Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe
Resource
win10v2004-20240226-en
General
-
Target
a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe
-
Size
484KB
-
MD5
5b4e257698613e17472208fc5cae740a
-
SHA1
27c2da5f032cfd23af05041cb28e7952ba37b38a
-
SHA256
a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d
-
SHA512
e0729ac3f5a4d73699f2663f81022b8f7e6253ce6ef5179048730601936ef62d3dfae69c268af7c07b603c05dcd6faf4bf012075f7e710a2e0fe172930007d82
-
SSDEEP
6144:HVfjmNzz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fay7:17+n1gL5pRTcAkS/3hzN8qE43fm78V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2516 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1936 Logo1_.exe 2552 a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe -
Loads dropped DLL 1 IoCs
pid Process 2516 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\applet\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\3082\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe File created C:\Windows\Logo1_.exe a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2516 2492 a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe 28 PID 2492 wrote to memory of 2516 2492 a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe 28 PID 2492 wrote to memory of 2516 2492 a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe 28 PID 2492 wrote to memory of 2516 2492 a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe 28 PID 2492 wrote to memory of 1936 2492 a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe 29 PID 2492 wrote to memory of 1936 2492 a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe 29 PID 2492 wrote to memory of 1936 2492 a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe 29 PID 2492 wrote to memory of 1936 2492 a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe 29 PID 1936 wrote to memory of 2676 1936 Logo1_.exe 31 PID 1936 wrote to memory of 2676 1936 Logo1_.exe 31 PID 1936 wrote to memory of 2676 1936 Logo1_.exe 31 PID 1936 wrote to memory of 2676 1936 Logo1_.exe 31 PID 2676 wrote to memory of 2620 2676 net.exe 33 PID 2676 wrote to memory of 2620 2676 net.exe 33 PID 2676 wrote to memory of 2620 2676 net.exe 33 PID 2676 wrote to memory of 2620 2676 net.exe 33 PID 2516 wrote to memory of 2552 2516 cmd.exe 34 PID 2516 wrote to memory of 2552 2516 cmd.exe 34 PID 2516 wrote to memory of 2552 2516 cmd.exe 34 PID 2516 wrote to memory of 2552 2516 cmd.exe 34 PID 1936 wrote to memory of 1176 1936 Logo1_.exe 21 PID 1936 wrote to memory of 1176 1936 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe"C:\Users\Admin\AppData\Local\Temp\a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1FD0.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe"C:\Users\Admin\AppData\Local\Temp\a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe"4⤵
- Executes dropped EXE
PID:2552
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2620
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD55c2ffb619738d1d49fb8d897bccd0cc3
SHA1b2c88e93cee67a2501c161fffd6232666d40ef83
SHA2569319906b4f02cd7cf38eca9771fa64587e15dc6605de97a90a954b26d6b70a6d
SHA512c98c4929f0f9085ba69eead52e292f7a70395ac3428a6fa90949c783a98a0e1f0522fab244e26edd598276be5dbfd687a2a59c9f653b9a5cbdaa15c4aa243067
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5e5f10d7e2d5acec9c6b96ee7b2c92f6a
SHA1bc315f63d2e0a20fdb5e70c3015adfdc25b37483
SHA256e06ff04e62e2a930013133ddca760e4de3526473a3b5361ea2b9ec07fbc9ed85
SHA5121c7e3b84aacb8521079e04c55616dc550ad368e8b927a163dfdc6d36d0d2219dfc3360a8455d18c984278cf88a51dd34a3862f2c878b7b7deead5ebc05bf9aaf
-
C:\Users\Admin\AppData\Local\Temp\a9fd233dcd73094286ea754ba0d55a2f29fb2c288c510dc431a3238cc98bf18d.exe.exe
Filesize458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
26KB
MD5ef3f8e388ba2c9c2c650029413ed7735
SHA1c1a463b7c33c0de1dcb14bdbacf49fbd0a82b3a2
SHA2561d987e0ab9167e7509e4af33e9e2f9c87871e2081f58efb1ed3f9a5f5fb466eb
SHA51281cf123a5bfb905003df54d000cd000af5ed545d184a86a9eeb312044096949aafe73e942d4e07496a3f1f8a21b1270616ef1b963bd71dc767f95524f4ef4dbe
-
Filesize
9B
MD56304f6cd23949a0e203abd81fc93bcfd
SHA1260299dcdd7b9af6298e036322e7493d3598ab44
SHA2566e249dd60655637cf4a7f940b41cfc3b70dc36b986a37babad9180d29d22adb8
SHA512ce9d77f19554bdfdf7bc99adc9a9cdbc79c3d30f901b9f47ffb8e2d737c7a3fceb059de56993f9092c4ba0276b9d6ebc035fd48298dc62e11a9ef05bb9e00ab5