Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe
Resource
win10v2004-20240226-en
General
-
Target
4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe
-
Size
117KB
-
MD5
a5d67bc9ee14ef1a35f01f0531f1f24d
-
SHA1
6c518f8a5820abdb29285efbe7f13823fd973bcc
-
SHA256
4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c
-
SHA512
f14c4b3bfeb06c2c6fe3adf7ed4be46d98164fd2c04bb53fbdcd77c5298b4ccefc8eb28feee082a11bcb83773c3ae104ede1da766406a040f2096ac54fbf27f7
-
SSDEEP
3072:bakF3pNJo/FQXy+uc//korlDFtNel3kaIFH/B0CyPvO3c0gCajNCg:jFpNJo/qi+k
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2924 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2528 Logo1_.exe 2728 4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe 2144 4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\InfoPath.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe File created C:\Windows\Logo1_.exe 4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2924 3064 4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe 28 PID 3064 wrote to memory of 2924 3064 4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe 28 PID 3064 wrote to memory of 2924 3064 4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe 28 PID 3064 wrote to memory of 2924 3064 4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe 28 PID 3064 wrote to memory of 2528 3064 4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe 30 PID 3064 wrote to memory of 2528 3064 4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe 30 PID 3064 wrote to memory of 2528 3064 4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe 30 PID 3064 wrote to memory of 2528 3064 4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe 30 PID 2528 wrote to memory of 2648 2528 Logo1_.exe 31 PID 2528 wrote to memory of 2648 2528 Logo1_.exe 31 PID 2528 wrote to memory of 2648 2528 Logo1_.exe 31 PID 2528 wrote to memory of 2648 2528 Logo1_.exe 31 PID 2648 wrote to memory of 2736 2648 net.exe 34 PID 2648 wrote to memory of 2736 2648 net.exe 34 PID 2648 wrote to memory of 2736 2648 net.exe 34 PID 2648 wrote to memory of 2736 2648 net.exe 34 PID 2528 wrote to memory of 1064 2528 Logo1_.exe 18 PID 2528 wrote to memory of 1064 2528 Logo1_.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe"C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a889.bat3⤵
- Deletes itself
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe"C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe"4⤵
- Executes dropped EXE
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe"C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe"4⤵
- Executes dropped EXE
PID:2144
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2736
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD57ab1e57f4c2bf1d2993bbced63b8a079
SHA1338510e0e58fecb34db5af4fdd57c3196bcf492f
SHA256746f3612c4431691580be5f3f45dac4a8782fd033b6cb6206903952cdbf381bf
SHA51229f5acdc6bafde8fe6622d02b4bd67ca0362ec2dcd32f301a15f460516ec2a20fc3a2096a44c6719bb953debca53d14095355ff2585b4be01a8bfb4fdae5c617
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
721B
MD52b9f29129804cf6ff5727662a76f40b6
SHA1b4b5512e0312188e69b4703a74785c46a3a2a15d
SHA2560eed75b900ad5662f16614d3f11f7a2dad9764c184194c1708507b85025927fe
SHA512ee40f471bf6c71b76e6fa828669e8a12b8c6284236820c035d0f6f1c7410445960be7d11a7326205f5827166a2567f348215a1095f2b718930f32a0b47800460
-
C:\Users\Admin\AppData\Local\Temp\4ed9156b47d994b0b9b2a5c537ddcb2568c53e4ab29a05aa16685f9621d3119c.exe.exe
Filesize90KB
MD5c8c3b8fb878ce29b75a69219abff4ccf
SHA1e2e5d4feb0dff20ad1d83f72062f5816d365bc37
SHA2564656a73e3e8ae7ab4dc9bcdcda922f18787978c758871c9bd51e4340d46e5113
SHA51270c68e1c770cc806b2d2edf5d40cc86dd1781d8a01849cffc08a511133c1efcf892bd8a56dd4a7f8e307c46b038fff3a309ce9c1d78feb6190347ae6d77d6ad1
-
Filesize
27KB
MD59920a0249e42429e36d021ee4928712d
SHA18484687015901fd29dfb9f66820654bfea218279
SHA25686d714dc8443ae16c0f2a8d2698c5ec65598d5239bae01c9afe38f57dbf545c9
SHA5122bebb557344467e98dc654dff83a00a65ca37ebccd922fab718c626c86243256023f8cdb48ee4675446bd9eded2ad72d9260ef2cda9fb9d7022dc04cad41e8e0
-
Filesize
9B
MD5eed22d90d59cbfc76cc757d7c238a336
SHA1fa10a168f65a1788ecfc6631ff8dcddbc534a27d
SHA256f04d4e94a23081336a3eed6026a776692a44e29a28b200df129e4deb34593238
SHA512b180f5199832146f98ba86eca73c9a1a19ef3582a028b3fcfc0c7c6c9563e5e13b3865f0875ee9c54af9188a5f83cc56fecc40873485c4ea76d8f95de6f63c1a