Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe
Resource
win10v2004-20240226-en
General
-
Target
e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe
-
Size
320KB
-
MD5
b3d8afa6bfbfcb2ef7657d373ecbf490
-
SHA1
1e5305f44c6804b169dfa9d9d33716881b626ba7
-
SHA256
e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95
-
SHA512
854429dbb002973a2f0bb20e8c2149e307bc7f99d0221c5f32e906e6e0aecb69de6062faf601184082d212150f305d068e76b7400046f40afd8574618b735063
-
SSDEEP
6144:oVfjmNIHVvkWjO7wZnNl0nKI/6Kuolo94ifg3h6qKmAOQx2RFwc4pQx+CVr:S7+I1vkZ7agDlM4ifgrGx2fwIx+CVr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2984 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2512 Logo1_.exe 2540 e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe -
Loads dropped DLL 1 IoCs
pid Process 2984 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1031\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Slate\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Components\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Lime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\{1FD4E3A4-6FE0-492C-90E9-7EE360CDB9FF}\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe File created C:\Windows\Logo1_.exe e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2984 2272 e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe 28 PID 2272 wrote to memory of 2984 2272 e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe 28 PID 2272 wrote to memory of 2984 2272 e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe 28 PID 2272 wrote to memory of 2984 2272 e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe 28 PID 2272 wrote to memory of 2512 2272 e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe 29 PID 2272 wrote to memory of 2512 2272 e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe 29 PID 2272 wrote to memory of 2512 2272 e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe 29 PID 2272 wrote to memory of 2512 2272 e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe 29 PID 2512 wrote to memory of 2676 2512 Logo1_.exe 31 PID 2512 wrote to memory of 2676 2512 Logo1_.exe 31 PID 2512 wrote to memory of 2676 2512 Logo1_.exe 31 PID 2512 wrote to memory of 2676 2512 Logo1_.exe 31 PID 2984 wrote to memory of 2540 2984 cmd.exe 33 PID 2984 wrote to memory of 2540 2984 cmd.exe 33 PID 2984 wrote to memory of 2540 2984 cmd.exe 33 PID 2984 wrote to memory of 2540 2984 cmd.exe 33 PID 2984 wrote to memory of 2540 2984 cmd.exe 33 PID 2984 wrote to memory of 2540 2984 cmd.exe 33 PID 2984 wrote to memory of 2540 2984 cmd.exe 33 PID 2676 wrote to memory of 2752 2676 net.exe 34 PID 2676 wrote to memory of 2752 2676 net.exe 34 PID 2676 wrote to memory of 2752 2676 net.exe 34 PID 2676 wrote to memory of 2752 2676 net.exe 34 PID 2512 wrote to memory of 1200 2512 Logo1_.exe 21 PID 2512 wrote to memory of 1200 2512 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe"C:\Users\Admin\AppData\Local\Temp\e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aA4D.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe"C:\Users\Admin\AppData\Local\Temp\e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe"4⤵
- Executes dropped EXE
PID:2540
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2752
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
721B
MD5fbd9787302947d97d0d734d2851ca381
SHA177760a1e042930723dd40c15f51a7213e65bb417
SHA2567cb6a4f210fd68f5784493036239e68618eb967cff5a5f1d5983471d1d672600
SHA51288923871171a8455315c30345522c33b50ca58af11a553123e3560320a7690798f863601a635c59c14b467761c3f4511197e7ab1b1b0384a78b12227458101dc
-
C:\Users\Admin\AppData\Local\Temp\e84ea70a4a79dbe2c2c73b069f32400fa1525b9cc42fa8ea88660a63ccdd4c95.exe.exe
Filesize294KB
MD5ce6ff323f554a5cd6aaddc484b35abe7
SHA13e26bf040667c6bd4d780f3e181ecff1b3fae9d7
SHA2560b89e924ec3b3bcaa12f5ad82637c746d65ea777ea1b9afeb4ee6c323ce8dc0a
SHA512077d348d2590bd3de342a1d88f134582f523081b654e8e021e3722fa336491d292ee2f60a9992044278587c86e6952d8efd4cfea647671f1e12b39a0b98b865f
-
Filesize
26KB
MD5c7ffd981bc53b2075f7445015981536c
SHA10e965be2dd06aeb36b26ed0baa7cd6448c8269be
SHA256d3c94948c0eff6cf06ed5cab8061b768be9b0c2e962c76763ba8823d60b939db
SHA512566ea8c6b45293e39a99390ee00c352176440ef8c01ea4208d7298df88a819e017542dbdff458e8371a87a55e5a9160fe2dd747dd4978f633d03d12351a680b2
-
Filesize
8B
MD5658d36413fa4de67d2edb254a0383bbf
SHA1bd660e7319a5040c3af6edca0911a4ab4bdc33df
SHA2560118c20e2d539544ae8e73767b080d41f4ff57be18407222143ebea26d6affa2
SHA512f368a5a7d963fec63b9d599a1da34ae9eea37261f8c4d267d73624f5a36a0402f1f780317e094b240de3980a0a144929ea2076a23b134267cb0209b3172e1b7b