Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 17:06
Static task
static1
Behavioral task
behavioral1
Sample
3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe
Resource
win10v2004-20240412-en
General
-
Target
3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe
-
Size
621KB
-
MD5
0d8e96bfddef5b2245fdbed1c653e805
-
SHA1
8bfc2d377fccb9773e3cd58a6305b372dab42cf4
-
SHA256
3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328
-
SHA512
d61db6b35bfd7431eb68d221c5c16027b9fd09d10d93b72f31b36c76025588c3684d6beaeea0002321e57d249d8fda3f250ebf7d16b80d7a60d88fb5522c26a3
-
SSDEEP
12288:D7+Fp/PosBegQm9kJZjxnIG4ZQjH0ejJsbk4usOuF2yHuwd:D7wdPo5mmZVFWksl8Xg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2572 Logo1_.exe 2740 3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe -
Loads dropped DLL 1 IoCs
pid Process 2540 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Library\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BabyBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Uninstall Information\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Skins\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe File created C:\Windows\Logo1_.exe 3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2540 1880 3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe 28 PID 1880 wrote to memory of 2540 1880 3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe 28 PID 1880 wrote to memory of 2540 1880 3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe 28 PID 1880 wrote to memory of 2540 1880 3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe 28 PID 1880 wrote to memory of 2572 1880 3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe 30 PID 1880 wrote to memory of 2572 1880 3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe 30 PID 1880 wrote to memory of 2572 1880 3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe 30 PID 1880 wrote to memory of 2572 1880 3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe 30 PID 2572 wrote to memory of 2636 2572 Logo1_.exe 31 PID 2572 wrote to memory of 2636 2572 Logo1_.exe 31 PID 2572 wrote to memory of 2636 2572 Logo1_.exe 31 PID 2572 wrote to memory of 2636 2572 Logo1_.exe 31 PID 2636 wrote to memory of 2232 2636 net.exe 33 PID 2636 wrote to memory of 2232 2636 net.exe 33 PID 2636 wrote to memory of 2232 2636 net.exe 33 PID 2636 wrote to memory of 2232 2636 net.exe 33 PID 2540 wrote to memory of 2740 2540 cmd.exe 34 PID 2540 wrote to memory of 2740 2540 cmd.exe 34 PID 2540 wrote to memory of 2740 2540 cmd.exe 34 PID 2540 wrote to memory of 2740 2540 cmd.exe 34 PID 2572 wrote to memory of 1280 2572 Logo1_.exe 21 PID 2572 wrote to memory of 1280 2572 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe"C:\Users\Admin\AppData\Local\Temp\3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a5AFC.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe"C:\Users\Admin\AppData\Local\Temp\3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe"4⤵
- Executes dropped EXE
PID:2740
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2232
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD56712f70a805d41de3b97fa9aa090de49
SHA127ac4365f69e50329a6327c8b0a227f252c10018
SHA2567d18eaefb75d42d99306538038d93fd002678b87709efae10ee85bdd1befae3c
SHA5121835b2fdbc1064a1ba086412eebb9d9727da67ae71bf3c73a048b53edee7aa627d4fd0f932720d6357dade9704840bc33c026ecf95e5ae53992fb2f4f973ad26
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD54a8168d2c34bd1a2a7f9b404c63e7f7b
SHA1d13819345702ae3ee64cb019a5f857918e14a8aa
SHA2566e97ad96ad8bcce448e823ee0f9c7aaa6761047446241c79dfb8d7c08630b8ab
SHA512ca9d8ff624246076fe3922521c51b9adfbe586d7acdc0f1e35f00857334883130845a06fbb6477891b46a1fdc7a812cb1cb2c4f08cd91e69c02961e0bfdc6695
-
C:\Users\Admin\AppData\Local\Temp\3691cc42581364fd58028cce328b3a95e83c20d6225678604be3863f3fb30328.exe.exe
Filesize595KB
MD535a4ad489243e3a41cc0e41cdbd095b0
SHA1979593ac9e6d6d19a0efbe2a5315d87bad1c1301
SHA25636581d4fd6d83f492cac6fdf1aae837a3e5719814de61bab5536717f07d2bc23
SHA5124e6b7b98540f8d92e4a8deff7c76c3eeeba7dbff3a24a1df7853548c9fea3521e83eb161b9112b18b26575e8ac03bda982da110e0939fa48abaf7c5a7a876fab
-
Filesize
26KB
MD569d997f03780a8859aa3c4cbbfeffe22
SHA15413181661ca2fe7b8063f42a2fbe4f63ccc741e
SHA2568347ef9bac900f69a3a9eaecf994853f0e80eb5c4bb2b1dab645dd6093a49ef8
SHA5124eac6746dcd137fa91d096093e5248b11c530c6ad1125136c862f089e89ee65eefe89a0d5ffba3cf20e914ea05c1b8999dadf4a07ba9a35ffd48c52892051fd2
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0