173e4619a19fbfe0e20024878670d3e034c778c015
-
C:\Users\Admin\AppData\Local\Temp\a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe.exe
Filesize2.1MB
MD575e4e1db589ba3e9144e1a79d6dbb344
SHA197e7cdbbb049ebf7aedab67303d994715edf5b52
SHA256abf73d033eed3f166df49c9a32255d2ad261a40df432b2338e39c417e0050f14
SHA512c569357ef2943d2d107c261e89c46ed01a0e0e65141c153f60d177e981eb4e3c3533007e169b7826d14f0c961dfe0cf3923398a4d26a3dbb2e714eb51d10c7dc
-
Filesize
27KB
MD5f691a97a588c19faf9f6dda6390c094e
SHA15d5e3c33dde450fb7b1168b8eb4705c76bbae34f
SHA25606e90c757f7dbbae2d605e715181af918a8bb56afa1caaa0a83a41fae0ffa9f9
SHA512f89651464d3e685fd5f8b9b07d3b6feab8979c28ec84e480580b868cfab184401be1367060150525fa9d9260e88cac93a0e36f0b4046040b81d765ba93c1b460
-
Filesize
9B
MD5d69146fa3f15be895e219a620fdd153b
SHA1fa21485227046ccf2d7638b4236f749862dd4b64
SHA256406651396485eef0c407fc8241aeaa805a311294cdf7abb18ca20e8540694652
SHA512b0509216c0bd6ad432374c98f3fc2f2919d9353e4bccf510b20e0cbbf8a0fdf77ccdeff786df0305f83f22865794cc675537e51de5a1478fc8431999566701c0