Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe
Resource
win10v2004-20240226-en
General
-
Target
76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe
-
Size
542KB
-
MD5
02b17ad28e07b9196d099e37c9939f77
-
SHA1
14a5622bc30a2e14d4b2cf2a99df90bf66177b64
-
SHA256
76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7
-
SHA512
d2200a00d5328095eed81242b2e1c8e2434e7d300890d7d5850ec12955f8ce20c0e795728353253332ce274f52a887e849944c548275698d64c2cfa1e2788e26
-
SSDEEP
6144:59TuJ/HvEm10k9mqI9PZJroJIxXY720DRaOOcnR2m9Xlqkuxl:fa50k9mnRT0JIxQ4Obkxl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2348 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2560 Logo1_.exe 2612 76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe -
Loads dropped DLL 1 IoCs
pid Process 2348 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\or\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe File created C:\Windows\Logo1_.exe 76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2348 2388 76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe 28 PID 2388 wrote to memory of 2348 2388 76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe 28 PID 2388 wrote to memory of 2348 2388 76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe 28 PID 2388 wrote to memory of 2348 2388 76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe 28 PID 2388 wrote to memory of 2560 2388 76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe 30 PID 2388 wrote to memory of 2560 2388 76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe 30 PID 2388 wrote to memory of 2560 2388 76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe 30 PID 2388 wrote to memory of 2560 2388 76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe 30 PID 2560 wrote to memory of 2752 2560 Logo1_.exe 31 PID 2560 wrote to memory of 2752 2560 Logo1_.exe 31 PID 2560 wrote to memory of 2752 2560 Logo1_.exe 31 PID 2560 wrote to memory of 2752 2560 Logo1_.exe 31 PID 2752 wrote to memory of 2584 2752 net.exe 33 PID 2752 wrote to memory of 2584 2752 net.exe 33 PID 2752 wrote to memory of 2584 2752 net.exe 33 PID 2752 wrote to memory of 2584 2752 net.exe 33 PID 2348 wrote to memory of 2612 2348 cmd.exe 34 PID 2348 wrote to memory of 2612 2348 cmd.exe 34 PID 2348 wrote to memory of 2612 2348 cmd.exe 34 PID 2348 wrote to memory of 2612 2348 cmd.exe 34 PID 2560 wrote to memory of 1136 2560 Logo1_.exe 20 PID 2560 wrote to memory of 1136 2560 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe"C:\Users\Admin\AppData\Local\Temp\76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1803.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe"C:\Users\Admin\AppData\Local\Temp\76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe"4⤵
- Executes dropped EXE
PID:2612
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2584
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5568f17750238ab463c745953a303648a
SHA125e9de37d6edb52c584c442e4f93a0448b4b37d4
SHA2565351b82387339c78b116a077f2ba633da2a6fef86a165d92bfe28c2c3770ac81
SHA5129034bc060e8155e07009d2142830f03b29c50525232fa1719038eae4fc742d460c5dad7b7fdd6957264c338072fbe71193a23d994510dc809ae240023b9f1ed3
-
Filesize
474KB
MD582d95ff3c368229d3ecd547bfc2e95e4
SHA105c2c8065f243260792924168f85c614057119e8
SHA2565fd8262ebaf159fa1ba5a2b80dad6f98477d1f549a651fc1a327f0dd207f2fdb
SHA51227815b93d6070f7026c23ceac6210a78e694616d6a6a2012369b271e2d2ec986438f80dd3a29db4c4419b08084cb5a5914af216177669b86d8e2ae7184691699
-
Filesize
722B
MD5d850a2e801e2d9db26efc02e91a2c32f
SHA1a237495ced80a2c37f16c9c94d0e5149bdd7ffeb
SHA256489230f56b9cd41e82a7acd41ff7fbe8d9f22e2751480cc080e1b1897bb389e3
SHA51291622294f4031e4b86a2f0e53f9b33afd69d79b627105c30b665287d67377a6dba11345f80804daf217f1c6713eda6c0b6b1d6ae0dbac5e054c1a20e676d900b
-
C:\Users\Admin\AppData\Local\Temp\76a2757ec36abb133a6018797885ddfa5c28c3dd8551f1821e3c4b0f1e67e6c7.exe.exe
Filesize513KB
MD5d5d7bb2df540e82f2692509ea89dd0c3
SHA10a000893482fdefc9adf9011df6a63368653f599
SHA256d8597c0794ff1bd674698d44d755207227d24a1ea1325215364e9976ee594889
SHA512dc80a747160d0948bad9ff0ba3b5bcc1dc05bc8a2d41f3bef46b3d4610fc105f7d7d62a79e99fed8ecbeba38d06c3ed90f1005bfd55db2547b86b58f9593d899
-
Filesize
29KB
MD5886eb3bf6157b45d4a041e1e32608c70
SHA1f476a007366ac0349789b0e803ec46be523f457a
SHA256a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b
SHA5126e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca
-
Filesize
9B
MD5bee060a5a21c2ee336a3be2d621d820c
SHA1ab3e106aded9b1727cf8ef31b2368c277ab43323
SHA256d40238bc26383b924d6c44505dc8ce65209cdd27a9b97bc0ec499815a11c40e5
SHA51289063c16782ace7c04ffbf362bde459836dbdaa3c2e323e8fe082b6956ada4680dde30e24d28d62bff9ab3cf9364e3b06e7e482e5fe953fa85728d6d7ac59b37