Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 20:54
Static task
static1
Behavioral task
behavioral1
Sample
a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe
Resource
win7-20240221-en
General
-
Target
a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe
-
Size
933KB
-
MD5
b8f29f83d698c7c053f61e25ead1ce8d
-
SHA1
7b27c1132ecb426d42058e7e41e6d336c994c2ff
-
SHA256
a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86
-
SHA512
f49150e31ed34f4d1322bd8676574538ec9292b9e2b75484119bf723a73968410e9cc8fea2f92d9ffffef088997bb519c2cfc070145b7168c60a2e86094b77fa
-
SSDEEP
24576:2JN9GENWyYHf2T9TWZxyy2bzuRlqxWYdMD:2X9ZWyEIJWmy2vuRlCeD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 3052 Logo1_.exe 2468 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 2548 Au_.exe 2508 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 2648 cmd.exe 2468 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 2548 Au_.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Au_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe File created C:\Windows\Logo1_.exe a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3052 Logo1_.exe 3052 Logo1_.exe 3052 Logo1_.exe 3052 Logo1_.exe 3052 Logo1_.exe 3052 Logo1_.exe 2468 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 2468 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 2548 Au_.exe 2548 Au_.exe 3052 Logo1_.exe 3052 Logo1_.exe 3052 Logo1_.exe 3052 Logo1_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2548 Au_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2548 Au_.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2648 2208 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 28 PID 2208 wrote to memory of 2648 2208 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 28 PID 2208 wrote to memory of 2648 2208 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 28 PID 2208 wrote to memory of 2648 2208 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 28 PID 2208 wrote to memory of 3052 2208 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 29 PID 2208 wrote to memory of 3052 2208 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 29 PID 2208 wrote to memory of 3052 2208 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 29 PID 2208 wrote to memory of 3052 2208 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 29 PID 3052 wrote to memory of 2564 3052 Logo1_.exe 31 PID 3052 wrote to memory of 2564 3052 Logo1_.exe 31 PID 3052 wrote to memory of 2564 3052 Logo1_.exe 31 PID 3052 wrote to memory of 2564 3052 Logo1_.exe 31 PID 2564 wrote to memory of 2740 2564 net.exe 33 PID 2564 wrote to memory of 2740 2564 net.exe 33 PID 2564 wrote to memory of 2740 2564 net.exe 33 PID 2564 wrote to memory of 2740 2564 net.exe 33 PID 2648 wrote to memory of 2468 2648 cmd.exe 34 PID 2648 wrote to memory of 2468 2648 cmd.exe 34 PID 2648 wrote to memory of 2468 2648 cmd.exe 34 PID 2648 wrote to memory of 2468 2648 cmd.exe 34 PID 2648 wrote to memory of 2468 2648 cmd.exe 34 PID 2648 wrote to memory of 2468 2648 cmd.exe 34 PID 2648 wrote to memory of 2468 2648 cmd.exe 34 PID 2468 wrote to memory of 2548 2468 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 35 PID 2468 wrote to memory of 2548 2468 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 35 PID 2468 wrote to memory of 2548 2468 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 35 PID 2468 wrote to memory of 2548 2468 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 35 PID 2468 wrote to memory of 2548 2468 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 35 PID 2468 wrote to memory of 2548 2468 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 35 PID 2468 wrote to memory of 2548 2468 a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe 35 PID 2548 wrote to memory of 2508 2548 Au_.exe 36 PID 2548 wrote to memory of 2508 2548 Au_.exe 36 PID 2548 wrote to memory of 2508 2548 Au_.exe 36 PID 2548 wrote to memory of 2508 2548 Au_.exe 36 PID 2548 wrote to memory of 2508 2548 Au_.exe 36 PID 2548 wrote to memory of 2508 2548 Au_.exe 36 PID 2548 wrote to memory of 2508 2548 Au_.exe 36 PID 3052 wrote to memory of 1208 3052 Logo1_.exe 7 PID 3052 wrote to memory of 1208 3052 Logo1_.exe 7
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe"C:\Users\Admin\AppData\Local\Temp\a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2923.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe"C:\Users\Admin\AppData\Local\Temp\a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\wps\~f762ba2\Au_.exe"C:\Users\Admin\AppData\Local\Temp\wps\~f762ba2\Au_.exe" /from="cmd.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\wps\~f762ba2\Au_.exe"C:\Users\Admin\AppData\Local\Temp\wps\~f762ba2\Au_.exe" -downpower /from=cmd.exe -msgwndname=uninstallsend_message_F762C6D6⤵
- Executes dropped EXE
PID:2508
-
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2740
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD500e4327e4b6292cf798d7667fcf8eefe
SHA16bd7f7ed03db7fe5cfff4692b5289b7eea868158
SHA2568917644b69dc6f215faa72435d9b96b61c07c41805cb5d76061cc2452de83996
SHA5123de0625da4e68d1dee3c93162909824dac255d96734264c6a9b9119cd8398a146d5f738926a160327c919706a2cff33f3a58f00143b0367f84ffedb53ba41a0e
-
Filesize
471KB
MD5cd063a49bae945a38047d1627588ee01
SHA11608915d38130f68d3398c174f206dc073814e7b
SHA256ae8ed667c2ef87a5a30302264032701269ee5821aa6b33343ceb404257709f38
SHA512c789f3def7d88f776b609be95f98a0876f7b1126586603e77ade5554f8538acd22608484ef9978ee6e2e9214393e4c8d3c48ac22ff7ecae9a8dba9fa7cd7a39b
-
Filesize
722B
MD583f4e1aaab5a7eebd8bbc1900299a930
SHA123aee17b23a49a2808aee4563f396fa7dd52f16d
SHA256c8f4a0a42d323fce032b66d63bf49e671274071452004ca2d24d44551efa41ea
SHA512cf95680bbed814e49adc93def991be78b93f570b174955ae0624bc9926edc210dd8e342f002da1e4958cfd7bdb6849ce384a3f3a5f9ea933079605dd84029933
-
C:\Users\Admin\AppData\Local\Temp\a5dfbb7f1866d2b15adee689cc4bdfcaccdb5f71611903cbf9936a969a528a86.exe.exe
Filesize906KB
MD5d7b8ea84af8f998b7f344889d2e112d9
SHA199b7c68d38ccc7a8c6cee171679100d316bbfcc0
SHA256d2df31a05e5c1e1b9869270157eac5f475998d17defb961072d9e1dca5cdd70c
SHA512bf479b26f7752159508090643e38ba99a9f506b59485e961f00befa4dced1cf59b4a00dddf89448caddb30e044258f68ee0253f1cc56b406de99ccd7c25f53b9
-
Filesize
161B
MD50820124c60e4f985ccf7798177b8ab12
SHA1bf9c3dca7e71d60381146e1f71aea41f93e165df
SHA256daf958fe8a43090d39d07c9d31a0c5c5223cc340e54a1205046524af2703353f
SHA51222caeeb292197fc94d80f49c5251cc6db2ced8569905a5a5b03dc30ed8c158fbb4aecd340daf896e9c043255d658a9b0b1aef6f56ef3150275c4a7dbb740fb28
-
Filesize
26KB
MD53030179dc0c4ffbe720135ca0fd6a872
SHA1dffac6c5ec0d5dc259018febe37645089a808d34
SHA256f041faf839a587f7ca878c16c03e4ff64d6158e30548196c53cfbc2ad076515b
SHA512b2017915ff651a5e23a2946cbfa50931725df05a2f6953d7f876cb58619c4be933464c905c0c4c83e1981973181f95d085b2e4ab77c271dab577d71829c4a1e8
-
Filesize
9B
MD520579de1c6702ea14f25df921a00274b
SHA1fc7299007b5fb0580c7a3ef6ae0efd8aaf80a35f
SHA2563eb24c26a19e67d7f499ccb30f78fc29bee126bafd13f41470223c1b8f2e1e4e
SHA512e9a21ede4321b86e5d215d41321741f8db22b9eb92c1325026182c688311d5134041102a194d670abcbd182d2c91d5180ac9b7c9daaf9e41109a3b3d8e3c3d81