Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 22:20
Static task
static1
Behavioral task
behavioral1
Sample
621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe
Resource
win10v2004-20240412-en
General
-
Target
621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe
-
Size
406KB
-
MD5
5ae30351061c9e5679eb0423c9981f7a
-
SHA1
eec332120c113baac932263f398d4300fc563a72
-
SHA256
621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b
-
SHA512
e0c9db57addb7408f273f2d28e4e7eec6a6651cdffbd8e46f70d5dc737a3bd48d6667b7597a33b709c2f06c764ff5724af312e103a912c46e13f2cea3b9af298
-
SSDEEP
1536:rfgLdQAQfcfymN7tE2/lnC0k3AShxotQp/sfPbFzRfe849HT1nfCTUNS47Ku2+r9:rftffjmNBWp3O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2216 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2504 Logo1_.exe 2392 621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe -
Loads dropped DLL 2 IoCs
pid Process 2216 cmd.exe 2216 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EURO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Lime\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Publisher.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENFR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\3082\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2392 621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2216 2240 621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe 28 PID 2240 wrote to memory of 2216 2240 621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe 28 PID 2240 wrote to memory of 2216 2240 621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe 28 PID 2240 wrote to memory of 2216 2240 621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe 28 PID 2240 wrote to memory of 2504 2240 621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe 29 PID 2240 wrote to memory of 2504 2240 621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe 29 PID 2240 wrote to memory of 2504 2240 621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe 29 PID 2240 wrote to memory of 2504 2240 621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe 29 PID 2504 wrote to memory of 2520 2504 Logo1_.exe 31 PID 2504 wrote to memory of 2520 2504 Logo1_.exe 31 PID 2504 wrote to memory of 2520 2504 Logo1_.exe 31 PID 2504 wrote to memory of 2520 2504 Logo1_.exe 31 PID 2520 wrote to memory of 2400 2520 net.exe 33 PID 2520 wrote to memory of 2400 2520 net.exe 33 PID 2520 wrote to memory of 2400 2520 net.exe 33 PID 2520 wrote to memory of 2400 2520 net.exe 33 PID 2216 wrote to memory of 2392 2216 cmd.exe 34 PID 2216 wrote to memory of 2392 2216 cmd.exe 34 PID 2216 wrote to memory of 2392 2216 cmd.exe 34 PID 2216 wrote to memory of 2392 2216 cmd.exe 34 PID 2504 wrote to memory of 1204 2504 Logo1_.exe 21 PID 2504 wrote to memory of 1204 2504 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe"C:\Users\Admin\AppData\Local\Temp\621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1A06.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe"C:\Users\Admin\AppData\Local\Temp\621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2392
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2400
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5ecbe6c927ab3cbcf2c2c402d5d597e04
SHA1a2f7e672dcefa78ae5dc1bb78ad36a8120d48a34
SHA25653cf317412fd2381d8ac6c948f6ffcb7a79a5c74334d35df36271fe6cd2bfb57
SHA51288ff2f9724d26736872d4c88a032bee24a11d4cd39b465492d898c746e6a375064dd92e883ece9b24299d36510fa34d9123a0bbfd2c3768f22a6c8e45a09596a
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD52dd88456a0f987499d8c540739fd2b8d
SHA1bf82b78f443498252a1eab38a72b00400500e592
SHA256e4ccf617fd5c29f18266539c9d1fcc3e5ad3cd72da45af9c8f294f46c7121593
SHA512e7abea07a9453351627ea9b9ec0cf56a5a3ed46c27dd9067ce0547634d730dce0cee0f16e9a2e600dad72d310b04abf8def999f5573840a8f1f081140c7689d3
-
C:\Users\Admin\AppData\Local\Temp\621414d6d493aae06720a08a7a22780947eb23bc37e70c9443ac693947d6bc7b.exe.exe
Filesize380KB
MD530e05d0608f2c093652daa63b9bdca0d
SHA1292502367acde00a7142f0bd1e6c72ce4c5fda38
SHA25627ed82408b8a50c2f519fdb9ee1b0dae81011dcac329056f35ab95b3c0b3615d
SHA51270932e45554803385ba8319bbc4970418a89a575a5592733d26f9becb71ff23043a3da1c6a82b6a71cc17bf2c6bdc5eea4012dcf6491ac0861d5b05c03dbdae1
-
Filesize
26KB
MD5acbc425191d0ec217d1584403dbde066
SHA12566fadcc3d541286f3ae42bff1b14350b76647c
SHA2561076bd2f64ea7edbe6e034efe3f6cf8dbabbe6d79b19040687e95c70e4ea8efd
SHA512a5616aa2224f02faa6f18ba965b000b47fb7cff2ca77851f5518168955d4209f6d7a94e31e65b530d19b26cbf4bac12274df77593f23d0587b9e960abf3e3e11
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0