Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe
Resource
win10v2004-20240226-en
General
-
Target
bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe
-
Size
280KB
-
MD5
64c953c92703fc28866ecd9de1a00fe5
-
SHA1
25fcff0b3961e8af1dcdf7ad9dc2cd4429570027
-
SHA256
bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc
-
SHA512
c114295d238d9848d41e6e338758bb36382569bd84a66000d9e4978b7e650ab8500d5997d27bc200de0cd401e7397fa8ea0c94e93d67a034142433aaeb4d9a7d
-
SSDEEP
6144:YVfjmN3hfgI3FStrsHkaMaVXu8Mz4xYdr1e2MHVuYLt8yf/Y7OOby:C7+9gI1CsEaMt9A2MHVuYR8yf/YBby
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1396 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2588 Logo1_.exe 2400 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe -
Loads dropped DLL 1 IoCs
pid Process 1396 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FRAR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Components\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe File created C:\Windows\Logo1_.exe bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2588 Logo1_.exe 2588 Logo1_.exe 2588 Logo1_.exe 2588 Logo1_.exe 2588 Logo1_.exe 2588 Logo1_.exe 2588 Logo1_.exe 2588 Logo1_.exe 2588 Logo1_.exe 2588 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1396 1908 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 28 PID 1908 wrote to memory of 1396 1908 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 28 PID 1908 wrote to memory of 1396 1908 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 28 PID 1908 wrote to memory of 1396 1908 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 28 PID 1908 wrote to memory of 2588 1908 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 29 PID 1908 wrote to memory of 2588 1908 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 29 PID 1908 wrote to memory of 2588 1908 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 29 PID 1908 wrote to memory of 2588 1908 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 29 PID 2588 wrote to memory of 2536 2588 Logo1_.exe 30 PID 2588 wrote to memory of 2536 2588 Logo1_.exe 30 PID 2588 wrote to memory of 2536 2588 Logo1_.exe 30 PID 2588 wrote to memory of 2536 2588 Logo1_.exe 30 PID 2536 wrote to memory of 2116 2536 net.exe 33 PID 2536 wrote to memory of 2116 2536 net.exe 33 PID 2536 wrote to memory of 2116 2536 net.exe 33 PID 2536 wrote to memory of 2116 2536 net.exe 33 PID 1396 wrote to memory of 2400 1396 cmd.exe 34 PID 1396 wrote to memory of 2400 1396 cmd.exe 34 PID 1396 wrote to memory of 2400 1396 cmd.exe 34 PID 1396 wrote to memory of 2400 1396 cmd.exe 34 PID 2588 wrote to memory of 1192 2588 Logo1_.exe 10 PID 2588 wrote to memory of 1192 2588 Logo1_.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe"C:\Users\Admin\AppData\Local\Temp\bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a9B36.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe"C:\Users\Admin\AppData\Local\Temp\bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe"4⤵
- Executes dropped EXE
PID:2400
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2116
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD558583137fb33e7f5ec8519fb3db70ec1
SHA11c182f74080ceaa988f20d4bc85c73f3905b0ac6
SHA2561c76ee7ab780061c7f4541e04964fccb0fcbd3cbb84d30040c4e3a454b5bef29
SHA512a9e73808c47bf7118fbcb7389554d74c12ce8bf94c49973105ad8cb967c8096b4fc0cf6acd79cc9c9bc37a2137971cf3196e18a5eb6f5fd8e7255b537653a6e2
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5582bc0703ec1bed61d99019a69281e85
SHA117c7a9d5a61b0bbec86ba9825bb7752fda95aa09
SHA2566c9eee203738e2880cf92b5478f6134c02c1c685df198bd72da888ebd84c45b4
SHA5123b47fabaeb09f08fe107b6fa28fdbd53831cfd0614de75e2dab67bd88879b30efcb7deb7f39b3a6adcb89238c4f4273394af885abb67ea4eedad003939592e20
-
C:\Users\Admin\AppData\Local\Temp\bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe.exe
Filesize254KB
MD5ce786255b793d4ebac5a747eeb5a533c
SHA13b1fc92b85c299a294caae8e03233e1ff8b02182
SHA2560b45fa2a1937577f8f7ec7a3ce5b551b24f8667a2acc931ef8a9ab2431e4fde2
SHA5122e1fc219178d3d10688e52f0b7ffb85c8692812c6a71ce7a4dc40d85c2b0cb6ac43486b55be773e422e904e0061e23050aadf22545773e86fd14ff14cb3fe9e2
-
Filesize
26KB
MD5b26fe27da346b21618f04de09f49dee0
SHA1184aad805734f70443da1069a04d904612374c31
SHA25697a053f33da11c280120eadc555c6c55f73ea83392b6bf0b1c853cfd104cd26a
SHA512d4130806c36d8043016d59ad0ae3d29dacd2830772ca067e776dfaf046a00f767c998e60119aab6360a677d9a1aa50498a57a0f0a23b135abbafbe1c6165bf3e
-
Filesize
9B
MD53ad36c5dd75f198f45a8fb7f0de29a8d
SHA1e07726e5226c9504d995d8bc85b4e3820ed76db6
SHA256f45cd1a6b8de9f9bd4d34cde93bd7221a0e7be28281690e646faac9a77cd77b7
SHA5128a285b5a07fe1749dcb89935e8200119c9bc3458685c2799fe743a5779655ce5c51ee303626d5afa7ec5fe504c9e93628c6782265cd6d1c0f2c631116c2e0f42